tag:blogger.com,1999:blog-62257834776859254302024-03-29T10:28:48.935+07:00Network Security Notes::About Network Security, Network Labs, Cisco, Microsoft...About Network Security, Network Labs, Cisco, Microsoft...Network Security Notes, Network Security Training, Network Security Videos, Cisco Network Security, Cisco Network Academy, Cisco Router Configuration, Cisco Products, Packet Tracer Labs, GNS3 Network Labs, VPN Network Security, All about Network Security...visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.comBlogger74125tag:blogger.com,1999:blog-6225783477685925430.post-47662454545387245922016-10-29T02:15:00.000+07:002016-10-29T02:15:30.147+07:00Network Security Basic<div class="separator" style="clear: both; text-align: center;">
Network Security Basic</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i3.ytimg.com/vi/kcks1FLBVOI/hqdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://i3.ytimg.com/vi/kcks1FLBVOI/hqdefault.jpg" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
In this video below, you will learn about the basic of network security or the fundamentals of network security such know about types of attack.</div>
<div class="separator" style="clear: both; text-align: center;">
You need to watch this video, this video is present by <a href="https://www.apnic.net/" target="_blank">APNIC</a>.</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/kcks1FLBVOI/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/kcks1FLBVOI?feature=player_embedded" width="320"></iframe></div>
<br />Unknownnoreply@blogger.com64tag:blogger.com,1999:blog-6225783477685925430.post-8477243347487931042016-08-21T00:06:00.000+07:002016-08-21T00:06:33.943+07:00Cisco Advises Simple Steps to Protect Business Environments<b>Cisco Advises Simple Steps to Protect Business Environments</b><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="320" src="https://newsroom.cisco.com/documents/10157/1559822/security-icon_200x160_2/160df3f0-05f3-4fe7-b1c0-edf25db682f3?t=1419459288717" width="400" /></div>
<div style="text-align: center;">
<b><br /></b></div>
<b><br /></b>
<div style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Cisco’s Talos researchers have observed that organizations that take just a few simple yet significant steps can greatly enhance the security of their operations, including:</div>
<ul style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Improve network hygiene</strong>, by monitoring the network; deploying patches and upgrades on time; segmenting the network; implementing defenses at the edge, including email and web security, Next-Generation Firewalls and Next-Generation IPS.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Integrate defenses</strong>, by leveraging an architectural approach to security versus deploying niche products.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Measure time to detection</strong><strong style="box-sizing: border-box;">,</strong> insist on fastest time available to uncover threats then mitigate against them immediately. Make metrics part of organizational security policy going forward.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Protect your users everywhere they ar</strong><strong style="box-sizing: border-box;">e</strong> and wherever they work, not just the systems they interact with and when they are on the corporate network.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Back up critical data,</strong> and routinely test their effectiveness while confirming that back-ups are not susceptible to compromise.</li>
</ul>
<div>
<span style="color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif;"><span style="font-size: 13.45px; line-height: 18.83px;"><i>Source: Cisco Press Release: https://newsroom.cisco.com/press-release-content?type=press-release&articleId=1780586</i></span></span></div>
Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-6225783477685925430.post-7652770734596414592016-08-20T22:28:00.003+07:002016-08-20T22:28:27.321+07:00Cisco Closes ‘Security Effectiveness Gap’ with New Services and Integrated Cloud-Based Solutions<b>Cisco Closes ‘Security Effectiveness Gap’ with New Services and Integrated Cloud-Based Solutions</b><br />
<b><br /></b>
<b>The Cisco Press Release:</b><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="320" src="https://newsroom.cisco.com/documents/10157/1559822/security_icon_200x160_1/e1bed090-deef-4857-afdd-961fc5f4ea6c?t=1419459287868" width="400" /></a></div>
<div style="text-align: center;">
<b><br /></b></div>
<h2 class="lead" id="gtm-subheadline" style="background-color: white; box-sizing: border-box; color: #222222; font-family: ciscosansttregular, serif; font-size: 16px; font-stretch: normal; font-weight: 100; line-height: 24px; margin: 25px 0px; padding: 0px;">
Cisco’s architectural approach makes security more effective and simple for customers</h2>
<span class="article-date" date="2016-07-11" id="gtm-articledate" style="background-color: white; box-sizing: border-box; color: #999999; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 12px; font-weight: 600; line-height: 20px; text-transform: uppercase;">JULY 11, 2016</span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><br />
<div id="gtm-articlebody" style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">LAS VEGAS, NV </strong>– <strong style="box-sizing: border-box;">July 11, 2016</strong> – Cisco today announced new services and cloud-based security solutions built with Cisco’s threat-centric security architecture. With best of breed security solutions uniquely architected to be integrated, automated and simple to use, the Cisco® security portfolio provides companies with a more effective approach for securing their digital business models. From the network to the endpoint to the cloud, Cisco’s architectural approach detects more threats and helps customers on average reduce their time to detection to less than 17 hours — much faster than the industry standard of 100 days.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
As digital transformation brings more users, devices and applications online, companies are challenged to protect an expanding attack surface. With more space to operate in and greater opportunities to generate a profit, active adversaries are relentlessly targeting businesses, organizations and people. In response, companies are deploying up to 70 disparate security products to address a variety of needs — a practice that is difficult to manage and often leaves businesses more vulnerable.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
While potentially increasing capabilities, this conventional, niche-product approach to security can create unmanageable complexity that results in a security effectiveness gap for companies. Through its security architecture, the Cisco security portfolio increases capabilities but also decreases complexity — offering an alternative approach for customers that helps them close the gap and be more secure.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
By combining unprecedented network visibility and its breadth of integrated products, Cisco makes it simple for distributed and mobile businesses to deploy effective security where needed from the branch office to headquarters or with the end user wherever they go. Cisco embeds security into the points of connection that users traverse so that the network, access points or endpoints are safe before a user even logs on. </div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Announced today, Cisco is releasing the following solutions and services that make effective security simpler for customers:</div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;"><a href="http://www.cisco.com/c/en/us/products/security/firewalls/umbrella-roaming.html?POSITION=Press%2bRelease&COUNTRY_SITE=US&CAMPAIGN=CLUS2016&CREATIVE=PR%2bOpenDNS%2bUmbrella%2bRoaming%2b&REFERRING_SITE=PR" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Umbrella Roaming</a>: </strong>This centralized, cloud-delivered protection is the simplest way to remove off-network blind spots, guarding roaming employees wherever they work. With Umbrella Roaming, now embedded as a module with AnyConnect® (Cisco’s VPN solution), organizations can add a new layer of off-network protection that blocks connections to malicious sites without needing to deploy another agent.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;"><a href="http://www.cisco.com/c/en/us/products/security/router-security/umbrella-branch.html?POSITION=Press%2bRelease&COUNTRY_SITE=US&CAMPAIGN=CLUS2016&CREATIVE=PR%2bOpenDNS%2bUmbrella%2bBranch&REFERRING_SITE=PR" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Umbrella Branch</a>: </strong> This cloud-delivered solution gives businesses more control over guest Wi-Fi use with easy content filtering. With Umbrella Branch, businesses can simply upgrade Integrated Services Routers (ISR) for simple, fast and comprehensive security at branch locations.</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;"><a href="http://www.cisco.com/c/en/us/products/security/defense-orchestrator/index.html?POSITION=Press%2bRelease&COUNTRY_SITE=US&CAMPAIGN=CLUS2016&CREATIVE=PR%2bCDO&REFERRING_SITE=PR" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Defense Orchestrator</a></strong><strong style="box-sizing: border-box;">:</strong> This cloud-based management application enables users to easily and effectively manage a large security infrastructure and policies in distributed locations across thousands of devices through a simple cloud-based console. It cuts through complexity to manage security policies across Cisco security products from ASA and ASAv firewalls to Cisco Firepower™ next-generation firewalls and ASA with FirePOWER™ Services featuring Firepower Threat Defense, and OpenDNS.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;"><a href="http://meraki.cisco.com/amp?POSITION=Press%2bRelease&COUNTRY_SITE=US&CAMPAIGN=CLUS2016&CREATIVE=PR%2bNew%2bAMP%2bMeraki%2bPage&REFERRING_SITE=PR" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Meraki® MX Security Appliances with Advanced Malware Protection (AMP) and Threat Grid</a>: </strong>This completely cloud-managed unified threat management (UTM) solution simplifies advanced threat protection for the distributed enterprise, providing branch offices with malware protection that checks files against its cloud database to identify malicious content, blocking the files before users download them.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;"><a href="http://www.cisco.com/c/en/us/products/security/stealthwatch-learning-network-license/index.html?POSITION=Press%2bRelease&COUNTRY_SITE=US&CAMPAIGN=CLUS2016&CREATIVE=PR%2bStealthwatch&REFERRING_SITE=PR" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Stealthwatch Learning Network License</a></strong>: This component enables the Cisco ISR to act as a security sensor and enforcer for branch threat protection. It allows businesses to detect and track anomalies in network traffic, analyze suspicious network activity, and identify malicious traffic.</li>
</ul>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Additionally, <strong style="box-sizing: border-box;"><a href="http://www.cisco.com/c/dam/en/us/products/collateral/security/at-a-glance-c45-737389.pdf" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco Security Services for Digital Transformation</a></strong> enables organizations to build a strong security foundation, which is the key to successful business outcomes. The new service helps organizations examine core security fundamentals that identify their readiness to adopt digital technologies. Expert advisers recommend security strategies and provide tailored solutions based on industry trends and vital business needs to achieve agility, innovation and growth.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Cisco’s channel partners are playing a strategic role in helping customers build and manage their security infrastructures. The new security offerings, announced today, will help channel partners design simple, open and automated solutions for their customers around the industry’s most effective security portfolio. With enhanced cloud-based protection and solutions that simplify overall security management, Cisco is opening up new service opportunities for partners to manage their customers’ security services and tap into recurring revenues.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Read out more here on Cisco Press Release site: https://newsroom.cisco.com/press-release-content?type=press-release&articleId=1777284</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<br /></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6225783477685925430.post-88504246505682296592016-08-20T22:20:00.000+07:002016-08-20T22:20:41.200+07:00Cisco Prepares Networking Industry for Transformation to Digital-Ready Networks<b>Cisco Prepares Networking Industry for Transformation to Digital-Ready Networks</b><br />
<b><br /></b>
<b>The Cisco Press Release:</b><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="320" src="https://newsroom.cisco.com/documents/10157/1559824/networking_200x160_1/c4fff162-8b9c-4314-9625-aa691e3b7b69?t=1421870603203" width="400" /></a></div>
