I have two stories recently that made me wonder what the outcome would be if they were seen in parallel.
The first, reported by Wired.com, showing how, despite repeatedly told about the importance of safety, people seem to block these warnings and deliberately, out of convenience, select unsafe practices.
The second, reported at Cracker Cloud Blog, associated with the fundamental uncertainty in the MS-CHAPv2 protocol. In summary, this report shows how a challenge in 2138 could be reduced to 257 challenge. This basically means that a brute force attack with special hardware each MS-CHAPv2 password in less than 23 hours and can break.
If you have the attitude of people to safety in the first story as a starting point, I wonder how many people who could be affected by this invention would just ignore me and implications of being too much of an inconvenience to migrate to a new solution. I am sure that this will happen, because the MS-CHAPv2 has been criticized in the past, including industry giants such as Bruce Schneier.
This is not the first time that the established standards have been compromised, to the point that its use is a huge security risk. If you want to use, for open wireless connection to protect. For example, many people are still using their wireless network WEP takes less than a minute to break WEP. Anyone can sit in their car, breaking WEP and connect the device to the network. They can then sniff the traffic that sensitive data may include such reference. If the victim uses the same login and password for different accounts, this will give the hacker access to the victim machine and does what he / she wants – install keyloggers, malware and dozens of other bad things.
Why is this happening? As a function Wired.com explains, complacent because we happen to not exist, everything is in order. Unfortunately, when one day something happens it’s too late to take action.
Maybe a lot of work to migrate to modern technology, legacy systems but much more desirable than having to deal with the consequences of a security breach or the spread of infection. If you’ve heard that the security system that you are using disturbed, attention and proactively look for alternatives as soon as you can. Do not try to convince yourself that it’s worth waiting a bit to see how things would go. Cliche or not, “prevention is better than cure ‘- if the drug is ever possible!
Está buscando una relación sexual con niñas o mujeres rusas? Hay millones de rusos para citas, romance o matrimonio. Puede encontrar mujeres solteras rusas o niñas o una boda romántica. Varios servicios de citas disponibles en línea que le dará mucha información sobre las mujeres rusas matrimonio de mente y mujeres que buscan relaciones y las fechas de matrimonio con hombres de otros países. Rusia es muy serio acerca de la relación. Usted puede desarrollar su relación con la fecha de la boda. Rusia participa en la búsqueda de un socio en sus vidas. Si usted puede desarrollar una mejor relación con ellos, que fácilmente podría casarse.
Rusia se dedica a una datación muy en serio conocer los detalles de las personas antes de que comienzan a salir ellos. Citas de Rusia Único de salir con chicas y mujeres de otros países. Ellos realmente se centran en su matrimonio. Prestan más atención a la boda y se hará una gran familia, después del matrimonio, piensan en sus carreras. La mayoría de ellas implican el matrimonio y la familia. Usted tendrá una relación con las niñas o las mujeres rusas sería diferente de su relación. Antes de que las niñas y otras mujeres.
Some of my younger friends may never meet an ancient fax, but I remember them well. There was a time when it seemed nothing short of a miracle to pass on to someone and have received hundreds of miles away directly document – or at least a reasonable facsimile of it. It was almost like a Star Trek transporter was killed. Life
Yes, we were quickly impressed in the old days. Now many of us do not even have a traditional phone line, fax machine let alone their addiction. The world does not stand still, and the Internet is the method of choice for all forms of communication. The post office was dying, fixed network and fax machines disappear once there is always found in fewer homes and offices.
His mind, though, life. Even before VoIP and mobile start replacing landlines, fax moved from a special machine to a fax modem, a peripheral device that was once standard on almost every desktop computer. The great advantage of this metamorphosis fax first (what I refer to Fax 2.0) is that the paper should not be involved in sending the fax. If the document or photo is a digital file, can you send it without the hassle (and cost) scans.
From concept to grow fax server (I call it Faxing 2.5). With these advances, you do not have a fax modem and telephone line for each individual computer have. Located on a network fax server and can be faxed to anyone who can access the computer through a local network or send. Even through Internet This saves money for the company in several ways: fewer phone lines, less hardware, use less paper, and you can check to allocate costs to the appropriate department both incoming and outgoing faxes for accounting purposes.
