SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Safer Internet in a Virtual World /
Virtual Internet for a SAFER world

Sotiris Karagiannis
IT Consultant
Space Hellas S.A.
skar@space.gr
Thessaloniki
September 2006
How Many of you Are Parents?
We care for our children 
Safer Internet (one tech’s view)
The technology challenge(s):
– Safer Browsing, collaboration, chat, games
for Kids
– High immunity in Worms, Viruses, Malicious
software that the kids cannot handle
– Secure Environment, easy to backup, easy
to monitor, easy to carry around
– Kid Safe Desktop with Games, Learning
Tools
– Safe for the Parents also . Not much
knowledge required.
Safer Internet (many views)
Many Solutions, other speakers have
already covered and will cover..
ONE NEW TECHNOLOGY APPROACH :

Virtualization
What is virtualization?
Virtualization is a HOT topic worldwide
The Leaders :
– VMWare,
– Microsoft,
– XEN,
– QEMU

And many are following
A new CONCEPT
The CONCEPT:
•
•
•
•

We create a VIRTUAL APPLIANCE
We install a safe (as it gets) OS inside.
We install additional software (Kids Oriented)
We secure it / harden it with appropriate
software (firewalls, antivirus, web & mail
filters, etc)
• We add our Proprietary Monitoring software
(Space Hellas .pulse IT Monitoring Platform)
• We ensure ONE-CLICK Restoration and Safe
Integration in the context of HOST machine
The Result
What we now have :
A new (virtual) appliance that can:
– Be carried around in a USB stick (parent can be able
to unlock it / U3 technology)
– Is safe enough for the Kid and the Parent Machine
– Malicious Data is not saved, Safe Appliance can be
restored with a click
– It can be continuously monitored for “bad behavior”
– It can be Viewed / Controlled
from Anywhere (parent can help,
control the Appliance on demand)
– NO-one is hurt, like in the POLO
terror-proof experience 
(going there…)
The Components
What we have used:
• Virtualization Technologies:
– VMware Player (free), VirtualPC (free) or
QEMU (free)

• Linux Appliances OS (free):
– PuppyLinux, Ubuntu, ZenWalk

• Applications (free):
– Mozilla Firefox, AbiWord, Gaim, Thunderbird, Various Games,
Mono (.net apps), VNC Remote Control

• Applications (proprietary):
– Space Hellas .pulse Monitoring Platform

• Space Hellas Software and a lot of
Know-How 
in more Depth..
More Technical:
• In WindowsXP, or Linux Host a new account (kid
account) in the PARENT’s machine is created.
• The Default Shell is changed to run the VA on logon.
– OR The VA can boot from USB stick

• The Host PC is made unreachable from the VA
• The VA can run only in memory and NOT write
anything to the HOST PC Hard Disk.
• The whole VA can be as small as 60Mbytes !!!
• The whole VA can be Locked and carried around
with U3 technology USB Flash sticks (www.u3.com)
• More functionality is going to be added with
cooperations between Space Hellas and ISPs /
Government Bodies
A little Demo (VMware/puppy)
The Opportunities
The Opportunities:
• For ISPs: provide their
customers with a safe VA
in their ADSL / Internet Offers
• For Government: provide the School
Network with Safer Kid Desktops, easy to be
monitored, easy to be restored.
• For Parents: to know that their kids
are safer while using the Internet
• For Private Schools: Build a safer
Infrastructure for their children
The Risks
Ideas / Problems / Open Discussion
• Privacy concerns (from the
child’s perspective)
• Ease of Use (from the
Parents’ View)
• Total Security Solution (?)
• Virtualization may be used in many ways
(good and bad)
• Intel and Symantec are using it as a
Hardware based solution (Intel VPro
technology)
The Future (is now?)
What Now ?
– We will explore the possibilities further
(Fully Hellenic Virtualization, TCO for a
Virtual Unit)
– We are in search of (Research) Partners in
other areas (e.g. Safety Filters)
– We are going to explore the U3
technology
– We may produce a stable release
tailored for the Hellenic Market
References
– VMWare Virtual Appliances
(www.vmware.com)
– QEMU, a generic open source processor
emulator (www.qemu.org)
– PuppyLinux (www.puppylinux.org)
– One Laptop Per Child Project (OLPC)
(www.laptop.org)
– U3 Technology – Portable Software
(www.u3.com)
– Space Hellas .Pulse Platfrorm
(http://www.space.gr/pages.php?langID=1&pageI
D=217)
Thank You
Questions / Ideas / Discussion
Space Hellas S.A.
http://www.space.gr
North Greece Branch Office
Tel: +30 2310 502050
Fax: + 30 2310 502025
Contact me at :
Sotiris Karagiannis
Email: skar@space.gr

