วันพุธที่ 31 มีนาคม พ.ศ. 2553

Like Cinderella, the password of your friends' Facebook, MySpace, Twitter runescape, Gmail, etc.

In this video I show how runescape password qualityupload.com friends' to something like Facebook, MySpace, YouTube, Twitter, Gmail, Yahoo, Hotmail, for World of Warcraft, and literally everything else. You could also ask your friends "PlayStation Network or Xbox Live forget! All you have to do is run the program I've lost, they lied! In it on your computer. Voilà, here, now you have your user name and their password to access everything, was farFirefox, Internet Explorer or a program like Outlook or a game. Here is the link to the program: Tags generator.cctfiles.com /! \ Microsoft Internet Explorer, Windows and Windows / IE logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and / or other countries. Microsoft Corporation in no way supported or affiliated with any other products mentioned are trademarks and / or registered trademarks of their respective companies. Diagnosecomputer problems, disable the automatic restart of spyware. Fastest boat. Increase Systems Performance to regain the resources Microsoft, Windows, hack, trick, network, repair, troubleshoot Make your computer faster. Using MSCONFIG to speed up your PC. Make your computer load faster. Diagnose computer problems, disable the automatic restart of spyware. Fastest boat. Increase Systems Performance regain resources How to make "Start Menu" menus to open real fast! XP Hack Change your start menuGet ...



http://www.youtube.com/watch?v=RoDSbtRHEeU&hl=en

วันอังคารที่ 30 มีนาคม พ.ศ. 2553

1 / 4: OSI archetypal affection for Cyber Security Act CISA and CISSP candidates

The OSI seven reference tutorial for beginners and CISA CISSP candidates. en.wikipedia.org The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is a layered abstract description for communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI), the initiative was launched. [1] In its simplest form, divides network architecture into seven layers, from top to bottom, are the application, presentation,Session, Transport, Network, Data Link and Physical layers. E 'often referred to as layer OSI model Seven. A layer is a set of functions that are conceptually similar services to layer above it and receives services from the layer below. In one case, each layer provides services for instances of the higher level of service required by the layer below. For example, a level that provides error free communication over a network provides the necessary pathquestions about her packages when she next lower layer to send and receive the contents of the calls route. Conceptually, two instances on one layer are connected by a horizontal connection protocol at this level.



http://www.youtube.com/watch?v=42J3p2VGzcA&hl=en

วันจันทร์ที่ 29 มีนาคม พ.ศ. 2553

Strong Passwords - Customer Friendly Computer Security

Going to an office and look under the computer keyboards and in the end there is a small piece of paper on which the login ID and password. Probably everyone has forgotten the person.

This shows a serious problem with the use of networked computers to the economy. User apathy and arrogance, information security is often combined with the aim of defeating the security policies established.

What happens is that IT security policies clash with usability.Most customers do not follow the policy, were too difficult. A place is IT policies and compliance of users at the time of the collision transfer to a secure computer system. The login screen.

Let us first agree on a definition of a strong password.

From Webopedia, a password that is difficult to recognize the human data and computer programs, effectively protect against unauthorized access. A strong password consists of at least six characters (and characters rather thanThe stronger the password) that a combination of letters, numbers and symbols (@, #, $,%, etc.) are admissible. Passwords are usually case-sensitive, so a strong password contains letters in uppercase and lowercase letters. Strong passwords do not contain the words found in a dictionary or any part of the name.

Customers do not have the passwords difficult. Sorry, just will not! For example, you have two passwords: 1XC% & 27m3 and parrott5. What is the strongest? WhichContinue to use your customers?

The key is education. End users should be educated to the seriousness of computer security and IT security professionals should be aware of the needs of its user base.

You should avoid passwords sequential parrott1, parrott2, parrott3 ... You should use a password that is easy to remember, but not the use of a dictionary. Maybe combine parts of two words with capital letters and numbers.

IT SecurityProfessionals may not like this compromise, but it is better than passwords that are easily broken.

Strong passwords are for the security of computer security, but they are the best way to control access? In the second part we will do our alternatives to passwords.