But there is a problem. Integrating a fax server with PABX systems can prove to be a challenge, and fax modems and boards quickly became obsolete technique. Modern companies – especially small and medium-sized enterprises with limited budgets – do not want to have to maintain just to be able to send and receive faxes expensive landlines.
Fax 3.0 took it to a new level and solve the problem. Today we live in a world cloudified, and it makes sense to take to the cloud, even your fax. Fax as a Service (FAAS?) Simplify the process of sending faxes over the phone network without having a hardware fax and phone lines.
But what about security? One of the reasons Fax has lingered is that users feel more confident on the phone instead of sending sensitive documents via the Internet. But there is a solution: if the fax software to connect to cloud-based fax services over a secure connection, you do not have to worry about your documents to intercept his “out there” for everyone to read. We have personal information such as bank account numbers and credit card numbers for HTTPS connections to believe, so the logical way to protect confidentiality. Document sent
So what should you look for when you are considering moving your fax to the cloud? A good solution Faas provides you with software that makes faxing as easy as sending an e-mail or print documents. It can be integrated with your Exchange (or any other SMTP server) and using Outlook contacts, or even a cloud messaging services such as Gmail or Office 365. Even better if you have a document in your word processor to create and send a fax from there, select if you want to select the printer. Direct fax server
This is the ‘must haves’, but what else do you put on your wish list? Given the current trend towards mobile computing, your users will want to be able to send and receive faxes from their phones and tablets, as well. Faxes are sent as an image, but it would be nice to have the OCR option so that you can put into editable and searchable documents. Incoming faxes
Fax may seem “old school”, but many companies are still dependent. Bringing the technology behind it is now able to save money for the organization and make the fax much less frustrating for users.
Computing history has taught us that if you are running a server is responsible for your own infrastructure and in some cases also be liable to a responsible internet users. Illegally malicious attacks exploit poorly configured server is a common practice until a few years ago. Poorly secured FTP servers are often hijacked and copyright software shared without permission of the owner. Configured SMTP relay server is allowed for all people and is used to send large amounts of spam. Even managed to find a safe way to script an attacker use the Web to look for spam.
This brings us back to the title of this article. If you run a service that is not safe, there’s a good chance that cyber criminals to find at one of the many internet they scan your server.
Because these attacks become more and more popular, increasing awareness. As awareness increases, the server admin to make sure they are as safe as possible. At one point the attacker was not found worthwhile to look for and use a system that is not safe – they have too few have become. This allows them to move to the next best thing at the time.
Fast forward to the present: news agency recently reported the battle between spammers and Spamhaus. In short, the Spamhaus blacklist Cyber ??Bunker – the data center that houses each server, as long as it is not involved in terrorism or child pornography. Of course very popular with spammers. Spamhaus is a system designed to report. IP addresses in the spam distribution Some of the programs and the server will block any server (except white-listed) as the source IP address blacklisting services like Spamhaus. Email What happens there is that huge denial of service (DDoS) attacks launched against Spamhaus, which, in turn, take a step-counter. However, the result is intense DDoS attacks which experts claim can harm the backbone infrastructure.
What makes this possible a large DDoS attack?
This large-scale DDoS attack caused by a DNS amplification attack DNS resource records of the domain (the larger the better data control) is needed. Sometimes compromised DNS server, so that a great record because it was introduced with great impact and influence. Once a record is available, open DNS resolvers (DNS server that allows queries by everyone) said taking a large record companies, and will keep it in their cache. Currently, all the attacker has to do is open DNS resolvers query for all records on the domain in question and spoof requests to appear to come from the intended victim. DNS will then all the files to the victims.
It’s called DNS amplification attacks because although the demand itself requires little package no larger than a few bytes, packets are sent to the victims will kilobytes in size. This means that, for example, a 100Mbit internet can launch a DDoS attack along the lines of about 20 Gb – so it’s very efficient … in a bad way.
For this attack occurs, the DNS server should be configured to serve clients. For (the ability to use a large set of plates) of the DNS server should be configured for recursive queries (recursive query will allow customers to DNS records do not ask specifically that the DNS server so that it becomes effective in question and thus obtain DNS records for each domain of people who want query).
This situation reflects an open SMTP relay stories of the past. We have a server for review in accordance with anyone using the necessary, but at the same time it is misused for illegal purposes. At that time, professional advise open relay is closed, today they recommend closing open DNS servers to avoid. Similar large-scale DDoS attack the Spamhaus DDoS attacks experienced backbone routers to 300Gbits traffic at one point. Most routers can only handle up to 100Gbits. Internet backbone routers seriously overloaded in this attack. This causes degrading performance between different segments of the Internet during the attacks continue and the traffic has not been elucidated.
When Tim Berners-Lee first discovered system of interconnected documents which can be accessed through a global network, no one can predict what tangled web we weave. Web is now a source of information and entertainment. It can be a valuable resource for employees, helping them to extract facts, step-by-step instructions to get questions and in minutes instead of hours or days the same task would have taken thirty years ago for unloading.
However, as with any powerful tool, there is a downside to this possibility in the hands of workers subject to the all too human tendency to sometimes make fun before work. A web browser that is connected to the Internet opens the door to all sorts of temptations and distractions that can wreak havoc on productivity in the workplace.
A “quick check” of personal email accounts may result in loss of half an hour, read and reply to messages. Excursion to Twitter to send “one tweet can end up with you scroll through dozens more posted by people you follow, and clicking on a link in it, before you know it, thirty minutes passed. Friend Facebook instructions meme, cat food and photos Google+ the call. told members to come and hang out.
Social networking is not a hobby. Amazon shows off all the great deals with only one left in stock. Contact sensational news that is hard to resist. It’s easy to get lost in the maze of funny videos on YouTube. Political junkies can easily get involved in a heated discussion forum dedicated long for their problems either. Market watchers were forced to watch their favorite stocks. Web based chat easier to get away than with a personal phone call. Online games can consume large chunks of time that must be spent tend to business.
This does not necessarily mean that workers are meant to spend their days playing, but if they are surrounded by all the temptations, it can be difficult for them to stay on the right path all the time. And let’s face it: some people will take a step further, and visit their site can get – and maybe even the company – in trouble. Gambling, “adult” (porn) sites, hacker sites, software piracy sites, hate sites or groups of criminal violence or terrorism to promote: the employee has access to one of these can lead to legal consequences and / or bad publicity and reputational damage organization. It can also cause problems for other employees. Finally, these sites often contain viruses and other malware that can infect and distributed systems in your network.
To protect both employers and employees, it is important for orgs use to create policies to manage web surfing during working hours, on company premises, and / or use of equipment. It was the first step, but sometimes (okay, often) it’s not enough. Some people self-police, but some can not or will not. Some people can not understand or remember all the policies. Of course you can take disciplinary action, but by the time you find out about the breach, the damage may already be done.
The problem was brought about by modern technology, so as to maintain a reasonable technology solutions. Rather than expect users to abide by their own rules, you can make it easier for them (and you) using web monitoring and filtering solutions. Then, instead of responding to policy violations, you can proactively prevent them from happening in the first place.
There are many products out there, but some are better than others. They all begin with the same goal: an attempt to access inappropriate sites. There are several ways to do it, though. A simple black list checking each site with a list of known “bad” sites and block all the people on the list. A white list works in reverse to the list of known “good” sites and allow access only to the site in the list. General site content can be filtered by category – for example, you can block sites related to alcohol, drugs, dating services and / or games.
This method is simple and easy, but there are inherent problems in it. With the white list, access to the site a useful workers blocked, because they have not been included in the list. The problem with blacklisting is that you have to wait until someone discovered that undesirable sites and put it on the list, if not, people will be able to get to it.
Reputation-based filtering goes even further, by analyzing the different characteristics of each site and then assign a probability score reflecting the risk. It gives you more flexibility, allowing you to access to the site in the category “Entertainment”, but the site in the category with a low reputation score will be blocked. You can also access to social networking sites such as Facebook allow, but block the applications and games on this site are huge time sinks and can be used to spread malware.
It can also be based on the type of network traffic generated. You may want access to the news, but not video streaming are often available on news permission. Streaming media uses a lot of bandwidth, and can also be more vulnerable to abuse / time consuming than text message instantly. It’s even better if you could be specific media applications (eg iTunes) and download web control to block employees.
A good web monitoring solution gives you plenty of choice, allowing you to enforce policies not only content but also how much employees spend time on the web and how much bandwidth they use. Course will also give good reports, activity logs that record data usage documentation. The Web is a bit like the west, wild wild if you look at all the dangers out there, but web monitoring software can act as a new sheriff in town, took over and brought to digital business environment.