Mais conteúdo relacionado

Destaque

Food Illness Investigation Web Quest
Food Illness Investigation Web QuestFood Illness Investigation Web Quest
Food Illness Investigation Web QuestKtoth
 
Safe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSafe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSarah Parks
 
Powerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaPowerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaLidia Canet
 
KIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLKIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLNIKITA CHAURASIA
 
Presentation skills designed for autistic kids teacher
Presentation skills designed for autistic kids   teacherPresentation skills designed for autistic kids   teacher
Presentation skills designed for autistic kids teachergihan aboueleish
 
History of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsHistory of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsGeeta Singh
 
Kids on earth powerpoint presentation slides.
Kids on earth powerpoint presentation slides.Kids on earth powerpoint presentation slides.
Kids on earth powerpoint presentation slides.SlideTeam.net
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Technology in teenagers powerpoint
Technology in teenagers powerpointTechnology in teenagers powerpoint
Technology in teenagers powerpointdaniellemorgan13
 
Pbs buzz huddle presentation
Pbs buzz huddle presentationPbs buzz huddle presentation
Pbs buzz huddle presentationAmy Mascott
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Jordan Papps powerpoint
Jordan Papps powerpointJordan Papps powerpoint
Jordan Papps powerpointguesta18090
 
Sustaining quality approaches for locally embedded community health services ...
Sustaining quality approaches for locally embedded community health services ...Sustaining quality approaches for locally embedded community health services ...
Sustaining quality approaches for locally embedded community health services ...REACHOUTCONSORTIUMSLIDES
 
休眠預金を活用した東北復興構想(案)
休眠預金を活用した東北復興構想(案)休眠預金を活用した東北復興構想(案)
休眠預金を活用した東北復興構想(案)spr_florence
 

Destaque (14)

Food Illness Investigation Web Quest
Food Illness Investigation Web QuestFood Illness Investigation Web Quest
Food Illness Investigation Web Quest
 
Safe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSafe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship Powerpoint
 
Powerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaPowerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers Clothesjudithlaia
 
KIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLKIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOL
 
Presentation skills designed for autistic kids teacher
Presentation skills designed for autistic kids   teacherPresentation skills designed for autistic kids   teacher
Presentation skills designed for autistic kids teacher
 
History of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsHistory of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kids
 
Kids on earth powerpoint presentation slides.
Kids on earth powerpoint presentation slides.Kids on earth powerpoint presentation slides.
Kids on earth powerpoint presentation slides.
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Technology in teenagers powerpoint
Technology in teenagers powerpointTechnology in teenagers powerpoint
Technology in teenagers powerpoint
 
Pbs buzz huddle presentation
Pbs buzz huddle presentationPbs buzz huddle presentation
Pbs buzz huddle presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Jordan Papps powerpoint
Jordan Papps powerpointJordan Papps powerpoint
Jordan Papps powerpoint
 
Sustaining quality approaches for locally embedded community health services ...
Sustaining quality approaches for locally embedded community health services ...Sustaining quality approaches for locally embedded community health services ...
Sustaining quality approaches for locally embedded community health services ...
 
休眠預金を活用した東北復興構想(案)
休眠預金を活用した東北復興構想(案)休眠預金を活用した東北復興構想(案)
休眠預金を活用した東北復興構想(案)
 

Semelhante a My presentation for Kids Safety "Safer internet in a virtual world (2006)"

NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNorth Texas Chapter of the ISSA
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Childrennickswebtsv
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botGroup of company MUK
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad SecuritySimon Guest
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT securityTony Wilson
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Mobile security... The next challenge
Mobile security... The next challengeMobile security... The next challenge
Mobile security... The next challengeB.A.
 
Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HIDNikhil Mittal
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 

Semelhante a My presentation for Kids Safety "Safer internet in a virtual world (2006)" (20)

NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Children
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
OWASP
OWASPOWASP
OWASP
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad Security
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Mobilemonday b2b b-asecurity
Mobilemonday b2b   b-asecurityMobilemonday b2b   b-asecurity
Mobilemonday b2b b-asecurity
 
Mobile security... The next challenge
Mobile security... The next challengeMobile security... The next challenge
Mobile security... The next challenge
 
Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HID
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 

Mais de Sotiris Karagiannis

Future of Work and AI - Digital Disruption in the Workplace
Future of Work and AI - Digital Disruption in the WorkplaceFuture of Work and AI - Digital Disruption in the Workplace
Future of Work and AI - Digital Disruption in the WorkplaceSotiris Karagiannis
 
The mobile office and the knowledge worker
The mobile office and the knowledge workerThe mobile office and the knowledge worker
The mobile office and the knowledge workerSotiris Karagiannis
 
Seerc karagiannis - from a tech idea to a global meaningful company
Seerc   karagiannis - from a tech idea to a global meaningful companySeerc   karagiannis - from a tech idea to a global meaningful company
Seerc karagiannis - from a tech idea to a global meaningful companySotiris Karagiannis
 
Panmak karagiannis - from a tech idea to a global meaningful company
Panmak   karagiannis - from a tech idea to a global meaningful companyPanmak   karagiannis - from a tech idea to a global meaningful company
Panmak karagiannis - from a tech idea to a global meaningful companySotiris Karagiannis
 
From an idea to a global successful company
From an idea to a global successful companyFrom an idea to a global successful company
From an idea to a global successful companySotiris Karagiannis
 
Market Trends and Employment Opportunities
Market Trends and Employment OpportunitiesMarket Trends and Employment Opportunities
Market Trends and Employment OpportunitiesSotiris Karagiannis
 

Mais de Sotiris Karagiannis (7)

Future of Work and AI - Digital Disruption in the Workplace
Future of Work and AI - Digital Disruption in the WorkplaceFuture of Work and AI - Digital Disruption in the Workplace
Future of Work and AI - Digital Disruption in the Workplace
 
The mobile office and the knowledge worker
The mobile office and the knowledge workerThe mobile office and the knowledge worker
The mobile office and the knowledge worker
 
Seerc karagiannis - from a tech idea to a global meaningful company
Seerc   karagiannis - from a tech idea to a global meaningful companySeerc   karagiannis - from a tech idea to a global meaningful company
Seerc karagiannis - from a tech idea to a global meaningful company
 
Karagiannis space hellas_sepve
Karagiannis space hellas_sepveKaragiannis space hellas_sepve
Karagiannis space hellas_sepve
 
Panmak karagiannis - from a tech idea to a global meaningful company
Panmak   karagiannis - from a tech idea to a global meaningful companyPanmak   karagiannis - from a tech idea to a global meaningful company
Panmak karagiannis - from a tech idea to a global meaningful company
 
From an idea to a global successful company
From an idea to a global successful companyFrom an idea to a global successful company
From an idea to a global successful company
 
Market Trends and Employment Opportunities
Market Trends and Employment OpportunitiesMarket Trends and Employment Opportunities
Market Trends and Employment Opportunities
 

Último

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

My presentation for Kids Safety "Safer internet in a virtual world (2006)"