<div style="text-align: center;">
<b><br /></b></div>
<h2 class="lead" id="gtm-subheadline" style="background-color: white; box-sizing: border-box; color: #222222; font-family: ciscosansttregular, serif; font-size: 16px; font-stretch: normal; font-weight: 100; line-height: 24px; margin: 25px 0px; padding: 0px;">
Company also improves threat visibility and enforcement capabilities with new security technology embedded into the network</h2>
<span class="article-date" date="2016-07-11" id="gtm-articledate" style="background-color: white; box-sizing: border-box; color: #999999; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 12px; font-weight: 600; line-height: 20px; text-transform: uppercase;">JULY 11, 2016</span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><br />
<div id="gtm-articlebody" style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">LAS VEGAS, July 11, 2016:</strong> Cisco today announced it will help engineers, developers, partners and customers embrace a monumental change in how networks are built and managed—preparing the industry for the transition to digital-ready networks. Cisco is also building on the intersection between security and networking with new technologies designed to simplify branch office security and make it more effective. </div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
In March, <a href="https://newsroom.cisco.com/press-release-content?articleId=1748696" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco launched the Digital Network Architecture</a> (Cisco DNA)—a radical new approach to networking designed for the digital era. As customers embrace mobility, cloud, analytics and the Internet of Things (IoT) to digitize their business, IT teams are struggling to keep up with the ever-increasing complexity of the network, sophistication of security attacks and growing customer expectations. Cisco realized that traditional networks simply could not scale to meet the increasing demands of the digital business. A new network was needed for the digital era. A network designed from the ground up to be flexible, programmable and open. <a href="http://www.cisco.com/c/en/us/solutions/enterprise-networks/digital-network-architecture/index.html" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cisco DNA</a> helps IT address these demands by moving networking from hardware-centric to software-driven, from manual to automated, and from reactive to adaptive.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
"Organizations need to address the expanding threat landscape across mobility and cloud, while facing increasingly sophisticated security attacks,” says Jeff Reed, senior vice president, Networking Infrastructure and Solutions at Cisco. “With DNA, Cisco is reinventing how we secure networks for the digital era by embedding advanced security capabilities into a single network architecture. But technology alone isn’t enough. We are also preparing IT professionals with new skills, training network-savvy developers and helping customers navigate the journey to digital-ready networks."</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">Effective Security Starts with the Network</strong><br style="box-sizing: border-box;" />Using the network to elevate threat visibility and enforcement is one of the key tenants of Cisco DNA. Today, Cisco is introducing three new technologies that embed security into the branch office infrastructure to provide greater protection to the business:</div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Umbrella Branch </strong>gives organizations simple, fast and comprehensive security at their branches by putting them in control. After activating the software on Cisco’s popular branch office router, the Cisco ISR 4000 Series, IT can apply content filtering and block malware, phishing, and C2 callbacks before these threats can reach the network—even when offices connect directly to the Internet.</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Stealthwatch Learning Network License </strong>extends Cisco’s market leading network as a sensor and enforcer capability for branch-level threat detection and response. The software resides on the Cisco ISR 4000 Series and offers new adaptive security anomaly detection technology. The solution works by analyzing data only available on the network device to identify malicious traffic and instantly protect branch network from immediate threats. </li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Meraki MX Security Appliances with AMP and Threat Grid</strong> make it simpler than ever to deploy and manage advanced threat protection capabilities. This integration combines the streamlined cloud management of Meraki with best-in-class threat protection, enabling administrators to rapidly detect, contain, and remediate threats.</li>
</ul>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">Beyond Technology Innovation</strong><br style="box-sizing: border-box;" />To turn the Cisco DNA vision into reality, Cisco is rallying its vast global ecosystem—from customers and engineers to partners and developers – to build the skills necessary to scale, secure, and innovate on digital-ready networks. </div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Network Engineers:</strong> Cisco certified networking engineers build and operate the world’s most sophisticated networks. As the network becomes more automated and software-driven, these engineers must expand their programmability skills and deliver more value to the enterprise. Cisco is upgrading its career certification portfolio to help fill that rapidly growing need — including a new Cisco Certified Internetwork Expert (CCIE) framework that is being launched across all expert-level certifications along with a new Cisco Network Programmability Engineer Specialist Exam. (Read this <a href="https://learningnetwork.cisco.com/blogs/talking-tech-with-cisco/2016/07/11/network-programmability-is-the-new-black" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">blog</a> for more details.)</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Application Developers:</strong> As the network becomes more open and programmable, the developer community will become critical, unlocking the potential of Cisco DNA with a new generation of network-aware applications. DNA is a key element of DevNet—Cisco’s 300,000 strong development community. Here in Las Vegas, Cisco held a two-day event designed as a springboard for developers wanting to leverage the interfaces to rapidly program and pull analytics off of network controllers and devices. The event sold out almost immediately, and was viewed as a resounding success. Cisco plans to roll out similar events globally over the next year. (Read this <a href="https://communities.cisco.com/community/developer/blog/2016/07/11/digital-disruption-at-cisco-live-with-dna-and-devnet" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">blog</a> for more details.)</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong style="box-sizing: border-box;">Channel Partners: </strong>After years of building hardware-centric networks, Cisco’s 70,000 channel partners are evolving to flexible networks driven by software. Over the years, Cisco and its partners have evolved through numerous market transitions together. Now, Cisco is helping partners evolve their networking practices, develop new skills and open up business opportunities around automation, analytics and security. Cisco continues to offer partner incentive programs and has designed new software business roles within our existing Partner Ecosystem to help accelerate this transition. (Read this<a href="http://blogs.cisco.com/partner/11000-customers-cant-be-wrong-about" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">blog</a> for more details.)</li>
</ul>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">The Journey to Digital-Ready Networks</strong><br style="box-sizing: border-box;" />Cisco is helping IT customers navigate the journey to a digital-ready network by introducing a network readiness model. The model identifies the five key elements of network readiness: automation, analytics, assurance, security, cloud and IoT. This model builds out a customer’s journey across the five phases, with a new tool helping customers to assess their current state, followed by recommended steps to better guide their network transformation.</div>
</div>
<div style="box-sizing: border-box; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Cisco-sponsored IDC research reveals that many customers are already embarking on the journey to a digital-ready network:</div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">Four out of five of organizations surveyed have not yet aligned their business and networking strategies;</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">Those that have are seeing double the revenue growth compared to their non-aligned peers;</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">The percentage of customers who plan to implement software-delivered, automation-capable networks will more than triple over the next two years from 13 to 44 percent.</li>
</ul>
<div>
Read out more details on Cisco Press Release Website here: https://newsroom.cisco.com/press-release-content?type=press-release&articleId=1777470</div>
</div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6225783477685925430.post-58668557331222110172016-08-20T22:05:00.000+07:002016-08-20T22:05:15.964+07:00Cisco Launches $10 Million Global Cybersecurity Scholarship to Increase Talent Pool; Introduces New and Updated Certifications<b>Cisco Launches $10 Million Global Cybersecurity Scholarship to Increase Talent Pool; Introduces New and Updated Certifications
</b><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="320" src="https://newsroom.cisco.com/documents/10157/1559822/security_20_20150616/b23e57e5-bc08-4ed4-9a5a-889cd45fd3fa?t=1434477904757" width="400" /></a></div>
<div style="text-align: center;">
<b><br /></b></div>
<b><br /></b>
<b>Cisco Press Release:</b><br />
<h2 class="lead" id="gtm-subheadline" style="background-color: white; box-sizing: border-box; color: #222222; font-family: ciscosansttregular, serif; font-size: 16px; font-stretch: normal; font-weight: 100; line-height: 24px; margin: 25px 0px; padding: 0px;">
Company Bolsters Ongoing Efforts to Equip IT Security Industry with Needed Technical Talent to Keep Organizations Secure and Productive in the Digital Age</h2>
<span class="article-date" date="2016-06-14" id="gtm-articledate" style="background-color: white; box-sizing: border-box; color: #999999; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 12px; font-weight: 600; line-height: 20px; text-transform: uppercase;">JUNE 14, 2016</span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><br />
<div id="gtm-articlebody" style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">SAN JOSE, Calif., June 14, 2016</strong> – Cybersecurity provides the critical foundation organizations require to protect themselves, enable trust, move faster, add greater value and grow. However, research indicates there will be a global shortage of two million cybersecurity professionals by 2019. To help close this security skills gap, Cisco is introducing a $10 million Global Cybersecurity Scholarship program and enhancements to its security certification portfolio.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;"><u style="box-sizing: border-box;">The Global Cybersecurity Scholarship Program</u></strong></div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">To address the shortfall of security talent, Cisco will invest $10 million in a two-year Global Cybersecurity Scholarship program to increase the pool of available talent with critical cybersecurity proficiency.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">Cisco will offer training, mentoring and certification that align with the Security Operations Center Analyst industry job role.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">Cisco will deliver the program in partnership with key Cisco Authorized Learning Partners. This training is designed to address the critical skills deficit, providing on-the-job readiness needed to meet current and future challenges of network security.</li>
</ul>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;"><u style="box-sizing: border-box;">Certification Portfolio Updates</u></strong></div>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">Cisco is introducing a new <a href="http://www.cisco.com/go/ccnacyberops" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">Cyber Ops Certification</a> to its portfolio of security certifications and revising its CCIE Security Certification.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">CCNA Cyber Ops focuses on the role of the security analyst working in a Security Operations Center (SOC) which monitors systems and detects attacks. It introduces IT personnel to some of the skills needed in a SOC, giving them an understanding of how responses are coordinated.</li>
</ul>
