Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Tag Archives: TechRepublic

Malware poses updates: Why the FBI is warning travelers

Those “critical update” notices you get, especially while traveling, may not be what you think. Michael Kassner gets the low-down on this serious threat as well as the Evilgrade platform.

via Malware poses as software updates: Why the FBI is warning travelers | TechRepublic.

Windows 7 services you may not need

Check these out; you might be able to disable services that you’ll never need: 10+ Windows 7 services you may not need | TechRepublic.

Attacked by Anonymous: How to defend

Organizations have to be ready to face possible DoS attacks. Here are some basic strategies that can be used to defend against an attack:

  • Configure your routers and firewalls to stop invalid IP addresses and filter out protocols that are not needed. Some firewalls and routers include features to prevent TCP/UDP floods. Also, make sure that logging is enabled in all your devices and that you can reliably examine them to identify attacks and if needed, turn them over to law enforcement authorities.
  • An intrusion-detection/prevention system (IDS/IPS) can detect the misuse of valid protocols as attack vectors. Depending on the products and your network configuration, it’s possible to automatically block the attack traffic.
  • Get help from your provider. This way, attack traffic can be blocked closer to its source before it can clog your organization’s bandwidth.
  • You should have an incident response plan in place and be ready to activate it. If an attack comes, everyone should know how to respond and who to contact both inside and outside the organization (law enforcement for instance).
  • Ensure that you have means of communicating with your users and/or customers. Be as honest and forthcoming as you can about the incident.

Read the rest at Attacked by Anonymous: How to defend against a denial-of-service | TechRepublic.

Google hacking 2011

An interview with Johnny Long, “regarded as a leading authority on Google hacking. Between his speaking engagements and returning to Uganda, Long found time to straighten out my misperceptions”.

via Google hacking: It’s all about the dorks | TechRepublic.

1st impressions of Motorola Xoom: 5 quick insights

Takeaway: The Motorola Xoom is more of a PC replacement than the iPad, but it still has some frayed edges that need to be evened out before most early adopters will want to jump on board.

via First impressions of the Motorola Xoom: Five quick insights | TechRepublic.

10 things network admins need to know about Windows Phone 7

You’ve probably heard that Windows Phone 7 is not really a good option for deployment.   Here’s an article that explains why…  And here is one striking point:

8: It’s really a consumer device

When you read about the missing ActiveSync policies, you might have wondered why so many policy settings aren’t supported by Microsoft’s latest mobile operating system. Microsoft’s official answer to this question is that Windows Phone 7 was developed primarily as a consumer device, not an enterprise device. However, Microsoft hints that more enterprise features may show up in future phone updates.  [Emphasis mine – jm]

Given the poor perception of Microsoft in the consumer realm (at least in my opinion),  it would have seemed better to drive consumer demand via enterprise deployment.

via 10 things network administrators need to know about Windows Phone 7 | TechRepublic.

Google Search over SSL has an oops

According to Google’s Web Search Help blog, the search giant has decided it’s important to keep search inquiries from the prying eyes:

“With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.”

TechRepublic’s Chad Perrin recently penned an article about the benefits of SSL-encrypted Web searches. He also advises caution as some searches are not protected by SSL encryption and under certain circumstances SSL is vulnerable.

via Google Search over SSL has an oops | IT Security |

20 ways to detect computer malware

Here are two lists of malware detection tools from Jody Gilbert at TechRepublic:

10 ways to detect computer malware.

10 more ways to detect computer malware.

Our Vulnerable Infrastructure

The fiber-optic outage—actually sabotage—in the Bay Area on Thursday reveals a dirty little secret: Our infrastructure is ridiculously vulnerable and it only takes a few vandals (or terrorists) to bring communication to its knees.

While it’s unclear what exactly happened, AT&T is offering a $100,000 now $250,000 reward to find the vandals that cut into fiber optic wires and whacked everything from hosting centers, 911 calls and other communication. Sam said it best: No matter how advanced we get we’re still hooked up to a big wire somewhere.

That’s not going to change. The big question: How are we going to protect those big wires?

via Jason Hiner at AT&T fiber outage shows how easily attackers could wipe out our communications | Tech Sanity Check |

%d bloggers like this: