What You Don't Know about Your Online Reputation Can Hurt You

.
0 comments

What You Don't Know about Your Online Reputation Can Hurt You


What You Don't Know about Your Online Reputation Can Hurt You

Posted: 31 May 2010 09:00 AM PDT


Social networking, and the broader concept of online privacy, have been under some rather intense scrutiny over the past couple of weeks. The issues at Google--voracious indexer of all things Internet, and Facebook--the largest social network and number one most visited site (according to Google) have made many users more acutely aware of what information is available about them on the Internet. However, your online reputation is being used in ways you may not be aware of, and could cost you.

Don't Let Your PC Join the Zombie Hordes

Posted: 31 May 2010 09:00 AM PDT


You may not be aware of this, but aside from Cinco de Mayo, Mother's Day, and Memorial Day, there is another important event in the month of May--Zombie Awareness Month. While the month is intended to honor the sort of Zombieland, Night of the Living Dead, or Michael Jackson's Thriller type zombies, it also seems like an appropriate time to address PC zombies and how to ensure that the computers on your network don't become compromised and join the zombie hordes.

Endpoint security: managing enterprise smartphone risk

Posted: 31 May 2010 09:00 AM PDT


Almost by the day, enterprises are becoming more receptive to the consumerisation of IT and introduction of mobile devices and platforms into their environment.

Introduction to Cisco’s CCIP Certification

Posted: 31 May 2010 04:52 AM PDT


Most people who work with Cisco equipment know that there are some routers out there that are the real carrier class type of kit. So what would it take to get your hands on those? CCIP Cisco Certified Internetwork Professional is good step in that direction.

As with most Cisco Professional certifications a valid CCNA is a pre-requisite in order for you to obtain the CCIP. Again, as the other Cisco Professional certifications, this one is valid for 3 years.

Now where would a person start his or her CCIP quest? 4 exams are needed but where do you begin? BSCI, Building Scalable Cisco Internetworks [642-601] is a good place to start. It will count towards your CCNP and CCIP and gives you a good overview of interior routing protocols and basic BGP introduction. This is not an easy exam because of the broad spectrum of knowledge you need to acquire but who said that CCIP was a walk in the park.

Now there are 2 options you can sit the BGP [642-611] and MPLS [642-611] exam separately or you can do a composite type of exam BGP+MPLS [642-691]. Both exams build on each other so sitting the composite is good way of testing your knowledge of the ISP core protocols. The exams are really the heart of the CCIP certification and are the proof that this certification is categorized under the Service Provider on Cisco's career certifications part of their website.

Finally 1 exam has to be mastered in order to obtain the CCIP and that is QoS, Quality of Service [642-642]. A benefit of this exam is that is also counts towards CCVP, Cisco Certified Voice Professional. This one will cover he QoS methods used in a service provider/voip environment.

To recertify your CCIP you need to sit either the current BGP+MPLS exam or the current versions of the two separate exams. Another way to recertify is by passing a current CCIE written exam.

Overall the CCIP is good stepping stone into the service provider world. It is a very though path, but it will open doors into the challenging world of the ISP's, big telcos, etc. And on a personal note, passing my CCIP made me more interested in taking the steps to achieve my CCIE Service Provider because of the technologies and challenges involved in the internetworking world we live in today.

Configuring SNMP Security

.
0 comments

Configuring SNMP Security


Configuring SNMP Security

Posted: 30 May 2010 04:19 AM PDT


There is no specific command that you use to enable SNMP. To configure SNMP support, perform the tasks described in the following steps, only the first two steps are mandatory:

1.Enable the SNMP community string to define the relationship between the network
management station and the agent with the following command:

snmp−server community {ro|rw} {number}

The number value references an optional access−list.

2.Use this command to configure the router to send traps to an NMS host:

snmp−server host host [version {1|2c}]


3.Configure the type of traps for which a notification is sent to the NMS. You do so with the following command:

snmp−server enable traps [notification type] –
[notification option]

4.Set the system contact, location, and serial number. You can set the systems contact with the snmp−server contact [text] command. You set the location with the snmp−server location [text] command, and you set the serial number with the snmp−server chassis−id [text] command.

5.Use the access−list command to specify a list of hosts that are allowed read−, read/write, or write−only access to the router.

The picture below: shows Router 1, which is configured to allow SNMP read−only access and read/write access from two separate hosts. Router 1 is also configured to send SNMP trap information to the same two hosts. The following lines show how Router 1 should be configured so SNMP access from both host 192.168.10.1 and 192.168.10.2 is allowed and SNMP trap information is sent to both hosts:

access−list 12 permit 192.168.10.1
access−list 13 permit 192.168.10.2
snmp−server contact VISA
snmp−server location Network Engineers
snmp−server chassis−id 200000444
snmp−server community observe RO 12
snmp−server community adjust RW 13
snmp−server host 192.168.10.1 observe snmp
snmp−server host 192.168.10.2 adjust snmp


Router 1 configured for SNMP

$100 million 'scareware' CEO was already a fugitive

.
0 comments

$100 million 'scareware' CEO was already a fugitive


$100 million 'scareware' CEO was already a fugitive

Posted: 29 May 2010 09:00 AM PDT


The CEO of a company accused of making more than US$100 million selling harmful "scareware" antivirus products was already a fugitive from U.S. authorities, following his arrest in 2008 on criminal counterfeiting charges.

Adobe considers more frequent patch schedule

Posted: 28 May 2010 09:00 AM PDT


Adobe Systems is considering patching its applications more frequently after moving to a quarterly patching schedule for its Acrobat and Reader programs last year.

iPhone Security Flaw: Using a PIN Won't Help You

Posted: 28 May 2010 09:00 AM PDT


Using a four-digit PIN to lock your iPhone doesn't really protect your data, security and IT blogger Bernd Marienfeldt has discovered. In an article describing the iPhone's business security framework, Marienfeldt has found a "data protection vulnerability" in Apple's iPhone 3GS.

Google Wi-Fi Snooping Should Serve As Security Wakeup Call

Posted: 28 May 2010 09:00 AM PDT


The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon. Peeved government officials in both Europe and the U.S. are pressing Google for more details on how the search company's Street View cars managed to cull personal data from Wi-Fi networks that weren't password-protected.

Surprise! Young users most in tune with online privacy

Posted: 27 May 2010 09:00 AM PDT


A Pew survey found that younger users of social networks -- those under 30 -- are more likely to take steps to limit access to information they have posted online.

Symantec Promises Safer Surfing with Norton DNS

Posted: 27 May 2010 09:00 AM PDT


Symantec announced Norton Everywhere today--a new approach to security that abandons the traditional PC-centric model and takes a more holistic approach to delivering security across all Internet-enabled devices. Norton DNS, a component of Norton Everywhere, provides alternative DNS servers that can be used by any Internet-connected device for a faster and more secure surfing experience.