<ul style="box-sizing: border-box; list-style-position: outside; margin: 1em 1em 1em 2em; padding: 0px;">
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">The CCNA Cyber Ops expands Cisco’s existing associate-level certification offerings, which includes the <a href="https://learningnetwork.cisco.com/community/certifications/security_ccna" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">CCNA Security</a>designation, which focuses on the network security administrator role.</li>
<li style="box-sizing: border-box; margin: 0px; padding: 0px;">The <a href="https://learningnetwork.cisco.com/community/certifications/ccie_security" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">CCIE Security</a> revision addresses new expert-level skills and education needed to prepare security personnel for evolving technologies and security threats. This revision includes assessments on the latest security technologies, including Advanced Threat Protection, Advanced Malware Protection, Next-Generation IPS, Virtualization, Automation and Information Exchange. It also includes a new assessment approach focused on ensuring that candidates demonstrate knowledge and skills with evolving technologies, such as Network Programmability, Cloud and IoT.</li>
</ul>
<div>
Read More Here on Cisco Press Release: https://newsroom.cisco.com/press-release-content?type=press-release&articleId=1772385</div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6225783477685925430.post-2769825623283152062016-08-20T21:55:00.000+07:002016-08-20T21:55:55.900+07:00IP Traffic Will be Tripled by 2020?<div class="separator" style="clear: both; text-align: center;">
<b>IP Traffic Will be Tripled by 2020?</b></div>
<div class="separator" style="clear: both; text-align: center;">
<b><br /></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="320" src="https://newsroom.cisco.com/documents/10157/1559816/iot-ioe_200x156_4/c4d8a053-5fed-48f3-b556-9b888b458634?t=1434578913300" width="400" /></a></div>
<br />
As we already know, devices like smart phones, computers and many more using IP is increasing daily. So, how the IP traffic will be tripled by 2020?<br />
<br />
Base on Cisco Press Release:<br />
<h2 class="lead" id="gtm-subheadline" style="background-color: white; box-sizing: border-box; color: #222222; font-family: ciscosansttregular, serif; font-size: 16px; font-stretch: normal; font-weight: 100; line-height: 24px; margin: 25px 0px; padding: 0px;">
Growth Driven by More Than One Billion New Internet Users and 10 Billion New Devices and Connections Over the Next Five Years</h2>
<span class="article-date" date="2016-06-07" id="gtm-articledate" style="background-color: white; box-sizing: border-box; color: #999999; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 12px; font-weight: 600; line-height: 20px; text-transform: uppercase;">JUNE 07, 2016</span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><span style="background-color: white; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px;"></span><br />
<div id="gtm-articlebody" style="background-color: white; box-sizing: border-box; color: #454545; font-family: Arial, Helvetica, Verdana, sans-serif; font-size: 13.45px; line-height: 18.83px; margin: 0px; padding: 0px;">
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
<strong style="box-sizing: border-box;">SAN JOSE, Calif.</strong> – June 7, 2016— According to today’s release of the Cisco Visual Networking Index™ (VNI) Complete Forecast for 2015 to 2020, global IP traffic will nearly triple at a compound annual growth rate (CAGR) of 22 percent over the next five years. More than one billion new Internet users are expected to join the global Internet community, growing from three billion in 2015 to 4.1 billion by 2020. The global <a href="https://newsroom.cisco.com/country-digitization?CAMPAIGN=VNI+2016&COUNTRY_SITE=us&POSITION=Press+Release&REFERRING_SITE=Cisco+page&CREATIVE=PR+to+Digitazation+page" style="background: 0px 0px; box-sizing: border-box; color: #007fc5; text-decoration: none; transition: color 0.2s ease, background-color 0.2s ease, text-shadow 0.2s ease, box-shadow 0.2s ease, border 0.2s ease;">digitization transformation</a>, based on the adoption of personal devices and deployment of machine-to-machine (M2M) connections will have an even greater impact on traffic growth. Over the next five years, global IP networks will support up to 10 billion new devices and connections, increasing from 16.3 billion in 2015 to 26.3 billion by 2020. There are projected to be 3.4 devices and connections per capita by 2020—up from 2.2 per capita in 2015.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Advancements in the Internet of Things (IoT) are continuing to drive IP traffic and tangible growth in the market. Applications such as video surveillance, smart meters, digital health monitors and a host of other M2M services are creating new network requirements and incremental traffic increases. Globally, M2M connections are calculated to grow nearly three-fold from 4.9 billion in 2015 to 12.2 billion by 2020, representing nearly half (46 percent) of total connected devices. The connected health consumer segment will have the fastest growth (five-fold) of M2M connections from 2015 (144 million) to 2020 (729 million).The connected home segment will have the largest volume of M2M connections over the forecast period with 2.4 billion in 2015, growing to 5.8 billion by 2020—nearly half of all M2M connections.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Video services and content continue to be the dominant leader compared with all other applications. Internet video will account for 79 percent of global Internet traffic by 2020—up from 63 percent in 2015. The world will reach three trillion Internet video minutes per month by 2020, which is five million years of video per month, or about one million video minutes every second. HD and Ultra HD Internet video will make up 82 percent of Internet video traffic by 2020—up from 53 percent in 2015.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
With the growing dependence on mobile and fixed broadband networks, security concerns are increasingly becoming top of mind for service providers, governments, businesses and consumers. For the first time in this forecast, Cisco collaborated with Arbor Networks to help quantify the current and future threats of DDoS (Distributed Denial of Service) attacks. DDoS incidents can paralyze networks by flooding servers and network devices with traffic from multiple IP sources. The new DDoS analysis suggests that these types of breaches can represent up to 10 percent of a country’s total Internet traffic while they are occurring. Over the next five years, DDoS attacks are projected to increase from 6.6 million to 17 million attacks. These initial findings underscore the need for more comprehensive security measures to protect data and reduce network exposure to such risks.</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
“The digital transformation is happening now for billions of consumers and businesses users across the globe,” said Doug Webster, vice president of service provider marketing, Cisco. “Innovation is imperative for Cisco and its service provider customers to deliver scalable, secure, high-quality services and experiences over all types of broadband network infrastructures.”</div>
<div style="box-sizing: border-box; font-size: 15px; line-height: 24px; margin-bottom: 15px; padding: 0px;">
Read More here on Cisco Press Release: https://newsroom.cisco.com/press-release-content?type=press-release&articleId=1771211</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-55972137477422494812016-08-14T22:51:00.000+07:002016-08-14T22:51:35.396+07:00Safe Online Surfing for Your Children<b>Safe Online Surfing for Your Children</b><br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnZCSf_2l1zfK2fWezLVOI5rRvvAwzfwHTCyNLofeXqhtCGfjIfuNdLCW4VPQypxnrRDLp26rkajj7JxVgS0rq1_XwL80rwf6VfaO3HaU2dzbJxXFOsGzxFy_frULXbAB7WxQZmaNB-OuS/s400/aaaonlinsafe.png" width="400" /></a></div>
<b><br /></b>
<b><br /></b>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
Based on FBI(<span style="color: rgba(0, 0, 0, 0.870588); font-family: arial, sans-serif-light, sans-serif; font-size: 19px; line-height: 22.8px;">Federal Bureau of Investigation</span>): The FBI Safe Online Surfing (FBI-SOS) program is a nationwide initiative designed to educate children in grades 3 to 8 about the dangers they face on the Internet and to help prevent crimes against children.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
It promotes cyber citizenship among students by engaging them in a fun, age-appropriate, competitive online program where they learn how to safely and responsibly use the Internet.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
The program emphasizes the importance of cyber safety topics such as password security, smart surfing habits, and the safeguarding of personal information.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
For more information, visit the <a data-linktype="external" data-mce-href="http://sos.fbi.gov" data-urltype="/view" data-val="http://sos.fbi.gov" href="http://sos.fbi.gov/" style="background-color: transparent; box-sizing: border-box; color: #337ab7; text-decoration: none;" target="_blank">Safe Online Surfing website.</a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-38289631283864159312016-08-14T22:37:00.001+07:002016-08-14T22:37:38.576+07:00How to Protect Your Computer from intrusion<b>How to Protect Your Computer from intrusion</b><br />
<b><br /></b>
Everyone may have own computer to access and connecting to Internet. Talking about Internet, Internet is a big network. So, computer is an element or a part of a network. To have a network with security, at first you must think about to secure or to protect your computer.<br />
<b><br /></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="245" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFn_r9QNHSr_lU5kK4hwOy1u0tC5OgsFRgf_purOtH0LlrlNhxJ5TEWWHIeSNjbP5WjxUI1dlm2BOw7qn0sQXHbR-X2E4Hmygv360-6FVPu02EL_y95DG0-eNrH7AWptdA0_S8h5ZF9KzA/s400/aaprotechpc.png" width="400" /></a></div>
<b><br /></b>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
Below are some key steps to protecting your computer from intrusion:</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Keep Your Firewall Turned On:</strong> A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Install or Update Your Antivirus Software:</strong> Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Install or Update Your Antispyware Technology:</strong> Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Keep Your Operating System Up to Date:</strong> Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Be Careful What You Download:</strong> Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<strong style="box-sizing: border-box;">Turn Off Your Computer:</strong> With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users. <b><i>//Source: FBI</i></b></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
Below is the brief step by <span style="color: #006621; font-family: arial, sans-serif; line-height: 16px; white-space: nowrap;">Comodo:</span></div>
<div class="_zXc" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; line-height: 19.2px; margin-bottom: 15px;">
<b>Here are five simple, but critical steps to protect your computer,</b></div>
<div class="_yXc" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; line-height: 19.2px; padding: 0px 20px;">
<ol class="_jYe" style="border: 0px; margin: 0px; padding: 0px;">
<li class="_AXc" style="border: 0px; list-style: inherit; margin: 0px 0px 4px; padding: 0px;">Install Firewall.</li>
<li class="_AXc" style="border: 0px; list-style: inherit; margin: 0px 0px 4px; padding: 0px;">Install Antivirus Software.</li>
<li class="_AXc" style="border: 0px; list-style: inherit; margin: 0px 0px 4px; padding: 0px;">Install Anti-Spyware Software.</li>
<li class="_AXc" style="border: 0px; list-style: inherit; margin: 0px 0px 4px; padding: 0px;">Use Complex and Secure Passwords.</li>
<li class="_AXc" style="border: 0px; list-style: inherit; margin: 0px 0px 4px; padding: 0px;">Check on the Security Settings of the Browser.</li>
</ol>
</div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-12556857658176472042016-06-04T10:47:00.000+07:002016-06-04T10:47:10.490+07:00Learn BGP Protocol: First Basic About BGP You Should Know<b>Learn BGP Protocol: First Basic About BGP You Should Know</b>
<br />
<br />
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNGJA395GTytGAxeQdUB2fxYUaJ6UZEQGzJ_GwTPeOC5JGLUkQyPoFA9JfMUWVNNr7WfOSQpNRtYWdCvEbLjxJJihhEGEwU0HDNgDMuvpPefpvJbO3-rHT6Z_pmB4w44uh395uKOtgFqEQ/s1600/bgp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNGJA395GTytGAxeQdUB2fxYUaJ6UZEQGzJ_GwTPeOC5JGLUkQyPoFA9JfMUWVNNr7WfOSQpNRtYWdCvEbLjxJJihhEGEwU0HDNgDMuvpPefpvJbO3-rHT6Z_pmB4w44uh395uKOtgFqEQ/s400/bgp.png" width="400" /></a></div>
<br />
<br />
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol. The Border Gateway Protocol makes routing decisions based on paths, network policies, or rule-sets configured by a network administrator and is involved in making core routing decisions.
