Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Tag Archives: Network World

Netflix uncages Chaos Monkey DR tester

Netflix has released Chaos Monkey, which it uses internally to test the resiliency of its Amazon Web Services cloud computing architecture, making available for free one of the tools the video streaming company uses to keep its massive cloud computing architecture running.Chaos Monkey is a free download available from GitHub as of today. It works by randomly terminating instances of virtual machines in applications, simulating what would happen during a disaster event.

via Netflix uncages Chaos Monkey disaster testing system.

What ATT U-verse is doing to conserve IPV4 addessess…

… and some impacts.

As part of AT&T’s efforts to enhance our network to accommodate future growth, we will be making a firmware upgrade to your AT&T U-verse Gateway. Customers who have configured their network to use the 10.0.0.1 – 10.255.255.255 private Internet Protocol (IP) ranges within their AT&T U-verse Gateway will need to change to an alternate IP range. AT&T recommends changing to a 192.168.1.x IP range.

via http://www.networkworld.com/columnists/2012/052912-backspin.html.

How to make Android faster, more productive and more secure

I’m an iPhone guy…. I don’t know why I’m posting this:

Here are 10 ways to make Android faster, more productive and more secure

via How to make Android faster, more productive and more secure

iPad 2 vs. business class tablets

iPad2 is the gold standard, but Fujitsu Stylistic and GammaTech Durabook are strong contenders

Tech lovers have been flocking to the iPad 2 and other tablets in order to watch movies, read books, surf the Web and make video calls on the latest, greatest, thinnest, lightest, coolest devices. But where do tablets fit within the enterprise?

We tested 10 tablets to see which had the strongest set of business-related features… We focused on business-related features, such as business-oriented programs and apps, security components, developer programs poised towards the enterprise, and accessories targeting business use. We also looked at battery life and Java-based browser performance.

via Network World.

What’s new in iOS 5

Since I am an iPhone user, articles like this are of great interest to me.  I would love to see comments from anyone who has done the upgrade…

Start here to learn the most useful new features and enhancements for your iPad or iPhone

iOS 5 has been out for a day now, and if you have a compatible iPhone, iPod Touch, or iPad, you’re probably still trying to get familiar with it… But if you want the quick summary of what’s new in iOS 5, read on.

via http://www.networkworld.com/news/2011/101311-whats-new-in-ios-5-251925.html.

Microsoft falsely labels Chrome as malware

“Wow, that’s certainly one way to win the browser war,” said Andrew Storms, director of security operations at nCircle Security, over on Network World.

Google has released a new version of Chrome after Microsofts antivirus software flagged the browser as malware and removed it from about 3,000 peoples computers on Friday.

Microsoft apologized for the problem and updated its virus definition file to correct the false-positive problem, according to a post from Ryan Naraine at ZDNet.

“…perhaps Microsoft should have included Google, not just its customers, in its apology”.

via Microsoft falsely labels Chrome as malware | Security – CNET News.

Romance scams plague UK: 200,000 victims

Research out of the UK today says that perhaps as many as 200,00 people in that country have been victims of online romance scams and the same study says over 1 million people personally know someone who has been scammed by one of these heartless fraudsters.

The online research was conducted by the UK’s University of Leicester found that 52% of people surveyed online had heard of the online romance scam when it was explained to them and that one in every 50 online adults know someone personally who had fallen victim to it. The results confirm the law enforcement belief that this type of crime is often not reported by those affected, in many cases due to embarrassment at having been duped, or through a continuing hope that there will eventually be a genuine romance, the study found.

According to the FBI’s IC3, scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their “undying love.” These criminals also use stories of severe life circumstances, tragedies, deaths in the family, injuries to themselves, or other hardships to keep their victims concerned and involved in their schemes. Scammers also ask victims to send money to help overcome a financial situation they claim to be experiencing. These are all lies intended to take money from unsuspecting victims, the IC3 says.

The romance scam is particularly cruel in that perpetrators spend long periods of time grooming their victims, working out their vulnerabilities and when the time is right to ask for money…

via Layer 8: Romance scams plague UK: 200,000 victims?.

Out-of-band patch: MS warns of hack attempt on major sites

Microsoft issued a warning today that nine fraudulent digital certificates were issued by root certificate authority, Comodo Group. Although the certificates were quickly revoked, their initial release still poses a threat to browser users, including users of Internet Explorer. This is not a security flaw in Microsoft software, the company says, but it released a security update for Windows all the same.

The nine fake certificates affect the following Web sites, Microsoft says:

  • login.live.com (Windows Live)
  • mail.google.com
  • http://www.google.com
  • login.yahoo.com (3 certificates)
  • login.skype.com
  • addons.mozilla.org
  • “Global Trustee”

Fraudulent certificates give hackers the ability to spoof content, phish, or insert themselves in man-in-the-middle attacks, collecting information that users think is being sent over a secure link from browser to Web site.

via Network World.

RIM urges BlackBerry users to turn off JavaScript

Research in Motion is recommending that IT departments and users disable JavaScript on their BlackBerry devices, citing a vulnerability unearthed at this year’s Pwn2Own hacker challenge.

According to RIM, the vulnerability could allow a hacker to access a device’s user data through the BlackBerry Browser if the user visits a “maliciously designed” Web site. The vulnerability only affects devices that have BlackBerry OS 6 installed, since it can only be exploited in devices that utilize the WebKit browser engine… Any BlackBerry devices that contain older versions of the BlackBerry operating system will not be impacted.

via NetworkWorld.

IPhone attack reveals passwords in six minutes

Don’t lose your phone if you use it to access sensitive enterprise data!

Researchers in Germany say they’ve been able to reveal passwords stored in a locked iPhone in just six minutes and they did it without cracking the phone’s passcode.

The attack, which requires possession of the phone, targets keychain, Apple’s password management system. Passwords for networks and corporate information systems can be revealed if an iPhone or iPad is lost or stolen, said the researchers…

It is based on existing exploits that provide access to large parts of the iOS file system even if a device is locked.

Among passwords that could be revealed were those for Google Mail as an MS Exchange account, other MS Exchange accounts, LDAP accounts, voicemail, VPN passwords, WiFi passwords and some App passwords.

via http://www.networkworld.com/.