วันอาทิตย์ที่ 28 มีนาคม พ.ศ. 2553

Eagle Eye - Eagle Pass, Texas - UC San Diego

28. June 2006, Eagle Pass, Texas - University of California, San Diego (UCSD), the engineers of today present a new large area, multi-, camera computer vision system for control of a key US-Mexico border crossing between Eagle Pass , TX and Piedras Negras, Mexico. The prototype system will be used to deter and detect criminal activities and to ensure a smooth flow of traffic around the Camino Real International Bridge, which crosses the Rio Grande and serves as a trading route between Texas andMexico. The Camino Real is a toll bridge operated by the City of Eagle Pass, and after an event for the city and state officials 10 up to 12:30 clock and tutorial for police officers in the late afternoon, the police began to Eagle Pass use the system to the critical place and look under the bridge. Top: Omnidirectional and pan-tilt-zoom cameras the police give a wide area of the regions around and under the bridge Camino Real. Bottom: computer interface allowsPolice to consider selecting the most capable and zoom in on an area of interest. The video surveillance system, called "eagle eye", was developed by UCSD electrical engineering and computer science professor Mohan Trivedi and his team of students and researchers.



http://www.youtube.com/watch?v=fAdBjDIWUpM&hl=en

วันเสาร์ที่ 27 มีนาคม พ.ศ. 2553

Cisco CCNA 640-553 Security Secure Network Management

Cisco CCNA Security Training for Exam 640-553 Implementing Cisco IOS Network Security (IINS). This 10-minutes from the video clip full length on Secure Network Management and Reporting. Our complete computer-based series of training videos on safety Cisco CCNA preparation to full pay and security Cisco CCNA 640-553 Implementing Cisco IOS Network Security (IINS) exam. For more information, including full length videos for free, visit online at www.palaestratraining.com



http://www.youtube.com/watch?v=WH25FH05zjc&hl=en

วันศุกร์ที่ 26 มีนาคม พ.ศ. 2553

วันพุธที่ 24 มีนาคม พ.ศ. 2553

President Obama on Cyber Security

The President made his plans to ensure the digital future America. 29. May 2009. (Public Domain)



http://www.youtube.com/watch?v=wjfzyj4eyQM&hl=en

วันอังคารที่ 23 มีนาคม พ.ศ. 2553

There is no privacy?

Annie I Anton is a professor of computer science department at the College of Engineering at North Carolina State University (NCSU), where he is Senior Research Fellow, Ethics for the period 2006-08 and a member of the NCSU Cyber Defense Lab in 2008 , presided at the NC State Public Policy Task Force. His research focuses on methods and tools for the specification of complete, correct behavior of software systems deployed in environments that there is a risk of loss due to errors to supportand abuse. These include Web and e-commerce systems, in which the security of personal and private information vulnerable. • For more information visit Annie I. Antón, please: www4.ncsu.edu • For a complete copy of the video, please visit: ncsu.edu



http://www.youtube.com/watch?v=s0LYs3Ak-iQ&hl=en

วันจันทร์ที่ 22 มีนาคม พ.ศ. 2553

Protect yourself and your PC - Use Anti-Virus Software

There are very few manufacturers who provide a wide range of security software, virus, worms, malware for the fight against spyware, phishing, software and other threats. Kaspersky Anti-Virus 2009, Norton Antivirus 2009 and BitDefender Anti-Virus 2009 are three of the most commonly used anti-virus available.

Norton Anti-Virus 2009 is not only a platform for anti-virus total, which includes anti-spyware. Norton Anti-Virus 2009 can be set quite easilyIt protects your PC very well. Previous versions of Norton Anti-virus more of a burden on the resources of the PC, so that your PC is slow. The latest version is the inclusion of Norton rave reviews from the faithful, marveling at the ease of use and increase speed.

Kaspersky Labs Anti-Virus 2009 is a full-featured anti-virus and anti-spyware software features that is completely configurable.Kaspersky Anti-Virus 2009 does its job very well and is very easy to use once you have installed. Another advantage is that in previous versions of Norton Anti-virus for comparison, is easy enough for the system resources of the computer. Kaspersky Anti-Virus 2009 is very good in the tests from places like ZDNET observed for anti-virus. Some end-user feedback is that Kaspersky Anti-Virus 2009 can be a complex plant and the lack of an efficient customer serviceDepartment.

Overall, BitDefender Anti-Virus 2009 is a great choice. It does not require much resources in the computer system to run, and does not require most of the end user, all the while offering all the functions and features you need. Their technical support team, either by phone or via chat very accommodating and competent. It 'also a great offer, because it is so convenient, especially considering all the built --Flexibility and functionality you get for the cost.