<br />
BGP may be used for routing within an autonomous system. In this application it is referred to as Interior Border Gateway Protocol, Internal BGP, or iBGP. In contrast, the Internet application of the protocol may be referred to as Exterior Border Gateway Protocol, External BGP, or EBGP.
<br />
<br />
- The current version of BGP is version 4 (BGP4 or BGP-4) codified in RFC 4271 since 2006.
<br />
- Version 4 of BGP has been in use on the Internet since 1994. The major enhancement in version 4 was support for Classless Inter-Domain Routing and use of route aggregation to decrease the size of routing tables.
<br />
<br />
- Most Internet service providers must use BGP to establish routing between one another (especially if they are multihomed). Compare this with Signaling System 7 (SS7), which is the inter-provider core call setup protocol on the PSTN.
<br />
- Very large private IP networks use BGP internally. An example would be the joining of a number of large OSPF (Open Shortest Path First) networks where OSPF by itself would not scale to size. Another reason to use BGP is multihoming a network for better redundancy, either to multiple access points of a single ISP or to multiple ISPs.
<br />
<br />
- BGP neighbors, called peers, are established by manual configuration between routers to create a TCP session on port 179.
- When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol). Routers on the boundary of one AS exchanging information with another AS are called border or edge routers or simply eBGP peers and are typically connected directly, while iBGP peers can be interconnected through other intermediate routers. Other deployment topologies are also possible, such as running eBGP peering inside a VPN tunnel, allowing two remote sites to exchange routing information in a secure and isolated manner. The main difference between iBGP and eBGP peering is in the way routes that were received from one peer are propagated to other peers. For instance, new routes learned from an eBGP peer are typically redistributed to all other iBGP peers as well as all eBGP peers (if transit mode is enabled on the router). However, if new routes were learned on an iBGP peering, then they are re-advertised only to all other eBGP peers. These route-propagation rules effectively require that all iBGP peers inside an AS are interconnected in a full mesh.
Filtering routes learned from peers, their transformation before redistribution to peers or before plumbing them into the routing table is typically controlled via route-maps mechanism. These are basically rules which allow the application of certain actions to routes matching certain criteria on either ingress or egress path. These rules can specify that the route is to be dropped or, alternatively, its attributes are to be modified. It is usually the responsibility of the AS administrator to provide the desired route-map configuration on a router supporting BGP.
<br />
<br />
In order to make decisions in its operations with peers, a BGP peer uses a simple finite state machine (FSM) that consists of six states: Idle; Connect; Active; OpenSent; OpenConfirm; and Established. For each peer-to-peer session, a BGP implementation maintains a state variable that tracks which of these six states the session is in. The BGP defines the messages that each peer should exchange in order to change the session from one state to another. The first state is the "Idle" state. In the "Idle" state, BGP initializes all resources, refuses all inbound BGP connection attempts and initiates a TCP connection to the peer. The second state is "Connect". In the "Connect" state, the router waits for the TCP connection to complete and transitions to the "OpenSent" state if successful. If unsuccessful, it starts the ConnectRetry timer and transitions to the "Active" state upon expiration. In the "Active" state, the router resets the ConnectRetry timer to zero and returns to the "Connect" state. In the "OpenSent" state, the router sends an Open message and waits for one in return in order to transition to the "OpenConfirm" state. Keepalive messages are exchanged and, upon successful receipt, the router is placed into the "Established" state. In the "Established" state, the router can send/receive: Keepalive; Update; and Notification messages to/from its peer.
<br />
- Idle State: Refuse all incoming BGP connections.
Start the initialization of event triggers.
Initiates a TCP connection with its configured BGP peer.
Listens for a TCP connection from its peer.
Changes its state to Connect.
If an error occurs at any state of the FSM process, the BGP session is terminated immediately and returned to the Idle state. Some of the reasons why a router does not progress from the Idle state are:
TCP port 179 is not open.
A random TCP port over 1023 is not open.
Peer address configured incorrectly on either router.
AS number configured incorrectly on either router.
<br />
- Connect State: Waits for successful TCP negotiation with peer.
BGP does not spend much time in this state if the TCP session has been successfully established.
Sends Open message to peer and changes state to OpenSent.
If an error occurs, BGP moves to the Active state. Some reasons for the error are:
TCP port 179 is not open.
A random TCP port over 1023 is not open.
Peer address configured incorrectly on either router.
AS number configured incorrectly on either router.
<br />
- Active State: If the router was unable to establish a successful TCP session, then it ends up in the Active state.
BGP FSM tries to restart another TCP session with the peer and, if successful, then it sends an Open message to the peer.
If it is unsuccessful again, the FSM is reset to the Idle state.
Repeated failures may result in a router cycling between the Idle and Active states. Some of the reasons for this include:
TCP port 179 is not open.
A random TCP port over 1023 is not open.
BGP configuration error.
Network congestion.
Flapping network interface.
<br />
- OpenSent State:BGP FSM listens for an Open message from its peer.
Once the message has been received, the router checks the validity of the Open message.
If there is an error it is because one of the fields in the Open message does not match between the peers, e.g., BGP version mismatch, the peering router expects a different My AS, etc. The router then sends a Notification message to the peer indicating why the error occurred.
If there is no error, a Keepalive message is sent, various timers are set and the state is changed to OpenConfirm.
<br />
- OpenConfirm State: The peer is listening for a Keepalive message from its peer.
If a Keepalive message is received and no timer has expired before reception of the Keepalive, BGP transitions to the Established state.
If a timer expires before a Keepalive message is received, or if an error condition occurs, the router transitions back to the Idle state.
<br />
- Established State: In this state, the peers send Update messages to exchange information about each route being advertised to the BGP peer.
If there is any error in the Update message then a Notification message is sent to the peer, and BGP transitions back to the Idle state.
If a timer expires before a Keepalive message is received, or if an error condition occurs, the router transitions back to the Idle state.
<br />
<br />
- The BGP standard specifies a number of decision factors, more than are used by any other common routing process, for selecting NLRI (Network Layer Reachability Information) to go into the Loc-RIB (Routing Information Base). The first decision point for evaluating NLRI is that its next-hop attribute must be reachable (or resolvable). Another way of saying the next-hop must be reachable is that there must be an active route, already in the main routing table of the router, to the prefix in which the next-hop address is reachable.
Next, for each neighbor, the BGP process applies various standard and implementation-dependent criteria to decide which routes conceptually should go into the Adj-RIB-In. The neighbor could send several possible routes to a destination, but the first level of preference is at the neighbor level. Only one route to each destination will be installed in the conceptual Adj-RIB-In. This process will also delete, from the Adj-RIB-In, any routes that are withdrawn by the neighbor.
Whenever a conceptual Adj-RIB-In changes, the main BGP process decides if any of the neighbor's new routes are preferred to routes already in the Loc-RIB. If so, it replaces them. If a given route is withdrawn by a neighbor, and there is no other route to that destination, the route is removed from the Loc-RIB, and no longer sent, by BGP, to the main routing table manager. If the router does not have a route to that destination from any non-BGP source, the withdrawn route will be removed from the main routing table.
<br />
<br />
<i>==>More to come about BGP protocol,Don't forget to check back later,thanks!</i>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-86607316218018987952015-09-19T22:46:00.000+07:002015-09-19T22:46:43.500+07:00Secure Your Network with Cisco Security Device Manager (SDM)<b>Secure Your Network with Cisco Security Device Manager (SDM)</b><br />
<b><br /></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.cisco.com/c/dam/en/us/support/docs/cloud-systems-management/router-security-device-manager/71305-basic-router-config-sdm-18.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.cisco.com/c/dam/en/us/support/docs/cloud-systems-management/router-security-device-manager/71305-basic-router-config-sdm-18.gif" height="265" width="400" /></a></div>
<div style="text-align: center;">
<span style="font-weight: bold;"><br /></span></div>
<br /><div style="text-align: justify;">
Based on CISCO company, Cisco Router and Security Device Manager (SDM) is a Web-based device-management tool for Cisco routers that can improve the productivity of network managers, simplify router deployments, and help troubleshoot complex network and VPN connectivity issues.
Cisco SDM supports a wide range of Cisco IOS Software releases and is available free of charge on Cisco router models from Cisco 830 Series to Cisco 7301. It ships preinstalled on all new Cisco 850 Series, Cisco 870 Series, Cisco 1800 Series, Cisco 2800 Series, and Cisco 3800 Series integrated services routers.
Network and security administrators and channel partners can use Cisco SDM for faster and easier deployment of Cisco routers for integrated services such as dynamic routing, WAN access, WLAN, firewall, VPN, SSL VPN, IPS, and QoS.
Cisco SDM offers smart wizards and advanced configuration support for LAN and WAN interfaces, Network Address Translation (NAT), stateful and application firewall policy, IPS, IPSec VPN, QoS, and NAC policy features. The firewall wizard allows a single-step deployment of high, medium, or low firewall policy settings. Cisco SDM also offers a one-click router lockdown and an innovative security auditing capability to check and recommend changes to router configuration based on ICSA Labs and Cisco TAC recommendations.
