Posts

Showing posts from February, 2020

Tips on how to prevent ransomware attacks

Is your computer protected against ransomware attacks? Ransomware is a type of malware (malicious software) which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device. This article teaches you all there is to know about ransomware prevention. We explore the different ways to protect your computer and your data from ransomware attacks. In this article, we will look at: How to prevent ransomware What to do if you experience a ransomware attack Ransomware removal Notorious 2018 ransomware attacks How to protect your computer from ransomware Ransomware prevention In this section, we give you tips on how to prevent ransomware attacks, from never clicking on unverified links, to avoiding using unfamiliar USBs. Read on to learn more about ransomware prevention. know more :  ransomware prevention

What Is a Server Address?

The Open Systems Interconnect (OSI) model for network communications establishes a layered approach to communicating between computers on a network. Each layer of this seven-layer model may have its own way of referring to the other computers with which it communicates. This means that any given network server may have many different addresses on file--for use with the different communications layers at work. Ethernet Working at layer two of the OSI model, all systems connected to an ethernet network will have a unique ethernet address. This address is expressed as a set of eight hexadecimal values, such as 00-2B-78-5F-03-8A. This address may be used by network switches and bridges to help constrain and route traffic to this particular server. Internet Protocol The Internet Protocol, working at layer three of the OSI model, establishes a unique IP address for every machine on the Internet. IP addresses have three parts: network address, node address and subnet mask. Though the o

Troubleshooting NTLM

This section provides help for diagnosing and resolving any issues that might arise when configuring NTLM.Alfresco supports NTLM v2 protocol, which is more secure than NTLM v1 protocol. However, NTLM v2 cannot be used with pass-through authentication. You will have to switch to NTLM v1 if you want to use pass-through authentication, where Alfresco passes the log on request to an Active Directory or other server to validate the login credentials. roubleshooting This problem is most likely caused by enhanced security in Windows 7, Vista and Windows 2008. Previous versions of Windows (XP) would fall back to NTLM v1, if NTLM v2 failed. On Windows 7 clients, navigate to Control Panel > Administrative Tools > Local Security Policy. In the left pane, navigate to Security Settings > Local Policies > Security Options. In the right pane, find Network Security: LAN Manager authentication level. By default, the value of Network Security: LAN Manager authentication level is

How Can I Lower an Upstream Power Level?

Upstream power levels that are too high will affect a modem connection's consistency. As the levels increase, the modem's ability to connect to the provider decreases, which may cause the modem to power down or disconnect. As with all modulation signals, the upstream power level tends to fluctuate depending on various influences including temperature and signal interference. If the problem is on your end, it may be due to poor cabling, bad connections or a faulty splitter. Troubleshoot your upstream power levels by first capturing the initial results and then begin going through the procedures necessary to identify the problem. Step 1 Connect your computer directly to the modem, using an Ethernet cable. Open a Web browser and type your router's IP address in the address bar, such as "192.168.0.1." This accesses the modem's software interface. Step 2 Click the "Status," "Signal" or "Statistics" link. The names can vary by ma

Disabling Storage of the LM Password Hash

You want to prevent the LM hash for new passwords from being stored in Active Directory. The LM hash is susceptible to brute force attacks and is primarily used for backward compatibility with Windows 95 and 98 clients. Solution For Windows 2000, you need to create the following Registry key on all domain controllers: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\NoLMHash. Note that this is a key and not a value entry. Also, this is only supported on W2K SP2 and later domain controllers. For Windows Server 2003, the NoLMHash key has turned into a DWORD value entry under the HKLM\SYSTEM\CurrentControlSet\Control\Lsa key. This value should be set to 1. You can accomplish this by modifying the Default Domain Controller Security Policy as described next. Using a graphical user interface 1.Open the Group Policy Object Editor and target the Default Domain Controller Security Policy. 2.In the left pane, expand Local Policies → Security Options. 3.In the right pane, double-click on Ne