Remember to protect the best way to obtain private information and your computer is equipped with a full-featured anti-virus, which is supported by a reputable company and go straight a few guidelines to follow to choose the installation.

วันอาทิตย์ที่ 21 มีนาคม พ.ศ. 2553

Home Computer security is vital

It 'important to have the security of home computers for the computer. There are many hackers in the United States and in many other countries that feel the need to hack into other peoples computers and stealing their information illegally.

They may steal your confidential information and corporate resources from your home computer. There are some basic things you can do to make your home PC from harmful threats. To make the first and most important thing toProtect your computer and information from hackers and other potentially dangerous impostor from online threats is to install anti-virus programs on your PC.

Sure they are always running. Do not recognize anything that is suspicious. This security software usually catch the virus or threats before it happens. The computer could crash immediately if a virus has struck. Viruses can interrupt any part of your computerSystem, including your e-mail, programs, or your entire Windows operating system.

It is important to install anti-virus protection software on your computer at home to maintain the security of your PC.

Another important thing to make sure it is turned on and installed a firewall. Normally has an XP operating system, but better can be found free on the Internet. A good firewall is blocking not only block inbound threats, but alsono malicious program sending data packets from the PC.

Some anti-virus or Internet security suite may have a firewall as part of the suite of protective measures. If that activate them, and disable the firewall in Windows XP. There are many hardware firewall for the purchase of software or hardware stores may occur, or as part of a device on the router. They can also be installed next to the firewall software already on your system.

Through moreas a deterrent, security, therefore, provides multiple layers that make it more difficult for the security of your system to penetrate. Place the device no longer an anti-virus software because it can cause lead and / or cause system conflicts and security of PC malfunction.

Another link in the chain of security is to ensure that your Windows runs properly at all times be constantly updated. It 'important to have all / recommended updatesinstalled on your system. Microsoft brings new software and operating system updates on a regular basis to ensure your IT systems secure and running optimally.

To ensure that you do not forget to look for these updates to the Windows operating system is an option that these updates can be installed automatically. In my opinion, and in many cases, this is the best option. The computer download and install updates to the system to a requestperiod of time specified by you. It is possible up to this night while you're in bed, so that they can not interfere with normal computer.

There are many simple steps you can improve safety in the home computer. Make sure that you will take the necessary preventive measures to protect the entire operating system and measures to protect your personal information from hackers, spyware, phishing attacks and virus.

As you can see if you have a PC at home orLaptop computer and use it online, assistance at home, computer security is of vital importance that information confidential to protect and maintain the overall security of systems.

วันเสาร์ที่ 20 มีนาคม พ.ศ. 2553

Accelerating IT application MSCONFIG

This is the way to msconfig a fast computer. Virus repair Virus removal WinAntiVirus strange computer cases Security Center Computer Repair Computer Security Computer Security Fraud generalized News Microsoft Support Win 9x and ME Support Windows XP Support Windows Vista Windows 2000 Pro / NT Workstation Support Windows NT/2000/2003 Server Microsoft Office on the Internet promoting Explorer Forum Alternative Computing Linux Support Mac Support Other Operating systems Mozilla / FirefoxOther Browsers Hardware Support Motherboards, Bios & CPU Hard Drive Support Removable Media Drives RAM and Power Supply Support Sound Cards Case Mod Driver Support Video Card Support Printer Support Laptop Support the creation of additional hardware support Forum Networking Support Modems Network Cable / DSL / cable and satellite network cards and protocols Routing File and Application Sharing Security and Firewalls



http://www.youtube.com/watch?v=a2EVjV9Tqe4&hl=en

วันศุกร์ที่ 19 มีนาคม พ.ศ. 2553

Easier to understand, IP surveillance cameras

Security cameras are the modern solution to ensure security in your home or office. Computer Security cameras are very cheap. For people who have a limited budget and do not want to spend much on security camera, security cameras is a good choice. Most computers, security cameras for home security.

Technically, the sending computer securityImages on a hard drive with a DVR. The problem of computer security camera product varies depending on the camera. Taking up space on your hard drive is one of the most important questions of security camera on your computer. A security camera on your computer hard drive fills up very fast, because it generates lots of files. However, there are ways to reduce this problem. Computer security camera is easy to use than traditionalSystem of video tape.