Cisco SDM is a valuable productivity-enhancing tool for businesses and channel partners and allows them to implement router security and network configurations with reduced cost and increased confidence and ease. </div>
<div style="font-weight: bold; text-align: justify;">
<br /></div>
<div style="font-weight: bold; text-align: justify;">
Watch video below about: <b>Security Device Manager (SDM) - Cisco CCNA Security Training</b>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/_2oMMK1_rkA" width="420"></iframe>
This video on Cisco's Security Device Manager (SDM) is from our Cisco CCNA Security Series - Implementing Cisco IOS Network Security (IINS) for exam 640-553.
The full series contains 20 videos and is over 11 hours of world class training you can watch anytime, anywhere. Our training comes in High Resolution AVI, iPod and mp3 formats to give you a number of choices in how to study and train.
Our training also comes with MeasureUp exam prep software, to fully prepare for the exam and the real world.
Visit us online at PalaestraTraining.com</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-69877748762814704252015-09-05T12:55:00.002+07:002015-09-05T12:55:36.700+07:00Network Security Fundamentals with APNIC<b>Network Security Fundamentals with APNIC</b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://i.ytimg.com/vi_webp/kcks1FLBVOI/mqdefault.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="225" src="https://i.ytimg.com/vi_webp/kcks1FLBVOI/mqdefault.webp" width="400" /></a></div>
<br />
<b>Asia Pacific Network Information Centre (APNIC)</b>, is the not-for-profit regional Internet registry for the Asia Pacific region.
APNIC provides number resource allocation and registration services that support the global operation of the Internet. It is a not-for-profit, membership-based organization whose members include Internet Service Providers, National Internet Registries, and similar organizations.<br />
<br />
<b>APNIC's main functions are:</b><br />
-->allocating IPv4 and IPv6 address space, and Autonomous System Numbers,<br />
-->maintaining the public Whois Database for the Asia Pacific region,<br />
-->reverse DNS delegations,<br />
-->representing the interests of the Asia Pacific Internet community on the global stage.
<b>==>Watch video: Network Security Fundamentals with APNI:</b>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/kcks1FLBVOI" width="420"></iframe>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-91440078724346238082015-09-01T11:51:00.002+07:002015-09-01T11:51:31.482+07:00You Forget Your Wifi Password?<b>You Forget Your Wifi Password?</b><br />
<br />
<br />
<br />
You have Wifi Internet connection?
Actually, you will put password for the Wifi.
If you forget it, check out below: How To View Your Wifi Password (Security Key) On Computer<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://i.ytimg.com/vi/iuIBDYwVONs/mqdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="225" src="https://i.ytimg.com/vi/iuIBDYwVONs/mqdefault.jpg" width="400" /></a></div>
<b>How To View Your Wifi Password (Security Key) On Computer:</b>
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/iuIBDYwVONs" width="560"></iframe>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-75708829491596874492015-08-26T00:32:00.000+07:002015-08-26T00:32:50.056+07:00Are you upgrade to Windows 10 YET?<b>Are you upgrade to Windows 10 YET?</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://i.ytimg.com/vi_webp/pG3KqqU2uYI/mqdefault.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://i.ytimg.com/vi_webp/pG3KqqU2uYI/mqdefault.webp" width="640" /></a></div>
<br />
Microsoft Windows 10 as I know, is the latest version of Windows produced by Microsoft Company.<br />
<br />
<b>Are you still using Windows XP?</b><br />
For me,the answer is YES! Some of my PCs are small with RAMs or Hardisk or its capacity is not available to upgrade to Windows 7,8 or event the Windows 10.<br />
<br />
If your PCs or laptop is big enough or available to upgrade to the latest version of windows, let upgrade to see the latest technology of Microsoft Windows, one more thing, Windows 10 is the lasted features of security also having in this Windows functions.<br />
<br />
Below are the tops 3 videos related to upgrading Windows 10,let find out...<br />
<br />
<b>Free Upgrade to Windows 10 | July 29 (Step by Step)</b><br />
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/pG3KqqU2uYI" width="560"></iframe><br />
<br />
<b>Windows 10: Should You Upgrade or Clean Install?</b><br />
There are two ways to install Windows 10, an upgrade and a clean install. Here's why you should really do a clean install if you can.<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/eXvtTo2Qtbg" width="560"></iframe><br />
<br />
<b>Windows 10 auto upgrade from 8.1 full process took me 5 hours</b><br />
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/s9_CFedMorQ" width="560"></iframe><br />
<b>Text from this video description:<i></i></b><br />
I upgrade my Windows 8.1 to Windows 10 today 29th of July, the process is straight forward, just reserve your copy then it is automatically download and install. You just do some clicks and wait. However the downloading and installing processes take quite long. Mine is 5 hours plus. But it is worthy to do. Try yourself and good luck with your free copy of Windows 10.<br />
<br />
This upgrade offer is for a full version of Windows 10, not a trial. 3GB download required; internet access fees may apply. To take advantage of this free offer, you must upgrade to Windows 10 within one year of availability. Once you upgrade, you have Windows 10 for free on that device.<br />
<br />
Windows 10 Upgrade Offer is valid for qualified Windows 7 and Windows 8.1 devices, including devices you already own. Some hardware/software requirements apply and feature availability may vary by device and market. The availability of Windows 10 upgrade for Windows Phone 8.1 devices may vary by OEM, mobile operator or carrier. Devices must be connected to the internet and have Windows Update enabled. Windows 7 SP1 and Windows 8.1 Update required. Some editions are excluded: Windows 7 Enterprise, Windows 8/8.1 Enterprise, and Windows RT/RT 8.1. Active Software Assurance customers in volume licensing have the benefit to upgrade to Windows 10 enterprise offerings outside of this offer. To check for compatibility and other important installation information, visit your device manufacturer’s website and the Windows 10 Specifications page. Windows 10 is automatically updated. Additional requirements may apply over time for updates.<br />
<br />
It’s easy to get your free upgrade – here’s how<br />
<br />
Reserve<br />
Use the Get Windows 10 app to reserve your free upgrade to Windows 10. We’ll download Windows 10 to your device and notify you when it’s ready. You can cancel your reservation at any time.<br />
Click on the small Windows icon located at the right end of the taskbar to get started. If you don’t see it, visit our Q&A for more information.<br />
<br />
Right bottom corner of the desktop with a circle around the Windows icon<br />
Click “Reserve your free upgrade” in the app window.<br />
Enter your email if you want confirmation of this reservation.<br />
This free Windows 10 upgrade is available for PCs and tablets; the free Windows 10 Mobile upgrade will be available for most phones starting later this year.<br />
Upgrade<br />
<br />
On 29th July, once the upgrade is ready for your PC, we’ll send you a notification and you can upgrade right away or pick a time that’s good for you.<br />
After you’ve upgraded, you have Windows 10 for free on that device.<br />
Upgrade to Windows 10 with confidence. The Microsoft Answer Desk will be here for you with one-on-one support to get you up and running on Windows 10. For questions about upgrading to Windows 10, take a look at our Windows 10 Q&A or check to see if your question has already been answered in the community forum or post a new one.<br />
----------------------------------------------------------------------------------------<br />
<br />
OR: You Can visit website Microsoft directly about the upgrading to <a href="http://www.microsoft.com/en-us/windows/windows-10-upgrade">Windows 10</a> here: <a href="http://www.microsoft.com/en-us/windows/windows-10-upgrade">http://www.microsoft.com/en-us/windows/windows-10-upgrade</a>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-37394156964109864602015-08-26T00:06:00.000+07:002015-08-26T00:06:50.265+07:00Protecting Investments with Cisco Application Centric Infrastructure<b>Protecting Investments with Cisco ACI</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://i.ytimg.com/vi/TBQXLcUFBu0/mqdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://i.ytimg.com/vi/TBQXLcUFBu0/mqdefault.jpg" width="640" /></a></div>
<br />
<br />
Cisco is the most leading equipment using in network system.<br />
<br />
What is ACI?<br />
<br />
ACI is Cisco Application Centric Infrastructure.<br />
<br />
Investment is said about your business, so it very very important, you need to have an application centric infrastructure by Cisco to protect your business or your investment.<br />
<br />
Let find out more with the video from Cisco below:<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/TBQXLcUFBu0" width="560"></iframe>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-11252944393499236582013-01-10T11:27:00.000+07:002013-01-10T11:27:01.841+07:00Network Security Video Notes: Google knows more than even the government <b>Network Security Video Notes: Google knows more than even the government </b><br />
<br />
Congress is continuing their plea for a comprehensive cybersecurity bill, and their latest attempt to govern the Web is attracting attention of not just the Internet savvy: a new amendment tacked on to a cybersecurity act includes a provision that deals with gun control. What is the meaning behind Washington's relentless attack on Internet freedoms, and does it even really matter? Private investigator Steven Rambam of Pallorium Inc. explains how Google already provides anyone with access to "private" information, and how a partnership with the US government could only expand the intel held by both entities to an alarming amount.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="262" src="http://i4.ytimg.com/vi/q2qO_l9iqNY/mqdefault.jpg" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"><span style="font-size: x-small;"><b> Google knows more than even the government </b></span></div><br />
<b>Watch Google knows more than even the government Video:</b><br />
<br />
<center><script src="https://sites.google.com/site/visalittleboy/Home/jwplayer.js" type="text/javascript">
</script><br />
<div id="mediaspace">Watch The Future of Computer Security</div><script type="text/javascript">
jwplayer('mediaspace').setup({
'flashplayer': 'https://sites.google.com/site/visalittleboy/Home/player.swf',
'file': 'http://www.youtube.com/watch?v=q2qO_l9iqNY',
'controlbar': 'over',
'width': '470',
'height': '360'
});
</script><br />
</center>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-35956152475216895122012-12-13T19:13:00.000+07:002013-01-10T11:22:29.065+07:00Network Security Video Notes: Secure Your Future <b>Network Security Video Notes: Secure Your Future</b><br />
<br />
When your network goes down, you can lose a lot more than just your information. Having a way to effectively secure your network and your physical business location is crucial to ensuring a perpetually productive and successful business.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="262" src="http://i4.ytimg.com/vi/fuqALlqA8-E/mqdefault.jpg" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"><span style="font-size: x-small;"><b> Secure Your Future </b></span></div><br />
<br />
<b>Watch Secure Your Future Video:</b><br />
<br />
<center><script src="https://sites.google.com/site/visalittleboy/Home/jwplayer.js" type="text/javascript">
</script><br />