How to Validate Windows

Microsoft protects its software copyrights with validation codes and product keys. One way they do this is through a program called "Windows Genuine Advantage." This program requires that you validate your copy of Windows to make sure it is "genuine" before you can access the "advantages" of the Microsoft website. When you purchased your Windows software, you were supplied a product key that is necessary for Windows to install. Validation simply checks that product key against Microsoft's database to ensure your copy of Window has not been pirated. Windows Validation Step 1 Go to the Windows validation website (See Resources). Step 2 Click "Validate" in the menu bar beneath the page title "Genuine Microsoft Software." Microsoft download websites typically support Internet Explorer, but if you are using Mozilla Firefox, you will be redirected to a download page that is compatible with your browser. Step 3 Click the "V

How to Set Up an Email Server on My Own Local LAN

An email server allows users to filter, verify and authenticate emails before sending them to the designated recipients. It is possible to set up an email server on your local LAN, by installing the optional Simple Mail Transfer Protocol (SMTP) service in a Windows computer connected to the network. The computer must have Microsoft Windows Server or Internet Information Services (IIS) installed. Once the email server is activated, you can relay email to connected email client applications. Install the Email Server Step 1 Click "Start," then "Control Panel" and double-click "Add or Remove Programs." Step 2 Click "Add/Remove Windows Components" in the left pane of the window. Click "Application Server" in the "Components" list, then click "Details." Step 3 Click "Internet Information Services (IIS)" from the "Subcomponents of Application Server" list, then click "Details." Ste

Low latency networks for financial and trading applications

Financial and trading firms don’t care about a “fair game”, all they care is winning and making a profit. Thanks to high-end technology, they have the ability to trade extremely fast which gives them advantages on the market. Low latency networks are the weapons of choice! The trading game is still the same, what has changed is the technology behind it. Supercomputers are replacing those agitated traders at the halls of the exchange office trying to pass their orders. Today is no longer  the guy who can scream and jump louder, but  the equipment that can process and send orders faster. This high demand for speed in trading and financial networks has brought a new kind of technology into the field.  Today, a financial firm with the right technology is able to process an order in less than 400 microseconds (µs or 0.0004 second), more than twice the speed of a camera’s flash. find more :  lan manager

Making a Case for Cloud Data Lakes

Data lakes are having a moment. According to one recent report, they are expected to grow by about 30% over the next five years. Tomer Shiran, CEO of data-as-a-service vendor Dremio, explains what they are, why they make sense in the cloud and how to make them work best for your company. Dremio has its own cred: Founded just five years ago, the company is routinely named to "best of" lists, including Pagan Research's list of "Most Promising Big Data Startups in the World" and CRN's "10 Hottest Big Data Startups of 2019." What is a data lake? It provides a united source for all data in an organization by replacing the many siloed file and object stores that hold collections of data that tend to spring up inside organizations. Data lakes are also inherently open, providing clear separation of storage from compute and processing, and provide a non-proprietary storage alternative compared to ingesting data into proprietary solutions such as data w

Windows 7 Network security: LAN Manager authentication level

Some smb shares on linux server works with Windows 7 and some has authentication issue.  All works with windows XP.  I had to set to "send LM and NTLM response" under local security policy for the client computer for it to connect to the linux file server.  Why do I have to set manually, why isn't this default on windows 7, and what would prompt some linux server to work and some to not? LM and NTLM version 1 are extremely insecure methods of password hashing. All versions of Windows and server include backward compatibility for older versions of Windows and applications. As we see newer operating systems (like Win 7) they will default to a more secure method to help protect the password hashes. Therefore, when using Windows 7 you will likely need to force it to use this backward compatibility if you are connecting to something that doesn't support the newer methods like NTLM v2 or Kerberos. As for your specific situation; are the Linux servers running different

Life as a NOC Technician: What to Expect in Your Role

A NOC (pronounced knock) is shorthand for a Network Operations Center. A NOC is normally configured as a single large room for remote monitoring and management of IT infrastructure. A NOC usually looks like the “war room” from the movie WarGames. A wall of large monitors displays real-time data at the front, and rows of workstations where technicians observe the vitals on their assigned endpoints, taking action as necessary. If you’re thinking about taking a job as a NOC technician or NOC engineer, it’s wise to familiarize yourself with the roles, responsibilities, and the work environment. It takes a unique style of IT professional to fit into the NOC flow. Read on to determine if a career in Network Operations makes sense for you. What Is a NOC? Such a sophisticated monitoring operation is clearly not something every company has or needs. But companies that directly manage any type of critical IT infrastructure will almost certainly have a NOC. Therefore, you could probably exp

What Is VPN?

