Posts

Showing posts from February, 2020

The biggest ransomware threats

magine opening your laptop one morning and discovering all your documents and photos are encrypted — but not by you. A message on the screen in broken English demands a ransom to unlock your files. It's a horrifying scenario that is far too real for many people. In the past few years, ransomware attacks have increased with the growth in the use of digital storage over physical record keeping for critical documents and treasured photos. Take a look at the history of ransomware, how it impacted users in the past year, and what you can expect in the future. The basics Ransomware is a type of malware designed to hijack computers so hackers can force victims to pay a ransom to regain access. It can infect your computer when you download an innocent-looking email attachment or visit a website that surreptitiously executes malicious code that ultimately encrypts critical files or denies access to the computer. The two main forms of this malware are currently widespread: Blocker ra

Accessing Windows 10 Boot Manager

Accessing Windows 10 Boot Manager If you have trouble accessing the Boot Manager during your computer's startup process, you can access the Windows 10 Boot Manager through your Settings menu after your computer loads your default Windows installation. To do this, click the gear for "Settings" inside your Start menu, then click "Update & Security" in the window that appears. In the menu on the left side of the window, click "Recovery," then under the "Advanced Startup" heading click "Restart Now." Your computer will restart and give you access to the Boot Manager. Boot Manager on Windows 8.1 You can also access Windows Boot Manager directly through your Windows 8.1 install by following roughly the same procedure. From your Start menu, open "Settings," then click "Change PC Settings." Open the "General" settings menu, then click "Restart Now" under the "Advanced Startup" headi

Software Development Security

The software development security domain focuses on the systems development life cycle (SDLC) from system conception through its design, development, deployment, operation, and eventual retirement from service. Information security and privacy professionals must be involved in all phases of SDLC to ensure the overall effectiveness of security controls and that privacy concerns are addressed. The proliferation of personally-owned mobile devices (e.g, smartphones, tablets, and laptops) as well as the wide variety of vulnerable mobile apps creates a higher risk of exposing confidential and business-related information in the workplace. This can occur when such information is stored on personally-owned devices. Cyber-attacks often exploit the vulnerabilities inherent in applications and operating systems. That is why frequent updates and patches to software are necessary. Additionally, special care must be taken when developing internal Web applications that are externally accessed th

What Is the Purpose of a Router in a Network?

When a router is connected to a modem, all of the computers that are connected to the router, and subsequently accessing the Internet through the modem, are part of the network. One router can connect nearly any number of computers, from a small home network of two or three machines to a large network of hundreds of servers. A router essentially acts as a gateway between two networks. It has two main purposes. First, it makes sure data is directed to the correct destination, such as an email being sent to the correct Internet provider and recipient. Second, the router prevents data from going where it is not permitted, such as a large file being distributed to all machines on a network and crippling network performance. Router Security The router acts as a buffer between the network and the modem. The router is not just a physical barrier for the Internet signal to pass through, but it also can have software security to diminish the risk of viruses or other malware. Read more :

NTLMV1 OR NTLMV2? DOES IT EVEN MATTER?

NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. Basically, even the most recent Windows versions support NTLM and even Active Directory is required for default NTLM implementation. The NTLMv1 protocol uses a TNHash or KM hash (depending on configuration), in a challenge/response method between the server and the client. NTLM authentication flow: The user machine sends a request to connect to the server. The server generates a random nonce to be encrypted by the user. The user machine encrypts the nonce with the password hash to prove knowledge of the password. The server validates the users’ identity by ensuring that the challenge was indeed created by the correct user password. It does it either by using data in its own SAM database or by forwarding challenge-response pairs for validation in the domain for more information :  lm authentication