<div id="mediaspace">Watch The Future of Computer Security</div><script type="text/javascript">
jwplayer('mediaspace').setup({
'flashplayer': 'https://sites.google.com/site/visalittleboy/Home/player.swf',
'file': 'http://www.youtube.com/watch?v=fuqALlqA8-E',
'controlbar': 'over',
'width': '470',
'height': '360'
});
</script><br />
</center>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-77467928605692934262012-11-14T15:04:00.001+07:002012-12-13T19:13:44.928+07:00Network Security Video Notes: Watch The Future of Computer Security<b>Network Security Video Notes: Watch The Future of Computer Security</b><br />
<br />
Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture is from Singularity University's Graduate Summer Program 2009. <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://networksecuritynotes.blogspot.com/"><img border="0" height="262" src="http://i4.ytimg.com/vi/t8QuUEwrKm8/mqdefault.jpg" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"><span style="font-size: x-small;"><b>The Future of Computer Security</b></span></div><br />
<br />
<b>Watch The Future of Computer Security:</b><br />
<br />
<center><script src="https://sites.google.com/site/visalittleboy/Home/jwplayer.js" type="text/javascript">
</script><br />
<div id="mediaspace">Watch The Future of Computer Security</div><script type="text/javascript">
jwplayer('mediaspace').setup({
'flashplayer': 'https://sites.google.com/site/visalittleboy/Home/player.swf',
'file': 'http://www.youtube.com/watch?v=t8QuUEwrKm8',
'controlbar': 'over',
'width': '470',
'height': '360'
});
</script><br />
</center>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-41805538949755606762012-11-02T18:44:00.001+07:002012-11-02T18:44:45.482+07:00Network Security Videos News: Internet Blocked In China During 18th Congress <b>Internet Blocked In China During 18th Congress </b><br />
<br />
The CCP's 18th Congress is approaching, and the ramped up<br />
security work has spread to the network.<br />
The China's MIIT claimed, in order to ensure the telecom<br />
network security during the 18th Congress,<br />
a nation-wide network blockade will apply from November 7<br />
to the end of the 18th Congress.<br />
Some analysts pointed out that the<br />
Chinese Communist Party (CCP) is testing people's reaction.<br />
A network blockade is to ensure the smooth flow of the network<br />
on the surface, but the essence is to strengthen the monitoring of the network.<br />
<br />
According to the China IDC Circle website news, the network<br />
blockade from MIIT has made certain requirements.<br />
First, to implement a "person in charge" in all units and<br />
all levels to ensure a smooth 24-hour contact among relevant persons<br />
so that if anything should happen, they can<br />
quickly report to their superiors.<br />
<br />
In addition, it requires all provinces, autonomous regions,<br />
and municipalities directly under the Central Government<br />
to strengthen the supervision and management of the safe<br />
operation of telecommunications networks in the area.<br />
as well as safety production and interoperability.<br />
Any violators who affect the operation of the network security<br />
and interoperability will be severely punished.<br />
<br />
In this regard, Hu Jun, "Rights Movement" network manager,<br />
commented, to ensure smooth network traffic<br />
is the surface reason, in reality, it is to strengthen monitoring<br />
of the network.<br />
<br />
"Rights Movement" network manager Hu Jun:<br />
"Just for a few days of meetings, you block everything?<br />
What are you afraid of?<br />
Online communication is normal for citizens.<br />
Who are your enemies and what are you so afraid of?<br />
To protect the 18th Congress? Why do you need to protect it?<br />
From your establishment to the present,<br />
you always make sneaky moves.<br />
If the Party were legitimate,<br />
you should not be afraid of the public."<br />
<br />
Hu Jun said that the 18th Congress is an assembly<br />
for transferring power.<br />
Only when you do something not righteous,<br />
will you be afraid of letting people know.<br />
<br />
Hu Jun: "The handover of power itself involves the issue<br />
of dividing up interest.<br />
This is a very clear problem, re-dividing the blood<br />
and sweat of the Chinese people.<br />
This process is not any different than the mafia's style.<br />
<br />
No one knows yet so far what would happen to the wealth<br />
from Xilai's corruption."<br />
<br />
Columbia University visiting scholar Gu Chuan said that<br />
the CCP Internet blockade is normal.<br />
It strengthens the blockade during the 18th Congress.<br />
<br />
Gu Chuan: "In the report, it states maintaining smooth<br />
contact 24 hours a day, including with other websites.<br />
They asked the websites to be ready for 24-hour emergency.<br />
<br />
However, the CCP will certainly strengthen<br />
network blockade during the 18th Congress.<br />
Its purpose is to prevent people from knowing what people<br />
overseas think of the 18th Congress."<br />
<br />
Gu Chuan also added that there is no truth in China<br />
and "truth" is monopolized by the CCP officials.<br />
The messages of truth circulating on the network<br />
will be quickly deleted.<br />
<br />
Gu Chuan: "In addition to the truth about the persecution<br />
of Falun Gong and the repression of democracy activists,<br />
there is also the political struggles within the Party, princelings,<br />
and factions, including the collusion between Zhou Yongkang and Bo Xilai.<br />
The CCP does not want people to know any of these,<br />
so during the two sessions it will strengthen the blockade."<br />
<br />
Some analysts pointed out, the news of the "network blockade"<br />
was not disclosed by "Xinhua News Agency" or "People's Daily."<br />
It was by the semi-official "21st Century Financial Network."<br />
It is estimated that the CCP wants to test the public reaction.<br />
But in any case, as long as anything important occurs during<br />
the 18th Congress, the CCP is bound to take some measures.<br />
That means telephone, telecommunications, networks,<br />
and other public dissemination tools will be cut off.<br />
<br />
<b>Watch Video: Internet Blocked In China During 18th Congress </b><br />
<center><iframe width="336" height="280" src="http://www.youtube.com/embed/H1TjGc32C_4" frameborder="0" allowfullscreen></iframe></center>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-49904986905165279372012-11-02T18:37:00.002+07:002012-11-02T18:37:56.056+07:00Network Security News: Huawei and ZTE pose national security threat, US committee findsWell as you may already know:<br />
<br />
<b>Huawei Technologies Co. Ltd.</b> is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China. It is the largest telecommunications equipment maker in the world, after having overtaken Ericsson.<br />
<br />
Huawei was founded in 1988 by ex-military officer Ren Zhengfei and formed as a private company owned by its employees. Its core missions are building telecommunications networks; providing operational and consulting services and equipment to enterprises inside and outside of China; and manufacturing communications devices for the consumer market. Huawei has over 140,000 employees, around 46% of whom are engaged in research and development (R&D). It has 20 R&D institutes in countries including China, the United States, Germany, Sweden, India, Russia, and Turkey, and in 2011 invested around US$3.74 billion in R&D.<br />
<br />
In 2010, Huawei recorded profit of 23.8 billion CNY (3.7 billion USD). Its products and services have been deployed in more than 140 countries and it currently serves 45 of the world's 50 largest telecoms operators.<br />
<br />
Critics have pointed to the issues Huawei has with intellectual property rights, security concerns and treatment of its workforce and customers. Huawei representatives have in turn denied or disputed these allegations. <i>Source: Wikipedia</i><br />
<br />
<b>ZTE Corporation</b> (formerly Zhongxing Telecommunication Equipment Corporation) (SZSE: 000063; SEHK: 0763) is a Chinese multinational telecommunications equipment and systems company headquartered in Shenzhen, China. It is the world's fourth-largest mobile phone manufacturer measured by 2011 unit sales and the world's fifth-largest telecoms equipment maker measured by 2011 revenues (after Ericsson, Huawei, Alcatel-Lucent and Nokia Siemens Networks).<br />
<br />
ZTE's core products are wireless, exchange, access, optical transmission and data telecommunications gear; mobile phones; and telecommunications software. It also offers products that provide value-added services, such as video on demand and streaming media. ZTE primarily sells products under its own name but it is also an OEM, manufacturing some products which retail under other brand names.<br />
<br />
ZTE was founded in 1985 by a group of state-owned enterprises associated with China's Ministry of Aerospace. <i>Source: Wikipedia</i><br />
<br />
According to much concern or most concentration on security threat, we got a news related to the both Chinese companies mentioned above that found by US committee, that's Huawei and ZTE pose national security threat...<br />
<br />
<b>Huawei and ZTE pose national security threat, US committee finds</b> <br />
<br />
<blockquote>After a year-long investigation, a US congressional committee on Monday concluded that Chinese telecommunication equipment vendors Huawei Technologies and ZTE pose a security threat to the US, with lawmakers advising US private-sector firms to not buy networking gear from the companies....</blockquote><br />
Read more: <a href="http://news.techworld.com/security/3404032/huawei-and-zte-pose-national-security-threat-us-committee-finds/" target="_blank">Huawei and ZTE pose national security threat, US committee finds</a>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-48287450312895529702012-10-03T15:50:00.000+07:002012-11-02T18:42:05.716+07:00Network Security News: Cyber Attacks from China on Crucial US Government Network <b>Cyber Attacks from China on Crucial US Government Network </b><br />
<br />
A cyber attack on a secure US government network has confirmed fears that Chinese hackers are trying to gain access to classified defense information.<br />
<br />
The attack came in September in the form of what's called spear phishing - an email with an attachment or bad link leading to a malicious website. The attack was linked to computer servers in China.<br />
<br />
Fox News reported an unnamed source saying it was sent to someone in the White House Communications Agency. The employee opened the email against protocol but reportedly the attack was contained. The Communications Agency is responsible for internal White House communication as well as broader communication controlling nuclear commands. An unnamed White House official told the AP there was no indication that any information was obtained through the attack.<br />
<br />
During his visit to Beijing this September, US Defense Secretary Leon Panetta raised concerns over the issue of cyber warfare. He called it the "potential battlefield of the future" and cited cyber attacks originating in China. He said he opened the discussion with Chinese leaders on international rules and standards for cyber warfare, but no concrete actions had been taken.<br />
<br />
The cyber attacks have not been directly linked to the Chinese regime. However, published writings by the People's Liberation Army show that cyber attacks are a part of China's military strategy.<br />
<br />
For more news and videos visit ☛ http://english.ntdtv.com<br />
Follow us on Twitter ☛ http://twitter.com/NTDTelevision<br />
Add us on Facebook ☛ http://on.fb.me/s5KV2C<br />
<br />
Watch the video of Cyber Attacks from China on Crucial US Government Network from NTD below:<br />
<br />
<b>Cyber Attacks from China on Crucial US Government Network:</b><br />