  • 1. Safer Internet in a Virtual World / Virtual Internet for a SAFER world Sotiris Karagiannis IT Consultant Space Hellas S.A. skar@space.gr Thessaloniki September 2006
  • 2. How Many of you Are Parents? We care for our children 
  • 3. Safer Internet (one tech’s view) The technology challenge(s): – Safer Browsing, collaboration, chat, games for Kids – High immunity in Worms, Viruses, Malicious software that the kids cannot handle – Secure Environment, easy to backup, easy to monitor, easy to carry around – Kid Safe Desktop with Games, Learning Tools – Safe for the Parents also . Not much knowledge required.
  • 4. Safer Internet (many views) Many Solutions, other speakers have already covered and will cover.. ONE NEW TECHNOLOGY APPROACH : Virtualization
  • 5. What is virtualization? Virtualization is a HOT topic worldwide The Leaders : – VMWare, – Microsoft, – XEN, – QEMU And many are following
  • 6. A new CONCEPT The CONCEPT: • • • • We create a VIRTUAL APPLIANCE We install a safe (as it gets) OS inside. We install additional software (Kids Oriented) We secure it / harden it with appropriate software (firewalls, antivirus, web & mail filters, etc) • We add our Proprietary Monitoring software (Space Hellas .pulse IT Monitoring Platform) • We ensure ONE-CLICK Restoration and Safe Integration in the context of HOST machine
  • 7. The Result What we now have : A new (virtual) appliance that can: – Be carried around in a USB stick (parent can be able to unlock it / U3 technology) – Is safe enough for the Kid and the Parent Machine – Malicious Data is not saved, Safe Appliance can be restored with a click – It can be continuously monitored for “bad behavior” – It can be Viewed / Controlled from Anywhere (parent can help, control the Appliance on demand) – NO-one is hurt, like in the POLO terror-proof experience  (going there…)
  • 8. The Components What we have used: • Virtualization Technologies: – VMware Player (free), VirtualPC (free) or QEMU (free) • Linux Appliances OS (free): – PuppyLinux, Ubuntu, ZenWalk • Applications (free): – Mozilla Firefox, AbiWord, Gaim, Thunderbird, Various Games, Mono (.net apps), VNC Remote Control • Applications (proprietary): – Space Hellas .pulse Monitoring Platform • Space Hellas Software and a lot of Know-How 
  • 9. in more Depth.. More Technical: • In WindowsXP, or Linux Host a new account (kid account) in the PARENT’s machine is created. • The Default Shell is changed to run the VA on logon. – OR The VA can boot from USB stick • The Host PC is made unreachable from the VA • The VA can run only in memory and NOT write anything to the HOST PC Hard Disk. • The whole VA can be as small as 60Mbytes !!! • The whole VA can be Locked and carried around with U3 technology USB Flash sticks (www.u3.com) • More functionality is going to be added with cooperations between Space Hellas and ISPs / Government Bodies
  • 10. A little Demo (VMware/puppy)
  • 11. The Opportunities The Opportunities: • For ISPs: provide their customers with a safe VA in their ADSL / Internet Offers • For Government: provide the School Network with Safer Kid Desktops, easy to be monitored, easy to be restored. • For Parents: to know that their kids are safer while using the Internet • For Private Schools: Build a safer Infrastructure for their children
  • 12. The Risks Ideas / Problems / Open Discussion • Privacy concerns (from the child’s perspective) • Ease of Use (from the Parents’ View) • Total Security Solution (?) • Virtualization may be used in many ways (good and bad) • Intel and Symantec are using it as a Hardware based solution (Intel VPro technology)
  • 13. The Future (is now?) What Now ? – We will explore the possibilities further (Fully Hellenic Virtualization, TCO for a Virtual Unit) – We are in search of (Research) Partners in other areas (e.g. Safety Filters) – We are going to explore the U3 technology – We may produce a stable release tailored for the Hellenic Market
  • 14. References – VMWare Virtual Appliances (www.vmware.com) – QEMU, a generic open source processor emulator (www.qemu.org) – PuppyLinux (www.puppylinux.org) – One Laptop Per Child Project (OLPC) (www.laptop.org) – U3 Technology – Portable Software (www.u3.com) – Space Hellas .Pulse Platfrorm (http://www.space.gr/pages.php?langID=1&pageI D=217)
  • 15. Thank You Questions / Ideas / Discussion Space Hellas S.A. http://www.space.gr North Greece Branch Office Tel: +30 2310 502050 Fax: + 30 2310 502025 Contact me at : Sotiris Karagiannis Email: skar@space.gr