Cracking User Passwords in Windows 2000

For years, Windows NT administrators have used L0phtCrack 2.5 to obtain users' passwords in their domain. But, if you’ve tried to use this tool on your Windows 2000 domain controller, you know that it doesn’t work. However, you can use L0phtCrack to crack the passwords for user accounts in your Win2K Active Directory (AD) domain. Although you might be familiar with using L0phtCrack on NT, note that the process has changed in Win2K. Because passwords are the fundamental lock on your systems, it is a good practice, provided your management approves, to regularly assess the quality of your users’ passwords and provide feedback to users who select easy-to-guess passwords. Without such a program, it is a foregone conclusion that users will pick simple passwords such as repeating characters, simple words, and spouse names. Win2K provides the same minimum password length and password complexity rules as in NT. To view these settings, go to the Account Policies section of your Default D

How to Enable Client for Microsoft Network

Microsoft Networks Client is a software feature that you must attach to a network adapter to use that adapter to connect and log in to a network helmed by a computer running a Windows Server operating system. Windows enables the Client for Microsoft Networks automatically. However, if you connect your computer to a Microsoft network and do not receive a login window when you turn on the computer, the client could be disabled. You can enable the Client for Microsoft Networks in the properties menu for that network adapter. Step 1 Click the Start button, and click "Control Panel." Step 2 Double-click the "Network Connections" icon in Windows XP or the "Network and Sharing Center" icon in Windows Vista and Windows 7. If you cannot find this icon, you may have your Control Panel displayed in the category view rather than the detailed view. Click "Switch to Classic View" in Windows XP, "Classic View" in Windows Vista and "View by

A kingdom of proactive LAN management

Local area networks (LAN and Wi-Fi) are decisive factors in the ups and downs of IT performance, alongside the computer center. But running the LAN infrastructure requires considerable staff and financial resources. T-Systems takes over this task on request and guarantees success with its SLA (service level agreement). This arrangement gives companies security and facilitates a high-performing company network IT employees can breathe a sigh of relief. With managed LAN services, T-Systems takes over all tasks around the active components of the company network. T-Systems configures ports and Wi-Fi access points. As well as this, the managed service contractor provides the necessary hard- and software, including IT services. Services like proactive monitoring and technical reporting are of course also included in the agreed all-round and care-free SLA service. Cloud services are also growing in significance. T-Systems has recognized this and offers a network solution controlled comp

How to Invert Colors on Microsoft Office Picture Manager

Microsoft Office Picture Manager manages and edits digital pictures. This program includes "Hue and saturation" settings that allow you to adjust the color on a scale. Click and drag the slider on the "Amount" or "Hue" scale for a custom look. Saving this edited file as a separate copy from the original keeps the original file intact for reference. Step 1 Open the saved picture file in "Microsoft Office Picture Manager." Step 2 Click on "Edit Pictures" on the Formatting toolbar. Step 3 Click on "Color" in the "Edit Pictures" pane to the right of the picture. This pane includes "Hue and saturation settings." Step 4 Click on the "Hue and saturation settings," such as "Amount" or "Hue." Click on the slider to achieve the desired effect. You can also enter a value in the settings text box. Step 5 Save this file as a copy with a file name different from the original

Domain: Security Management

The first domain I’d like to discuss has more to do with people and processes than it does with computers. Security management is one of the most overlooked domains, which I think is a shame because almost nothing we do in the other domains means anything without it. Security management is made up of several tasks: Risk assessments, which is the process we use to identify risks to the organization and systemically identify methods to combat those risks, usually relying on input from experts in the below domains Overseeing the processes for other security functions to ensure those align with business/operations processes Change management processes and procedures in place User security awareness training find more :  lm security

How Networks Need to Evolve

As organizations demand more agility in their network structures to support new and improved digital strategies, network operators are having trouble keeping up. The central issue is this: Complex networking structures aren’t easily manipulated into making dynamic changes. Why? Because agility hasn’t traditionally been baked into the infrastructure. Virtualization has delivered that capability. But virtualization alone isn’t the answer. There’s a lot that comes with the improved performance, namely specialized teams that look beyond basic hardware speeds and feeds — and toward software and automation. We will take a look at some of the driving factors that are shaping modern networks, as well as solutions to the associated challenges. The technologies evolving through this process are more advanced than ever before, and understanding how it works is vital if we are to stay up to speed with the latest developments. Read more :  lans property management