<center><iframe width="420" height="315" src="http://www.youtube.com/embed/369NRBR1rCk" frameborder="0" allowfullscreen></iframe></center>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com1tag:blogger.com,1999:blog-6225783477685925430.post-42132481141002718652012-07-24T14:37:00.000+07:002012-07-25T11:14:54.911+07:00Cisco to cut 1,300 jobs in realignment<b>Cisco to cut 1,300 jobs in realignment</b><br />
<br />
According to an AFP reported, Cisco Systems said Monday it was cutting 1,300 jobs, or two percent of its global workforce, in response to an uncertain economic outlook.<br />
<br />
In its most recent quarter, Cisco posted a profit of $2.2 billion on $11.6 billion revenues, but shares tumbled at the time on a weaker-than-expected outlook.<br />
<br />
Cisco shares were down 1.8 percent at $16.07 in the regular session on Wall Street Monday, from recent highs in April above $20.<br />
<br />
Let me quote the reported from AFP:<br />
<br />
<blockquote>NEW YORK: US computer network giant Cisco Systems said Monday it was cutting 1,300 jobs, or two percent of its global workforce, in response to an uncertain economic outlook.<br />
<br />
The California tech firm, seen as a bellwether for the industry, said it was carrying out "a focused set of limited restructurings" that include the job cuts.<br />
<br />
"We routinely review our business to determine where we need to align investment based on growth opportunities," the San Jose, California firm known for its Internet hardware, in a statement.<br />
<br />
"Additionally, we continue to evaluate our organizational structure as part of our plan to drive simplicity, speed of decisions and agility across Cisco."<br />
<br />
The statement added: "As we focus on both of these efforts, we are performing a focused set of limited restructurings that will collectively impact approximately two percent of our global employee population.<br />
<br />
"These actions, subject to local legal requirements, including consultation where required, are part of a continuous process of simplifying the company, as well as assessing the economic environment in certain parts of the world."<br />
<br />
In its most recent quarter, Cisco posted a profit of $2.2 billion on $11.6 billion revenues, but shares tumbled at the time on a weaker-than-expected outlook.<br />
<br />
Cisco shares were down 1.8 percent at $16.07 in the regular session on Wall Street Monday, from recent highs in April above $20.<br />
<br />
-AFP/ac<br />
<br />
</blockquote><br />
<br />visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-63109862558892406792012-07-23T20:27:00.000+07:002012-07-23T20:27:15.521+07:00The First CCIE in CambodiaThe proverb “like father, like son” explains the inevitable similarities between parents and their offspring. In Cambodia these similarities often extend to the professional realm, as it is quite common for children to take over the family business when the opportunity arises. Pheng Sovanvichet’s parents expected him to do the same thing, encouraging him to study medicine so he could take over their pharmacy when they retired. But he had other plans. “My parents wanted me to study medical science when I finished high school because we have our own pharmacy,” said the 25-year-old pioneer. Instead he enrolled as a scholarship student of economics and information technology at the Royal University of Law and Economics.<br />
<br />
Today his decision has proven to be a good one, as the IT-specialist is the only person in Cambodia who can call themselves a Cisco Certified Internetwork Expert. After years studying abroad, Pheng Sovanvichet has now brought his talents back home, working with Wicam Corporation as an IP Core Network Specialist and Sunrise Informatics Center as a Cisco instructor.<br />
<br />
While he said he has been obsessed with technology since he was 8 years-old, it was a conversation with a couple he met in Chinese-language classes that piqued his interest in Cisco.<br />
<br />
“One day Mr Bryan (the husband) told me about his job, his duties and even his salary of US$1.6 million dollars per year, which made me so interested,” he said.<br />
<br />
He occasionally consulted the couple for help, but spent hours alone learning about the cutting-edge technology. “Sixty percent of my time and effort was for Cisco, while the other 40 percent was for university,” he said.<br />
<br />
In 2007, he successfully reached the first level of Cisco certification, becoming a Cisco Certified Network Associate (CCNA) with a perfect score of 1,000 out of 1,000 on the company’s test. Realising he couldn’t advance further on his own, he enrolled at Ya Wei Training Institute in China to study with Cisco experts. In 2008, he took the exam for the next level of Cisco operators and once again got a perfect score. In his spare time that year he also created a website to share his ideas and experience about new technology and Cisco with fellow IT experts in Cambodia and around the world at khmeritforum.net.<br />
<br />
After another year of studying, he tested to become a Cisco Certified Internetwork Expert in Routing and Switching. In 2009 he passed the written exam and in 2010 he passed the lab test to become the first person in Cambodia and the 26,884th person in the world to reach Cisco’s highest level of expertise.<br />
<br />
Even after his much-celebrated accomplishment, the tech whiz is still not content. “There are always new things being discovered,” he said. “So I have to keep updating myself. I plan to get another CCIE in security; since when Cambodia has a network infrastructure, security will be needed.”<br />
<br />
<i>Source: <a href="Youth of the week: Pheng Sovanvichet ">Phnompenhpost</a></i>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-38397245063214893142012-07-06T18:12:00.000+07:002012-07-25T11:16:10.844+07:00Network Security Notes: Network Security Hot News: DNSChanger malware may cause thousands to lose internet access<a href="http://networksecuritynotes.blogspot.com/" target="_blank"><b>DNSChanger malware may cause thousands to lose internet access</b></a><br />
<br />
<i>Source: Heraldsun Australia</i><br />
<i><br />
TENS of thousands of computer users across the world - including 6000 Australians - may lose their internet access on Monday when a virus security fix expires. </i><br />
<br />
The problem stems from malicious software, or malware, known as DNSChanger, which was created by cybercriminals to redirect internet traffic by hijacking the domain name systems of web browsers.<br />
<br />
The ring behind the DNSChanger virus, discovered in 2007, was shut down last year by the US Federal Bureau of Investigation (FBI), Estonian police and other law enforcement agencies.<br />
<br />
Because the virus controlled so much web traffic, authorities obtained a court order to allow the FBI to operate replacement servers which allow traffic to flow normally from infected computers.<br />
<br />
But that order expires on Monday, when experts say infected computers will face an "internet doomsday".<br />
<br />
The FBI, Facebook, Google, internet service providers and security firms have been scrambling to warn users about the problem and direct them to fixes.<br />
<br />
According to a working group set up by experts, more than 300,000 computers remained infected as of June 11.<br />
<br />
The largest number were in the United States (69,000), but more than a dozen countries - including Australia, Italy, Germany, India, Britain, Canada and France - are also believed to have infected computers.<br />
<br />
Around 6000 Australians affected by the DNSChanger malware will have no internet from 2pm AEST on July 9 as the temporary solution switches off, the Australian Communications and Media Authority told AAP.<br />
<br />
Australians can go to http://dns-ok.gov.au/ to check if their computer is affected.<br />
<br />
Security experts say it's not clear how many of the affected computers are active.<br />
<br />
"Reaching victims is a very hard problem, and something we have had issues with for years," said Johannes Ullrich, a researcher with the SANS Security Institute.<br />
<br />
But he said he expected the impact to be "minimal" because many of these systems are no longer used or maintained.<br />
<br />
Users who think they are infected may perform a test at the DNSChanger Working Group's website http://www.dcwg.org/ or others operated by various security firms.<br />
<br />
The security firm internet Identity said last week that at least 58 of all Fortune 500 companies and two out of 55 major government entities had at least one computer or router that was infected with DNSChanger.<br />
<br />
That's an improvement over January, when half of Fortune 500 companies and US federal agencies were infected.<br />
<br />
"DNSChanger is an insidious form of malware affecting everyone from the everyday consumer to a large chunk of the Fortune 500," said IID chief executive Lars Harvey.<br />
<br />
IID said that the malware also compromises computers by preventing antivirus software updates.<br />
<br />
"This enables criminals to view any data, messages exchanged and more on a victim's computer, depending on what the victims' machines are infected with," the company said.<br />
<br />
The security firm McAfee, which also offers a diagnostic tool at http://www.mcafee.com/dnscheck, said users must act before Monday to clean their computers.<br />
<br />
"If users' computers have the wrong DNS settings for the servers, they will not be able to access websites, send email or use internet services," a McAfee statement said on Thursday.<br />
<br />
Google said in May it was seeking to notify 500,000 users of likely infections who were using the FBI servers.<br />
<br />
Google spokesman Jay Nancarrow said on Thursday it was not clear how many remain infected.<br />
<br />
"We've notified many people and have seen some clean-up as a result, but we expect others with affected devices will likely encounter problems after the deadline passes," he told AFP.<br />
<br />
For computers affected, the blackout will be total, experts say.<br />
<br />
"Connectivity will be lost to the internet PERIOD," said a blog posting from the security firm Symantec.<br />
<br />
"If your computer is still using DNS entries that are pointing to the FBI servers on July 9, you will lose TOTAL access to the internet. No connecting to the office from home, no updating Facebook, nothing until the DNS settings are fixed."<br />
<br />
Six Estonians and a Russian were charged last November with infecting computers, including NASA machines, with the malware as part of an online advertising scam that reaped at least $US14 million.<br />
<br />
The internet fraud, which took place between 2007 and October 2011, involved redirecting users searching for websites such as iTunes, Netflix and even the US tax collection agency.<br />
<br />
At least four million computers located in over 100 countries may have been infected.<br />
<br />
<b>DNSChanger Malware from FBI.GOV:</b><br />
<br />
DNS (Domain Name System) is an Internet service that converts user-friendly domain names into the numerical Internet protocol (IP) addresses that computers use to talk to each other. When you enter a domain name, such as www.fbi.gov, in your web browser address bar, your computer contacts DNS servers to determine the IP address for the website. Your computer then uses this IP address to locate and connect to the website. DNS servers are operated by your Internet service provider (ISP) and are included in your computer’s network configuration. DNS and DNS Servers are a critical component of your computer’s operating environment—without them, you would not be able to access websites, send e-mail, or use any other Internet services.<br />
<br />