If you opt for an adequate computer security camera, then you should go for the webcam. Web Cam is both accessible and easy to use. Web-Cam is used for the general supervision of a place. But the disadvantage is that it requires a good lighting conditions. In dim light may be ineffective and webcams offer low quality. But the money is for people conscious Web Cam is a good choice. Of course, with a security camera cheap as less$ 100, you can not expect great performance.

Web-Cam is very easy to install. Who can have a general understanding of the computer has installed a webcam. Web cam installation requires you to connect the device with a USB port, setup and software installation. It takes just minutes to install a web cam. The advantage of the Web cam is, if you are not at home, allows you to scan later in the images. Web-Cam also has a function e-mail alert service can be activated to take over theImages. And, if necessary, you can send photos to the police.

Other types of computer systems security camera IP security camera. IP surveillance cameras provide better picture quality and coverage as a web cam. IP surveillance cameras are also very easy to install. The price varies depending on the degree of coverage and image quality. But you can use IP cameras for less than $ 100 received, too. IP cameras can be accessed from a remote locationInternet. These cameras can be connected to the network and can be accessed from a web browser. Additional IP cameras can be added to the computer if the computer has enough memory.

There are many security cameras on other computers with advanced features. Diese erweiterten Kameras verfügen über viele Funktionen wie Zahlen der Anzahl der Personen, ging in schnellere Ihnen vor Ort oder Geräte, die nach der Bewegung zu haben SchnappschüsseDetector finds a certain movement. These cameras are the creation of many different things to monitor the situation. But these cameras are a web cam and IP network cameras [http://www.sunsecurity.com/ security cameras-c-119.html expensive]

วันพุธที่ 17 มีนาคม พ.ศ. 2553

3 tips for removing spyware from your computer for free

The computer is the portal of the Internet. It allows you to talk with friends via e-mail or Instant Messenger to be able to play the games to educate or even for yourself or your children. However, the computer is at risk the minute you surf the Internet. All kinds of ugly files from spyware, adware, malware on computer viruses are lurking on your computer, all of which are attached to your knowledge. I'll give you three simple tips to follow to allowrepel and remove spyware infections from your computer.

Tip # 1 - My first suggestion is to practice safe browsing techniques. It seems obvious, but one is tempted to visit these Web sites offer downloads and goodies for free. Most of the time they have a price, the infected files in the same area download.

Prevent the spyware file so that you downloaded to your computer first, not only as a legitimate download files or programs from safe andTrusted sites. If you're unsure, then make sure you have the latest browser installed on your computer. Preferably, you should with Firefox, because it can tell you when you visit on a possible "shadow" website.

Tip No. 2 - You should make sure that you are an anti-spyware program that has a guard of content online poll anti-spyware programs, spyware programs are removed to eliminate the serious infections, but this is all that can be removed after the infectionoccurred.

The best way to combat spyware, the amount of infected files, limiting the ability to infiltrate the computer. As this article will help you get rid of spyware free, so I can recommend two products at the time of writing. The first program is Spyware Doctor. The free version does not protect a decent line. [The payment for the version is slightly better, but the free version is] a very good product in itself. The second program is Spyware Terminator.You just need any of those two.

Tip # 3 - My last suggestion, will be held regularly from your computer with any anti-spyware scanning software in use. Be sure to regularly update your anti-spyware definitions for existing file so that the anti-spyware program you can find the latest spyware, published, is to attack your computer.

How do you carry out regular anti-spyware program is, how the computer. Once a week is fineIf you use your computer often, but not to excess. Personally, I use a scan every 2 days when I have my computer every day. My computer is pretty clean.

If you use a Macintosh or Linux-based, it is almost impossible to stop spyware from infecting your computer. However, obtained from the above suggestions can reduce the number of infectious spyware files on your computer's defenses and wreak havoc too.

วันอังคารที่ 16 มีนาคม พ.ศ. 2553

Do-It-Yourself Wireless Home Security

For maximum safety of your home, you should get a wireless, because it gives you all the protection they need, without all the problems of previous versions.

Wireless vs Non-Wireless

Wireless Home Security has many advantages over older systems.

With wireless home security, real estate that is not already an alarm for the effort to make holes in the walls and carpets pulled up to avoid at all cable wiring and installation of otherUnknown components. If you do it, it will also save you time.

Each wireless home security do it yourself "is easy to install, and protects your home like any other security system. Motion detectors placed near the windows and doors, radio waves used for intruders sense. In short, this is to work like most wireless security systems.