Components of a LAN Network

The components used to establish a local area network (LAN) have a variety of functions. The common unifying theme among them is that they facilitate communication between two or more computers. LAN components are configurable in a variety of ways, but a LAN always requires the same basic components. Network Cards At the most basic level, a network card is a component that allows the computer to communicate across a network. This component is frequently built into the motherboard of today's computers, but it can also be a separate card for use in a PCI slot, or part of an external unit that connects to the computer via a USB port. Network cards are further categorized according to whether they operate on wired or wireless networks. However, some cards do support both wireless and wired networking. Network Cables Network cables are the physical lines used to carry information between computers in a wired LAN. The cables are labeled by their category and are commonly referred

Types of Network Software

Network software, which operates over a network rather than on an individual computer, may perform tasks that supplement, enable or replace end-user software. Network-based antivirus software supplements desktop antivirus software. Network messaging server software enables end-user computers to send instant messages back and forth. And server application software, such as Customer Relationship Management software, replaces end-user contact management software. All network software shares the common goal of increasing productivity and improving security for network users. Although computer networks began to emerge in the 1970s, network-based software did not begin to spread widely until personal computers became commonplace in home and office settings in the late 1980s and early 1990s. However, the advent of the visual browser for the Internet in the mid 1990s marked the true turning point for network software because it effectively changed the definition of network from a tool usefu

LAN Vs. Ethernet

Technology terminology can becoming overwhelming. With complicated acronyms, proprietary names for generic technology and the sheer pace of innovation, keeping up can be tough. The language of networking is no exception. The array of terms can make even simple concepts seem complex. Understanding the difference between LAN and Ethernet is one of the first steps in separating out all the computer-speak. Definitions A local-area network, or LAN, is a network that works over a small distance, typically within one building or campus. Ethernet is a type of networking protocol used on a LAN. History Originally, networks allowed computers to communicate with each other over short distances. LANs ran on protocols such as Arcnet and Token Ring. Ethernet was developed as a more-efficient protocol to use in a LAN. Features Sending data across a wire to another computer over a LAN requires that the computer send electronic signals through a network interface onto a wire. The signals go d

Focus on these Areas for a Secure Network Design

Physical Security You might not chart physical security on a technical diagram, but physical security policy needs to be as specific as possible and communicated broadly – especially when the policy changes. Organizations should set terms for accessing physical assets (stationary like servers or mobile like cell phones and tablets). Policy documents should be tailored to those employees that have a need to access the hardware. Non-eligible employees should be alerted by emphasizing consequences for non-compliance. Technologies that enhance physical security include RFID cards, premium locks, fingerprint reading devices, PIN pads and retinal scanners. Management may need to be advised that the company should not skimp on purchasing quality devices to enhance physical security. Not to be overlooked: Any physical protection guarding sensitive areas around servers that hold critical business data. If servers are off-site, the facility should provide documents containing their most

What security threats are associated with network infrastructure devices?

Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices: Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts. Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance. Owners and operators of network devices often do not change vendor default settings, harden them for operations, or perform regular patching. Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor. Owners and operators often overlook network devices when they investigate, loo

NetAdmins versus SysAdmins: What’s the Difference?

In this type of environment, you’ll be a sysadmin, netadmin, and security administrator all rolled into one. As organizations grow and decentralize, the complexity and scale of the infrastructure lead to specialization of the administrative roles. It’s not uncommon to see four separate roles emerge: Systems administrator Network administrator Database administrator Security administrator Search for job descriptions for sysadmins and netadmins, and you’ll see quite a lot of overlap. Although it’s fair to say that there are skills and knowledge that are common to all IT roles, there are also real distinctions, especially as you get into more extensive infrastructures. Systems Administrator  Systems administrators typically deal with the computing resources in the infrastructure — servers and desktops, and the services and applications that run on them. They are responsible for installing OS and software updates, executing backup and recovery operations, managing authenticat