Chinese companies join to rid handsets of poisoned apps

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Chinese companies join to rid handsets of poisoned apps


Chinese companies join to rid handsets of poisoned apps

Posted: 07 May 2010 09:00 AM PDT


More than a dozen mobile phone makers in China have teamed up to tackle a growing problem of poisoned software applications in handsets that steal money from users.

Verizon and Novell team up on cloud security

Posted: 07 May 2010 09:00 AM PDT


Verizon and Novell have teamed up to deliver a cloud-based security solution

Q&A: Facebook users aren't outraged over privacy issues

Posted: 07 May 2010 09:00 AM PDT


Facebook executive Ethan Beard defended the firm's privacy policies, noting that users join the social network specifically to share personal information with others.

You don't know tech: The InfoWorld news quiz

Posted: 07 May 2010 09:00 AM PDT


Apple will not be mocked; Facebook takes its share of knocks

Unfortunate domain name attracts script-kiddies

Posted: 07 May 2010 09:00 AM PDT


Website defacements are nothing new, and are a rather trifling concern for security managers. They are low-hanging fruit, and the artworks of budding professional hackers and would-be penetration testers.

Comparing Cisco IOS Configurations

Posted: 07 May 2010 07:30 AM PDT


In our day to day work as network administrators it is often necessary to compare configuration files of Cisco routers or switches. As we know, a characteristic of Cisco IOS is that the configuration files are stored in text format, but still a line by line comparison of different config files is tedious and in many cases almost impossible. For this reason it would be useful to present some methods that allow us to perform this comparison task with full automation.

Configuration files comparison using specialized software

One option to help us compare Cisco configuration files is to export the config files in text format and then use a program to perform line by line comparison. The easier way to export a configuration file in text format is to execute the command "show run" or "show startup", press the "space bar" key several times until the end of the configuration and then copy and paste the lines from the Terminal screen to a text editor.

A free program available on the Internet to compare text files is Compare It 4. It can be downloaded from the official site: http://www.grigsoft.com/wincmp3.htm

Using Cisco IOS Commands

From IOS version 12.3 (4)T, the comparison can be made directly on the IOS command line.
The commands to compare the running configuration from the startup configuration are the following:

Router> enable
Router # show archive config differences system: running-config nvram: startup-config

Contextual Config Diffs:
+ ip dhcp excluded-address 172.16.1.106 172.16.1.254
- ip dhcp excluded-address 172.16.1.160 172.16.1.254

To understand the output above, you need to know the following:

  • The plus symbol (+) means that the configuration line exists in the "startup-config" but not in the "running-config"
  • The minus symbol (-) means that the configuration line exists in "running-config" but not in "startup-config".

In our example above, there is a command in backup configuration file (startup-config) that excludes address range 172.16.1.106 up to 172.16.1.254 from the DHCP address pool.

The comparison shows that someone has entered and changed the range of excluded addresses, and replaced it by range 172.16.1.160 to 172.16.1.254 and did not save the changes. That's why the changes are only present in the active configuration (running-config). The command which is present in the running-config is preceded by the minus (-) symbol.

In our example above, the only difference between the two files are the two excluded-address commands. If there were more differences they would be listed as well. The command only displays the lines of the files in which there are differences.

I hope the post was helpful. If you have any more information or you want to provide additional references on the file comparison feature feel free to comment below.

CCNA Certification Exam Tutorial: Cisco Switching Modes

Posted: 07 May 2010 01:59 AM PDT


To pass the CCNA exam and earn this important certification, you've got to know switching inside and out. While you're learning all the basic switching theory, make sure to spend some time with the one of three switching modes Cisco routers can use.

Store-and-Forward is exactly what it sounds like. The entire frame will be stored before it is forwarded. This mode allows for the greatest amount of error checking, since a CRC (Cyclical Redundancy Check) is run against the frame before it is forwarded. If the frame contains an error, it is discarded. If there's no problem with the frame, the frame is then forwarded to its proper destination.

While store-and-forward does perform error checking, the delay in processing the frame while this error check is run results in higher latency than the other modes you're about to read about. The latency time can also vary, since not all frames are the same size.

Cut-through switching copies only the destination MAC address into its memory before beginning to forward the frame. Since the frame is being forwarded as soon as the destination MAC is read, there is less latency than store-and-forward. The drawback is that there is no error checking.

There is a middle ground, fragment-free switching. Only part of the frame is copied to memory before it is forwarded, but it's the first 64 bytes of the frame, not just the destination MAC. (Why? Because if there is a problem with the frame, it's most likely in the first 64 bytes.) There is a little more error checking than cut-through, but not as much latency as with store-and-forward.

Consumer groups hammer Facebook privacy violations in federal complaint

Posted: 06 May 2010 09:00 AM PDT


Detailed legal complaint against Facebook alleges privacy violations stemming from recent feature changes.

Security firm reveals Microsoft's 'silent' patches

Posted: 06 May 2010 09:00 AM PDT


Microsoft silently patched three vulnerabilities last month, two of them affecting enterprise mission-critical Exchange mail servers, without noting the bugs publicly, a security expert said today.

CSO Compass Awards 2010: Richard Gunthner

Posted: 06 May 2010 09:00 AM PDT


Law enforcement is nothing new to Richard Gunthner. At MasterCard, he is the liaison to a number of agencies, including the FBI, Secret Service, CIA and Department of State. When he was the Regional Security Manager for American Airlines, he fought terrorism, drug trafficking, human smuggling and travel documentation fraud. He is highly regarded by peers in the industry association ASIS. In every context, he emphasizes the importance of understanding security's impact on the business.

Facebook, It's Time to Get Serious About Privacy

Posted: 06 May 2010 09:00 AM PDT


Google yesterday blew out half a candle, celebrating the six-month anniversary of its Dashboard feature. The quiet celebration marked half a year spent trying to increase transparency and protect our privacy online, a lesson that fellow Web giant Facebook needs to learn.

Microsoft goes small for next week's Patch Tuesday

Posted: 06 May 2010 09:00 AM PDT


Microsoft today said it would patch two critical vulnerabilities with two updates to Windows and Office next week.

0 comments:

Post a Comment