Devices that are actually there, even illuminated keyboards that you take with you wherever you go. While it is possible everywhere, the mostrecommended to be placed on the front and rear doors, because they are the most frequent entries and exits. When someone enters the house, leaving a silent alarm. And for a short period, you can insert a code to disarm them. But the intruders do not know, and when the time expires, the system sends the authorities will be informed accordingly.

Wireless home security systems can be purchased almost everywhere.

You can use a wireless security at home "do it yourself, get and set it up yourself,or you still have the option to buy the kit and after him, by traders who know where everything will be able to get the most from your wireless home security ought to be. Obviously you need the system to function properly, otherwise you will just waste of money and they always need a security system.

Because you can take the wireless kit, you should be able to easily control the lithium batteries. Do this regularly, as youto ensure that they function properly.

And because the protection of the family is a priority, this is a must!

วันจันทร์ที่ 15 มีนาคม พ.ศ. 2553

Electoral fraud in 2008 - Corporate Control & Security-vote

FBR offers a look of electronic voting fraud and vote suppression 2000-2008 and what should we do to stop companies control of the voting booth, to defend the integrity and electoral reform to bring our most important franchise. Rebecca Mercuri, Ph.D., Computer Electronic voting expert, Penny M. Venetis, a law professor at Rutgers School of Law, Newark, NJ, and Mark Crispin Miller, professor of media, culture and communication at New York University and author of Loser Take All: Election fraudSubversion of democracy, and 2000 2008 to discuss vote counting technology, election fraud, disenfranchisement, voting mirrors, abuse, hacking, and the DRE voting machines now in use throughout the country and why we must repeal the Help America Vote Act



http://www.youtube.com/watch?v=wTLD-_-aSjM&hl=en

วันอาทิตย์ที่ 14 มีนาคม พ.ศ. 2553

Free Computer Health Check

The format of the Free PC Tune-up has changed. It is now easier to use and is a great unique site to visit and test your machines health, configuration and performance.

Previously he only works with Internet Explorer because the tests used ActiveX technology, but now can also be used with Mozilla, Firefox, Opera and use a simple plug-in, to Meadco, neptunium, which can run the ActiveX develop other browsers.

Neptune is a free download,Although you must provide your name and e-mail before downloading. Neptune can be downloaded from meadroid.com Please read the page to help ensure that you do not meet all the problems.

Neptune is a very small download of 140Kb, it is not spyware, adware or malware includes all types Once installed, you can test in other browsers with the plugin of Neptune. Sure to use the page as a bookmark for future trials.

Once you are on the page you will find notgrade, the Back button on your browser to use, you must right click and select Back, and this is confirmed by the tests and results at the end. If you use the browser's back button to return to the main page.

To test, click Start Free PC Health Scan - Overdrive. When you register an account yet simple, or you can opt for an account or scroll down the page and run the tests anonymously.

Tests only a few minutes and are 100% secure. You will be prompted to installthe usefulness of scanning, you must agree to carry out the tests after the next time you have the option of an account that is useful for comparison when you create reused.

When you click Create anonymous have an account, then click on "Los geht's!" and then sit back and run the test. Will check the status of the PC, installed software, malware scan, and Drive Performance health. And then run a ping to download and upload Internet CalculateSpeed. If you are at "Almost There!" Hand, the information is optional.

There will also be presented with the results, along with several suggestions to improve your computer performance. Driver Updates are not currently supported, but the driver is a link to each page, allowing you to downlod the latest update manually

วันศุกร์ที่ 12 มีนาคม พ.ศ. 2553

Cold War Computing - The SAGE System

SAGE (Semi-Automatic Ground Environment) system was designed and built in 1950 to defend against the threat of a Soviet bomber attack the continental United States. The system has been strongly influenced by the design of the Whirlwind II computer with the flu (which was never completed). IBM designed and built the computer AN/FSQ-7 in the heart of the SAGE program, with companies like Western Electric (which resulted in your defense) were the miter Corporation and System Development Corporationeven more entrepreneurs in the sector for the project. There have been more than twenty SAGE plants in North America is the connection between the hundreds of radar stations, air force wings of fighters and anti-missile defense sites in the first large-scale computer communications network. The SAGE system was decentralized, and it would be a device to operate, even if other sites were to continue with disabilities. As the threat of a Soviet attack bombers moved long-range nuclear missles in 1960, the SAGE system was lessof strategic importance. But it remains part of system operation in the early 1980s. This film explains the threats to national security during the 1950s and '60s that the sage was built to defend, show the SAGE computer and network operation and simulates how Sage would react to an attack against the United States.



http://www.youtube.com/watch?v=06drBN8nlWg&hl=en

วันพุธที่ 10 มีนาคม พ.ศ. 2553

Digital Security Cameras

Today, digital security cameras are increasingly used in our society, homes and offices. Small in size and easier to install, they give sharper images.

Different models of digital security cameras are available in the market. They include wireless digital security cameras, color digital pen-type mini cameras, security system with indoor and outdoor cameras, security first fas-1248, pelco digital security cameras, and e-mobile-cameras. Wireless digital cameras are smaller, light weight and professional quality devices. They have higher sensitivity and saturation signal. They are powerful and easy to install and operate. Color digital pen-type mini cameras have multifunction software, USB cable, tripod and AAA batteries. Security first fas-1248 cameras have 14 inch black and white monitor with built-in real-time quad processor. Pelco digital security cameras have a compact body style. They have digital signal processing and auto white balance. E-mobile-cameras are digital security camera systems for vehicle, retail or secret use. They store up to 32 digital images. Their typical applications include installation in vehicles such as taxi's, delivery vans, ambulances, police cars or use in small shops and restaurants.

Black and white security cameras are inexpensive cameras that work well in high and low light conditions. Color security cameras are also inexpensive but they work only in general working light. Covert security cameras are so small that they cannot be easily seen. They can be concealed as a different device (such as smoke detector, clock or teddy bear). Day/night security cameras switch from color to black and white depending on lighting levels. They are ideal for variable lighting conditions. High-resolution security cameras have extra light sensors on their digital chips. They increase the effective image quality. These cameras are effective only with high-resolution monitors. Infrared security cameras have their own light source in a light spectrum that can?t be seen by the naked eye. These cameras are good for small areas with no light. Outdoor security cameras have hardened, waterproof outer bodies. Vandal proof security cameras come in hardened cases that can resist the toughest physical abuse.

วันอังคารที่ 9 มีนาคม พ.ศ. 2553

Computer Security - Why it Is Crucial to Backup Now

Most computer users sit and hope every day; simply because they need to backup now. The hope they have is that their computer will not crash because if it did they would lose hundreds if not thousands of files, photos, images, emails, letters and the list goes on - does this situation familiar to you? If yes then you need to backup now to ensure that if the undesired happens you have not lost all those thousands of files and you can save yourself a lot of lost work, a lot of time and a lot of stress. You may now be asking yourself do you need the stress of a backup solution to save the stress that may not occur.

The answer to do you need to backup now is yes, and the correction in the above question is that backing up does not have to be stressful, confusing or complicated and you can now backup your entire data and software in literally the click of a button. This is a reassuring factor for those of use that are not so electronically minded and can speak the geek lingo when it comes to computers and software, but also a benefit to those that can as it will allow you to speed up the backup process, regardless of who you are and what skills you have there is the benefit that you can backup now and it can be easy.

So, now we know why it is needed and how we can do it let`s look at the best software to make things easy when you do backup now. With so many different backup solutions on the market it can be difficult to decide what is best for you, I always believe that it is better to go for a software that you will reap the most benefits from, not necessarily the one that has the most benefits. Personally, a backup solution with endless options, menus and buttons would not benefit me - there would be a vast number of benefits in the software, but not having the ability to use them would prevent me from receiving those benefits - so what do we do in order to be able to backup now and benefit.

วันอาทิตย์ที่ 7 มีนาคม พ.ศ. 2553

Building Security vs Information Security

Most companies hire highly paid computer security professionals who spend hours and hours a day configuring access policies and patching computers. Then they turn around and hire a minimum wage security guards to protect their millions of dollars worth of computer equipment. This isn't even counting intellectual property and their database of customers and names. If a hacker has been hired to hack you which path do you think he will take to steal company secrets? Will he spend months trying to hack the companies' network which has been locked down by the highly paid computer security consultant? Or will he spend a day trying to hack the poorly motivated security guard that is paid minimum wage? Hacking a human (Social Engineering) is the greatest threat to your company. If you don't have someone who can combine computer security with physical security you have no informational security.

