George Ou

George Ou, a former ZDNet blogger, is an IT consultant specializing in Servers, Microsoft, Cisco, Switches, Routers, Firewalls, IDS, VPN, Wireless LAN, Security, and IT infrastructure and architecture.</p>

Latest Posts

Disagreement over impact of Vista's analog hole

Disagreement over impact of Vista's analog hole

The fundamental problem here is that Microsoft "extended" speech to be able to control the Operating System and Applications without considering the full security implications. If Microsoft had merely assigned a user-defined password with an automatic lockout after a certain amount of idle time, it would have made the generic attack impossible but they failed do that. So I'm asking Microsoft to reconsider their stance that "there is little if any need to worry" and implement some sort of safety mechanism rather than relying on the user to be self vigilant.

published February 1, 2007 by

Comments

Layer 2 security; the forgotten front

Layer 2 security; the forgotten front

One of the fastest ways for hackers to breech security systems is to circumvent Layer 2 which is your LAN switching infrastructure.  Unfortunately that also happens to be one of the most overlooked aspects of Information Security with most security audits focusing on policy and compliance issues on the upper layers of the stack.

published January 30, 2007 by

Comments

Vista Speech Command exposes remote exploit

Vista Speech Command exposes remote exploit

Vista speech command system allows remote exploitation because sound files played by from a web browser or any other audio player can interact with the OS. Users should turn off Vista speech command until a patch is available.

published January 30, 2007 by

Comments

AMD versus Intel: CPU wars roadmap

AMD versus Intel: CPU wars roadmap

Intel announced the next revolution in Microprocessor fabrication by replacing Silicon Dioxide gates with High-K dielectric metal gates.  Microprocessor industry analyst David Kanter who contributed a lot of the information in this piece had this in-depth analysis on what this means for Intel and AMD.

published January 29, 2007 by

Comments

Vista Upgrade Edition is lame by design

Vista Upgrade Edition is lame by design

Arstechnica is reporting that Windows Vista Upgrade edition will not permit "clean" installs like all previous versions of Windows Upgrade editions.  Will Microsoft pick up the extra hour tab from Geek Squad?

published January 28, 2007 by

Comments

QuickBooks Vista problems are six years in the making

QuickBooks Vista problems are six years in the making

David Berlind and Mary Jo Foley have been intensely following the story of QuickBooks incompatibility with Windows Vista.  Mary Jo is questioning if Microsoft is responsible for this latest failure of QuickBooks (anything before QuickBooks 2007) incompatibility and went even further to give Intuit a free pass.

published January 25, 2007 by

Comments

S. Korean addiction to ActiveX stalls Vista adoption

S. Korean addiction to ActiveX stalls Vista adoption

South Koreans are being advised by their Government to postpone their adoption of Windows Vista until they're sure they'll be able to bank online and other web activities.  The problem it seems is that Korea has almost universally adopted ActiveX technology for all of their "online banks, portals, game sites and malls".

published January 24, 2007 by

Comments

802.11n draft 1.10 - A kinder gentler neighbor

802.11n draft 1.10 - A kinder gentler neighbor

In summer of last year I wrote a cynical blog about "How to jam your neighbor's Wi-Fi legally".  I was referring to the fact that "Draft N" products were achieving their high throughput at the expense of annihilating their neighbor's 802.

published January 22, 2007 by

Comments

Putting the cracking of SHA-1 in perspective

Putting the cracking of SHA-1 in perspective

SHA-1 is one of the most prevalent forms of a secure hash algorithm used in the legal and security industry.  Now that Professor Xiaoyun Wang and her associates in Tsinghua University and Shandong University of Technology have officially cracked the SHA-1 hashing algorithm, the fallout will begin.

published January 21, 2007 by

Comments

The big marketing lie on flash drive performance

The big marketing lie on flash drive performance

When it comes to false advertising I used to think the Wireless LAN industry were the worst offenders, but the flash storage industry seems to be vying for this dubious distinction.  With the launch of Windows Vista at the end of this month, flash media performance will become a big issue for ordinary consumers because of Vista's ReadyBoost feature which will boost the performance of Vista.

published January 17, 2007 by

Comments

Build an affordable 32 gigabit network for the datacenter

Build an affordable 32 gigabit network for the datacenter

Conventional wisdom says that affordable and high performance don't go together, but here's an article I'd like to share with you that does just that.  Not only is this architecture affordable, but this distributed design maintains single device manageability while eliminating the need for distribution patch panels.

published January 16, 2007 by

Comments

Apple TV might obsolete the x86 appliance market

Apple TV might obsolete the x86 appliance market

This may surprise you, but I'm going to order an AppleTV as soon as I can.  Some of you might be wondering "who are you and what have you done with George" but no, I didn't get kidnapped at last week's MacWorld and I am the real George Ou.

published January 15, 2007 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories