Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can.
Sunday, December 13, 2009
TV On the Desktop
Back to Hulu Desktop...
Hulu Desktop allows you to control the screen either with your remote control or with the keyboard, which you would only need your control if it was part of a MythTV solution. Hulu also provides only limited 30 second commercials which are non-obtrusive to the user. The commercial time gives you time to take a break without pausing the shows.
You can edit your profile, subscribe to "channels", and add friends and also discuss shows and offer your opinions on what you thought of the shows. Adding friends and all brings a social networking aspect to whole site and desktop experience.
Check it out I highly recommend it for everyone. This is a great step towards letting go of the cable company or satellite company. People want to watch the shows they want to watch when they want to watch it. Hulu allows that. You get to choose the shows to watch and don't have to record anything any more.
Let me know by leaving a comment if you have looked at it, and what you think. It is availible for Windows, MAC, and Linux.
Friday, October 30, 2009
New Ubuntu
I downloaded the new Ubuntu 9.10 Linux operating system. It is a wonderful operating. It loads and install super fast. It has new features and improvements over the previous versions. This version includes a Software Store see Figure 1. They have taken out some software such as Pidgin and included Empathy as the default IM/Chat program, but the good thing about free and open source software is that if you miss the old programs then you can always get those programs back and re-download them through the synaptic package manager.
Ubuntu also seems to run faster at both start-up and shut-down. They have also updated some of the themes and background images for the desktop which is wonderful. The install looked more professional. While installing Ubuntu I can tell that it is becoming a more mature operating system. I really look forward to the long-term support edition and the future of Ubuntu.
I can tell that Ubuntu is trying to go head-to-head with Microsoft and Apple. It is no accident that Microsoft and Apple both released their operating systems around Ubuntu's normal release. Ubuntu releases an OS every 6-months in April and October.
Saturday, May 23, 2009
Passwords: First Step in Insecurity
But I know from experience that know matter how much I talk about not writing passwords down you will still do it. If you do write it down then take some password security precautions and at least keep it secure. My advise is to not use passwords alone. Use what in the security world we call 3-forms of authentications: What you have? What you know? and Who you are?
What you know, are things like passwords, security questions, personal information that you may know. What you have, are things such as flash drive or tokens, PDAs, and mobile device. Who you are include bio tech, such as thumb prints, retina scans, and face recognition.
Steps to Secure Passwords
- More than 8 characters long
- Mix of alphanumeric, numeric, and special symbols ($,%,^,@,&,!,?)
- Not words in dictionaries
- Not names or common words
If you combined your extra secure password with what you have such as a flash drive and a simple to use password manager such as KeePass Password Safe Portable found at http://portableapps.com/apps/utilities/keepass_portable
With this utility you can set-up a list of websites that you are a member of and have one really strong random password to protect the data within the program to be accessed.
I look forward to your comments and questions.
Saturday, February 28, 2009
Getting Caught with Your Ports Down!!!
Port scanning can be done with malicious intent, the intruder would generally prefer to go undetected. Network security applications can be configured to alert administrators if they detect connection requests across a broad range of ports from a single host. To get around this the intruder can do the port scan in strobe or stealth mode. Strobing limits the ports to a smaller target set rather than blanket scanning all 65,536 ports. Stealth scanning uses techniques such as slowing the scan.
There are a number of different methods to perform the actual port scans as well as tricks to hide the true source of port scan.
You must find the right balance between network performance and network safety. You could monitor for SYN scans by logging any attempt to send a SYN packet to a port tat isn't open or listening. A SYN scan is a type of TCP scanning that is also known as a "half-open scanning" because it does not open a full TCP connection.
You must ensure you have approval of all the necessary people before port scanning otherwise you may be on the wrong side of the law. Once you find out what ports respond as being open by port scanning your own network you can begin to work on determining whether it is necessary for those ports to be open to outside traffic.
Types of Port Scans Include
- Vanilla: An attempt to connect to all 65,536 ports
- Strobe: An attempt to connect to only selected ports (typically under 20)
- Stealth Scan: Several techniques for scanning that attemp to prevent the request for connection being logged; uses SYN scan FIN scans or other techniques to prevent logging of the scan.
- FTP Bounce: Scan attempts that are directed through an FTP server to disguise the cracker's location.
- Fragmented Packets: Scans by sending packet fragments that can get through simple packet filters in a firewall.
- UDP: Scans for open UDP ports.
- Sweep: Scans the same port on a number of computers.
Tool Used to Perform Port Scanning
NMap (Network Mapper) is a popular free open source software used to port scan. It is a utility for network exploration or security auditing. You can scan a range of IP addresses and ports and find out what an attacker would see if they were to port scan your network. NMap allows great flexibility and control of almost every aspect of the scan and perform various types of port scans to fit your needs.
NMap was designed to rapidly scan large networks, but works find against a single host NMap is:
- Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles.
- Powerful: Used to scan huge networks of literally hundreds of thousands of machines.
- Portable: Most operating systems are supported, including: Linux, Microsoft Windows, FreeBSD, Open BSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
- Easy: You can start out as simply as nmap-v-A targethost. Both traditional command line and graphical (GUI) versions are available to suit your preference.
- Free: It comes with full source code.
- Well Documented
- Supported
- Popular
Friday, February 27, 2009
Network Modeling
The OSI Model is a theroritical representation of how a network works.
OSI Model
7-- Application Layer
6-- Presentation Layer
5-- Session Layer
4-- Transport Layer
3-- Network Layer
2-- Data Link Layer
1-- Physical Layer
The TCP/IP Model is more of a realistic and working model representation of how a network works. All of the same information from the OSI Model is within the TCP/IP Model. Some of the layers are condensed and overlap within the TCP/IP Model.
TCP/IP Model
5-- Application Layer
4-- Transport Layer
3-- Network Layer
2-- Data Link Layer
1-- Physical Layer
I will attempt to explain the different layers of both the OSI Model and the TCP/IP Model and compare and contrast the two.