A VPN is a way to connect to the internet through an encrypted connection. When you access a website, upload data to an app or check your email, the VPN encrypts all your communications and sends them to a server run by the VPN provider, which then sends them on to their destination. That is useful for preserving your privacy when you don't trust the network you're on, whether it's an internet service provider or a Wi-Fi connection at an airport or coffee shop. You can also use a VPN to connect to a corporate network for work purposes. Many companies use this method to limit access to their internal networks to employees with VPN usernames and passwords and to encrypt their connections to work machines. How Does VPN Work? A VPN encrypts all the data you send from your computer across the internet, shapes it into specially formatted packets of data and sends them to the VPN server. The server has digital keys it can use to decrypt the data, but anybody else without the

Types of Software Security

Any software designed to identify, prevent, stop and repair the damage caused by others on your computer or network can be called security software. Security software may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves. Firewall A firewall prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access. Antivirus Antivirus software works

What Are the Advantages and Disadvantages of Using a Firewall?

For the vast majority of businesses in operation today, firewalls act as a hidden "shield" against various threats lurking on the internet, including hackers intent on probing your data. In the vast majority of scenarios, business owners probably don't even realize that they are receiving all of the benefits of firewalls through their operating system, router and other internet peripherals, the vast majority of which incorporate firewall technology into their default setups. While their are a variety of obvious benefits of firewalls, the most commonly discussed being improved network security, there are also various drawbacks which may be encountered by those managing firewalls in the professional environment. Understanding how the advantages and disadvantages of internet security as it is provided by firewalls can help you better comprehend the best way you can use these tools in conjunction with your business. Identifying Disadvantages of Firewall Technology Althoug

What Makes Up a Network Security Solution

Network security components consist of many pieces, including: Anti-virus and anti-spyware Web protection Email security Backup and recovery Network Security Payoffs Network security has a number of benefits for defending your clients’ businesses against threats. Obviously the number one advantage is minimizing the level of risk for attacks, infections, and breaches. For most companies, reaching an acceptable level of security can be difficult, if not impossible, to achieve on their own, even for organizations that have their own IT staff and help desk. With the right network security tools, however, MSPs can offload the security yoke from organizations and protect their clients’ computer systems, networks, files, and data from attacks and breaches. Keeping files free from infection is particularly important in today’s collaborative workplace, where information is shared among co-workers inside a company as well as with partners, consultants, analysts, and others outside

How to quickly set up a VPN or Proxy

When they ask me about a good VPN service, I don’t know what to say. The essence of all services is the same - hiding your IP and access to blocked resources. Someone does it better, and someone worse. As a result, the choice of service is reduced to the personal requirements of the questioner. I can only tell which service is worth a try. And in this article I will talk about ALTVPN. The name of the service stands for Alternative Secure Services, and in fact ALTVPN is an alternative VPN. Let's see why. On a separate page, you can get detailed instructions for installing ALTVPN on your device. I will not talk about manual configuration through PPTP or OpenVPN, everything is too individual here and requires experience. But ordinary users can download the application for their device. This setup takes literally half a minute. For example, on Windows, when starting the application, you just need to specify the user code, select the connection server and click the "Connect&

Networking Basics: What are BGP Route Reflectors for IPv6

Route reflectors are networking routing components specific to border gateway protocol, commonly known as BGP. Route reflectors are an alternative to the full-mesh requirement of internal BGP (IBGP), and act as a focal point for IBGP sessions. Because route reflectors can propagate IBGP routes to other IBGP peers, a full mesh of IBGP peers is not necessary. Network Block Advertisement The concept of a route reflector is consistent across IP version 4 as well as 6, but the topology used here refers to IPv6. In the diagram below, the red dotted lines represent external BGP relationships, while the blue dashed lines reflect the internal neighborships within the AAS. The Role of Route Reflectors If R3 follows the rule and does not advertise the prefix to its internal neighbors, R4 and R5 will not learn it. The purpose of route reflectors is to fix that problem. To do so, the route reflector simply instructs R3 that, when it receives an advertisement from an IBGP neighbor (in this