CielView Frequently Asked Questions

  • Tablet

    A tablet computer, commonly shortened to tablet, is a thin, flat mobile computer with a touchscreen display, which in 2016 is usually color, processing circuitry, and a rechargeable battery in a single device. Tablets often come equipped with sensors, including digital cameras, a microphone, and an accelerometer. The touchscreen display uses the recognition of finger or stylus gestures to replace the mouse, trackpad and keyboard used in laptops. They usually feature on-screen, pop-up virtual keyboards for typing and inputting commands. Tablets may have physical buttons for basic features such as speaker volume and power, and ports for plugging in network communications, headphones and battery charging. Tablets are typically larger than smartphones or personal digital assistants with screens 7 inches (18 cm) or larger, measured diagonally.[1][2][3][4] In 2016, many tablets have Wi-Fi capability built in so that users can connect to the Internet.

    Sources : 1 Wikipedia, Tablet computer. Retrieved August 30, 2016
    https://en.wikipedia.org/wiki/Tablet_computer

  • A client is a piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. The term applies to the role that programs or devices play in the client–server model.

    Sources : 1 Wikipedia, Client (computing)Retrieved August 30, 2016
    https://en.wikipedia.org/wiki/Client_(computing)

  • A client is a piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. The term applies to the role that programs or devices play in the client–server model.

    Sources : 1 Wikipedia, Client (computing)Retrieved August 30, 2016.
    https://en.wikipedia.org/wiki/Client_(computing)

  • In information technology, an application is a computer program designed to help people perform an activity. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming tool (with which computer programs are created) [original research?]. Depending on the activity for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements. Some application packages focus on a single task, such as word processing; others, called integrated software include several applications.

    Sources : 1 Wikipedia, Application softwareRetrieved August 30, 2016.
    https://en.wikipedia.org/wiki/Application_software

  • Remote access refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. This allows employees to work offsite, such as at home or in another location, while still having access to a distant computer or network, such as the office network. Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely.

    1 Webopedia, Remote accesss. Retrieved August 30, 2016.
    https://www.techopedia.com/definition/5553/remote-access

  • Disaster recovery (DR) involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.

    Sources : 1 Wikipedia, Disaster recovery. Retrieved August 30, 2016
    https://en.wikipedia.org/wiki/Disaster_recovery

Zloader Malware Exploits Microsoft Digital Signature Verification

Hackers are using Microsoft's digital signature verification to steal user credentials and other sensitive information by delivering the ZLoader malware. Zloader was previously used to distribute Ryuk and Conti ransomware. Researchers at Check Point Research found that Malsmoke, a hacking group, has been using Microsoft's digital signature to distribute Zloader since November 2021. The group already has over 2,000 victims in 111 countries in the United States, Canada and India. ...

December's Patch Tuesday Updates Fixes Seven Security Vulnerabilities

Microsoft has fixed a zero-day vulnerability that is used to deliver Emotet, Trickbot through fake applications. The patch is part of Microsoft's December Patch Tuesday update, which included 67 fixes for security vulnerabilities. The patches cover almost the full portfolio of Microsoft including Edge, Microsoft Office, SharePoint Server, PowerShell, Remote Desktop Client, Windows Hyper-V, Windows Mobile Device Management, Windows Remote Access Connection Manager, TCP/IP, and the Windows Update ...

A Temporary Fix Issued For HiveNightmare / SeriousSAM

A security vulnerability could allow hackers to steal data and allow local privilege escalation according to researcher Abdelhamid Naceri. The issue was originally in October 2020. The issue, CVE-2021-24084, has yet to get an official fix. A micropatch has been rolled out as a stop-gap measure. ...

Another Intel Chip Flaw Exposes Encryption Keys

According to Positive Technologies, a Russian cybersecurity firm, a security vulnerability in Intel chips allow encrypted file access. The flaw also gives hackers the ability to bypass copyright protection for digital content. Positive Technologies found that the vulnerability ( CVE-2021-0146 ) is caused by a debugging functionality with excessive privileges. According to Intel, the flaw allows activation of test o ...