Criminals have learned that if they can control a user’s DNS servers, they can control what sites the user connects to on the Internet. By controlling DNS, a criminal can get an unsuspecting user to connect to a fraudulent website or to interfere with that user’s online web browsing. One way criminals do this is by infecting computers with a class of malicious software (malware) called DNSChanger. In this scenario, the criminal uses the malware to change the user’s DNS server settings to replace the ISP’s good DNS servers with bad DNS servers operated by the criminal. A bad DNS server operated by a criminal is referred to as a rogue DNS server.<br />
<br />
The FBI has uncovered a network of rogue DNS servers and has taken steps to disable it. The FBI is also undertaking an effort to identify and notify victims who have been impacted by the DNSChanger malware. One consequence of disabling the rogue DNS network is that victims who rely on the rogue DNS network for DNS service could lose access to DNS services. To address this, the FBI has worked with private sector technical experts to develop a plan for a private-sector, non-government entity to operate and maintain clean DNS servers for the infected victims. The FBI has also provided information to ISPs that can be used to redirect their users from the rogue DNS servers to the ISPs’ own legitimate servers. The FBI will support the operation of the clean DNS servers for four months, allowing time for users, businesses, and other entities to identify and fix infected computers. At no time will the FBI have access to any data concerning the Internet activity of the victims.<br />
<br />
It is quite possible that computers infected with this malware may also be infected with other malware. The establishment of these clean DNS servers does not guarantee that the computers are safe from other malware. The main intent is to ensure users do not lose DNS services.<br />
<br />
<b>What Does DNSChanger Do to My Computer?</b><br />
<br />
DNSChanger malware causes a computer to use rogue DNS servers in one of two ways. First, it changes the computer’s DNS server settings to replace the ISP’s good DNS servers with rogue DNS servers operated by the criminal. Second, it attempts to access devices on the victim’s small office/home office (SOHO) network that run a dynamic host configuration protocol (DHCP) server (eg. a router or home gateway). The malware attempts to access these devices using common default usernames and passwords and, if successful, changes the DNS servers these devices use from the ISP’s good DNS servers to rogue DNS servers operated by the criminals. This is a change that may impact all computers on the SOHO network, even if those computers are not infected with the malware.<br />
<br />
<b>Am I Infected?</b><br />
<br />
The best way to determine if your computer or SOHO router has been affected by DNSChanger is to have them evaluated by a computer professional. However, the following steps can help you gather information before consulting a computer professional.<br />
To determine if a computer is using rogue DNS servers, it is necessary to check the DNS server settings on the computer. If the computer is connected to a wireless access point or router, the settings on those devices should be checked as well.<br />
<br />
<b>Checking the Computer:</b><br />
<br />
If you are using a Windows computer, open a command prompt. This can be done by selecting Run from the Start Menu and entering cmd.exe or starting the command prompt application, typically located in the Accessories folder within Programs on your Start Menu...<br />
<br />
At the command prompt, enter:<br />
ipconfig /all<br />
Look for the entry that reads “DNS Servers……….”<br />
<br />
The numbers on this line and the line(s) below it are the IP addresses for your DNS servers. These numbers are in the format of nnn.nnn.nnn.nnn, where nnn is a number in the range of 0 to 255. Make note of the IP addresses for the DNS servers and compare them to the table of known rogue DNS servers listed later in this document. If the IP addresses of your DNS server appear in the table below, then the computer is using rogue DNS.<br />
<br />
You can also look for your DNS servers without using the command prompt.<br />
For windows XP machines, click on Start and select My Network Places. Then select Network Connections. In this example, the wireless connection is used.....<br />
<br />
<b>Checking the Router</b><br />
<br />
Small office/home office routers connect your network of computers and devices to your Internet service provider. The SOHO router may have been purchased and installed by you or installed by your ISP. Linksys, D-Link, Netgear, and Cisco are common SOHO router brands, but there are many others.<br />
<br />
The DNSChanger malware is capable of changing the DNS server settings within SOHO routers that have the default username and password provided by the manufacturer. If you did not change the default password at the time the SOHO router was installed, you must check the SOHO router settings.<br />
<br />
The procedure to access your SOHO router setting varies by manufacturer, so consult your product documentation. Once you have access to the SOHO router configuration, compare the DNS servers listed to those in the rogue DNS servers table above. If your SOHO router is configured to use one or more of the rogue DNS servers, a computer on your network may be infected with DNSChanger malware.<br />
<br />
<b>What Should I Do?</b><br />
<br />
In addition to directing your computer to utilize rogue DNS servers, the DNSChanger malware may have prevented your computer from obtaining operating system and anti-malware updates, both critical to protecting your computer from online threats. This behavior increases the likelihood of your computer being infected by additional malware. The criminals who conspired to infect computers with this malware utilized various methods to spread the infections. At this time, there is no single patch or fix that can be downloaded and installed to remove this malware. Individuals who believe their computer may be infected should consult a computer professional.<br />
Individuals who do not have a recent back-up of their important documents, photos, music, and other files should complete a back-up before attempting to clean the malware or utilize the restore procedures that may have been packaged with your computer.<br />
<br />
Information regarding malicious software removal can be found at the website of the United States Computer Emergency Readiness Team: https://www.us-cert.gov/reading_room/trojan-recovery.pdf.<br />
<br />
<b>For details news about DNSChanger Malware, please visit:</b><br />
<br />
http://www.heraldsun.com.au/news/national/dnschanger-malware-may-cause-thousands-to-lose-internet-access/story-fncynkc6-1226419316723<br />
<br />
http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf<br />
<br />visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-2483116110042558562012-07-03T18:01:00.000+07:002012-07-06T18:11:04.593+07:00Network Security Notes: Great Video For Network Security: Intrusion Detection and Network Security Perspectives From A Veteran<b>Intrusion Detection and Network Security Perspectives From A Veteran</b><br />
<br />
This post, I would like to share a great video related to Network Security Perspectives. It's a great video with long details presentation...<br />
<br />
<br />
Talk by Martin Roesch, Chief Technical Officer, Sourcefire, part of the Google and University of Maryland Cybersecurity Seminar Series<br />
<br />
It's been over 12 years since the Snort® project was released. Millions of downloads and trillions of packets later many lessons have been learned. In that time it has gone from being a weekend project to the worldwide standard implementation of a fundamental component of securing networks against cyber attacks. Join Snort's original author, Martin Roesch, CTO of Sourcefire, as he discusses the past, present and future of network security architecture and technology.<br />
<br />
Biography: Martin Roesch founded Sourcefire in 2001 and serves as its Chief Technology Officer (CTO). A respected authority on intrusion prevention and detection technology and forensics, he is responsible for the technical direction and product development efforts for Sourcefire's commercial and open source product offerings. With nearly 20 years of industry experience in network security and embedded systems engineering, Roesch has dedicated himself to developing intelligent network security tools and technologies to address evolving threats. Roesch has been interviewed as an industry expert in multiple technology publications, as well as print and online news services, such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Roesch founded Sourcefire® in 2001 and is the author and lead developer of the Snort® Intrusion Prevention and Detection System that forms the foundation for the Sourcefire IPSTM. Roesch has received a host of awards of his technology innovation and vision. Most recently, he was recognized as a 2010 Security Superstar by Everything Channel's CRN magazine for the value his innovations provide partners and customers, and was selected as one of eWeek's Top 100 Most Influential People in IT. Roesch holds a B.S. in Electrical and Computer Engineering from Clarkson University.<br />
<br />
<b>Intrusion Detection and Network Security Perspectives From A Veteran:</b><br />
<iframe width="420" height="315" src="http://www.youtube.com/embed/ooVZk7w4kqo" frameborder="0" allowfullscreen></iframe>visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0tag:blogger.com,1999:blog-6225783477685925430.post-14710000173752153972012-06-14T11:21:00.001+07:002012-07-06T18:11:32.392+07:00Network Security Notes: Internet Security: The Father of the Internet Explains the Tracking the Internet into the 21st Century<b>Network Security Notes: Internet Security: The Father of the Internet Explains the Tracking the Internet into the 21st Century </b><br />
<br />
Billion people using Internet today, regarding the Internet security reasons, this post I would like to share with you a video lecture presentation by a Google person, Mr.Vint Cerf, the Chief Internet Evangelist at Google. He talks to an audience about the past and future of the internet and its continuing development. His talk includes information about current needs for internet research including internet security, improved networks and IPv6 addresses at <a href="http://www.stanford.edu/">Stanford University</a>, January 9, 2008. <br />
<br />
This is very great video to watch since you want to learn more about Internet security...<br />
<br />
<b>Tracking the Internet into the 21st Century:</b> <br />
<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/fpNWQiVpjvY" width="420"></iframe><br />
<br />
<i>Wikipedia:</i> Vinton Gray "Vint" Cerf, born June 23, 1943 is an American computer scientist, who is recognized as one of "the fathers of the Internet", sharing this title with American computer scientist Bob Kahn. His contributions have been acknowledged and lauded, repeatedly, with honorary degrees and awards that include the National Medal of Technology, the Turing Award, the Presidential Medal of Freedom, and membership in the National Academy of Engineering.<br />
<br />
In the early days, Cerf was a program manager for the United States Department of Defense Advanced Research Projects Agency (DARPA) funding various groups to develop TCP/IP technology. When the Internet began to transition to a commercial opportunity during the late 1980s,[citation needed] Cerf moved to MCI where he was instrumental in the development of the first commercial email system (MCI Mail) connected to the Internet.<br />
<br />
Vinton Cerf was instrumental in the funding and formation of ICANN from the start. Cerf waited in the wings for a year before he stepped forward to join the ICANN Board. Eventually he became the Chairman of ICANN. Cerf was elected as the president of the Association for Computing Machinery in May 2012.visalittleboyhttp://www.blogger.com/profile/16906526424565765159noreply@blogger.com0