Informational security combines every aspect of access control and building management. Informational security ranges from how people access the building , how the janitors dispose of garbage, computer security, staff background checks, staff hiring, video surveillance ect.. A common lapse in physical security is that smokers usually leave one door unlocked during the day so they can take a smoke break. That completely cancels out your hundred thousand dollar key card system. All a information thief would have to do is watch your building for the day and find the smoker hang out.

Every major type of informational theft crime has used some type of social engineering attack. Untrained and poorly paid employees are the easiest targets because they are usually are unmotivated and easily influenced. The key is not paying people more; the key is to train them to know what to look for. A well trained staff member will enjoy their job and take ownership of their responsibilities. They will not want to let the company down if they are trained and feel needed.

Your employee hiring process should include a background check and credit check. If the candidates have ever declared bankruptcy do not hire them. If they are really strapped for cash they can be easily bribed or seduced into selling your companies secrets. The federal government does not give Secret security clearances to people who have declared bankruptcy. Why would you let someone like that near your company's vital data?

Your company's weakest link is your employee's cars and homes. It's easier for a hacker to follow someone home from work and then steal their laptop out of the car. Also, employees usually leave their access cards in their automobiles. Create company policies for storing company laptops, PDA's and access cards in secure locations...not in cars.

Check your company websites!! Don't have every employees name, position, phone number, email address and bios listed on the website. All this information just gives a information thief more tools to work with.

Train your in house security about your computer network. If you train them the very basics about technology and servers they will be more aware about what people should be doing. Train them to look for portal hard drives, key chain drives and writeable media like DVDs and cdroms. All of these items can be used to take vital company secretes off company grounds.

Finally here is the easiest way to protect your company's network......log off your computer when you're done using it. This sounds like a common sense but nobody logs of their computer when there done. The worst culprits are executives, who always want access to everything. If a hacker gets inside your company, it takes less than a minute to install a root kit. Once his root kit is installed your doomed.

วันเสาร์ที่ 6 มีนาคม พ.ศ. 2553

XCACLS, SUNINACL, And Other Permissions Security Recovery Tools

You Have 50GB Of Data To Move Along With Permissions Security

---------------------

This article is about several tools that can save a Windows administrators you know what in the event of a large scale permissions security problem.

Here is a fictional scenario we can use to illustrate the use of the XCACLS tool. We need to move or copy 50GB worth of data that is comprised of several thousand directories containing hundreds of thousands of small files from one storage system to another. These systems happen to part of a Windows 2000 Domain and permissions are quite granular in definition. We start the replication of that data using a favorite replication or synchronization tool and walk away for the evening. When we return the next day, everything has copied and all looks well. That is until you try to access the data.

The Data Is Copied, But I Cannot Access It: Permissions Security Problem

---------------------

What you did not know, until just now, is that the root directory of the drive that you copied the data to had the wrong permissions assigned to it. In addition, inheritance was configured such that any data that is placed on the drive is over written with the permissions of the root directory. In this case, it was an old account that no longer existed. Believe it or not, that can happen, and system administrators will know what I am talking about. Now you are left with trying to figure out what to do. Do I format the new drive, change the permissions and inheritance on the root directory so they are correct and start all over again? Do I make the changes on the root drive so they have the correct permissions and wait hours upon hours for the permissions to propagate? No, there is another, very fast way of resolving this issue with XCACLS or another tool called SUBINACL.

XCALCS Quickly Resets Permissions On Directories And Files

---------------------

Becasue I have limited space in this article, I am going to use XCACLS as the tool to correct this problem. However, in complex permissions structures, you will most likely want to use SUBINACL to fix the issue. I will talk about SUBINACL briefly at the end of the article.

XCACLS as a very fast tool that can set, remove, add, and change permissions on files and directories. For intance, the following command replaces all existing access rights and accounts with that of "dmiller" on the file "file.txt" with read-only access: "xcalcs file.txt /Y /T /G domaindmiller:r". Although that is pretty easy and helpful, what about changing all my directories and files, which I have thousands of, to allow the domaindmiller account to have full access? To do this in a very fast fashion you could execute the following from the root directory of the drive: "for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domaindmiller:f". This will go through every directory, subdirectory, and file and replace the current permissions with dmiller having full access to the object. You'll notice I put "" around the %g in the example. This is not required, but if you have directories that have names with spaces in them you will need to have the "".

What Other Ways Can I Use XCACLS To Change Security Permissions

---------------------

To give you a few additional handy examples of how you can use this tool take a look at the follow command prompt methods for replacing, updating and removing accounts and permissions from large numbers of directories and files.

The following command replaces all existing access rights an accounts with that of dmiller with read only access rights:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domaindmiller:r

The following command does not replace existing account permissions, instead, it adds the account, in the example the local admin account, with read only permissions:
for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /G administrator:r

The following command removes the account "administrator" permissions from all directories, files, and subdirectories: for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /R administrator

This command should update all the directories and their contents to allow Domain Admins full access:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G "Domain Admins:f"

I did a test on my XP Pro workstation and was able to change the permissions on approximately 10000 directories and files in less 1 minute. On one of my servers I was able to achieve a 500% increase in speed. It is blazingly fast.

SUBINACL Is More Complex But Man Can It Really Save The Day

---------------------

I cannot go into specifics about this tool in this article but I will tell you what it can do. And again, it does it very very fast. Using the same scenario as above, let's say that you had to fix the permissions on thousands of home directories. With SUBINACL, you can actually go to the original directories and files, use the tool to create what is called a "play file", a text file that contains the right account and permissions from the source files, then use that same file to tell SUBINACL to fix the permissions on the target storage system, the one with the screwed up permissions. It's quite the life saver if you ever find yourself in the type of predicament.

Also check out "CACLS". This command is inherent to Windows XP Professional.

Conclusion

---------------------

These tools are contained in the Windows 2000 and 2003 server resource tool kit, however several of them also exist native to the Windows XP environment. Check them out if you don't already know about them. Even if you have no use for them right now it may save you hours of hard work and stress in the event of a future permissions problem.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)

---------------------

http://www.defendingthenet.com/NewsLetters/XCACLS-SUBINACL-AndOtherPermissionSecurityRecoveryTools.htm

วันศุกร์ที่ 5 มีนาคม พ.ศ. 2553

The Computer Security Act of 1987 - In Layman's Terms

Are you concerned about computer security? Do you worry that personal and sensitive information could be leaked to someone with the intent to use that information in a negative manner?

What Is It? The Computer Security Act of 1987 was the first true attempt by the government of the United States to legislate information in the federal government's computer systems. The overall goal was to protect and defend any of the sensitive information in the systems and provide security for that information.

Basically, what's private should remain private. The Computer Security Act of 1987 puts a check into place on federal computer systems. And, it's paved the way for the future of the public's limited access to government information.

The National Bureau of Standards, which is now known as the National Institute of Standards and Technology (NIST), was put in control of creating a strategy to develop certain standards for protecting any information. The Computer Security Act of 1987 required the National Bureau of Standards to create an absolute minimum of acceptable security practices.

Under the Computer Security Act of 1987, security plans dealing with computers needed to be created, and people who used those systems needed to be given the correct training.

Why Did the Computer Security Act of 1987 Originate? At one point in time, the United States Congress had concerns about how vulnerable computer databases could be. Could information be leaked? How possible were breaches in security? Could there be a national security threat if any information leaked and fell into the wrong hands?

It was at this time that Congress decided to check into matters and see how vulnerable the government computers really were.

What Does the Computer Security Act of 1987 Do? The Computer Security Act of 1987 created an advisory board, consisting of twelve members, who met a minimum of three times during the year. The board would give their report to Congress, the National Security Council and others.

The government act does prevent sensitive information from being released, but it also forbids the withholding of any information that's requested because of the Freedom of Information Act. And, the Computer Security Act of 1987 does not allow any restrictions, limitations or regulations on the disclosure, collection, sale or use of public domain or privately-owned information.

Outcomes from the Computer Security Act of 1987 As of yet, there haven't been any reports of major information leaks or threats to national security. But, libraries have reported that several government agencies, like NASA, the Department of Energy and the Department of Defense, have not released as many documents to the public as they did before the Computer Security Act of 1987.

Since the Computer Security Act of 1987 was passed, it has now been superseded by the Federal Information Security Management Act of 2002, which expands on the realm of computer and network security.

วันจันทร์ที่ 1 มีนาคม พ.ศ. 2553

Dealing with AV Metasploit

This video shows how the anti-virus tools with new tricks Metasploit 3.2 To search for information on hackers and ensure the security of computer SANS Hacker techniques and Incident Response and SANS Network Penetration Testing to: Hi sans.org/info/30768 final version on bypass - www.vimeo.com



http://www.youtube.com/watch?v=ScTCJ88rplU&hl=en