UK: Google Wi-Fi collection violated data protection laws

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

UK: Google Wi-Fi collection violated data protection laws


UK: Google Wi-Fi collection violated data protection laws

Posted: 03 Nov 2010 09:00 AM PDT


The U.K.'s data protection watchdog said on Wednesday that Google violated the law with its Street View Wi-Fi collection program, but it is letting the company off with a warning and not imposing a fine.

How to respond to an unexpected log on request

Posted: 03 Nov 2010 09:00 AM PDT


For the past three days I've been getting a 'Windows Security' pop-up that says 'Logon to UKOnline.co.uk' (my ISP). It requests the username and password among other information, but nothing happens.

Lock Down Your Android Devices

Posted: 03 Nov 2010 09:00 AM PDT


Two years ago almost nobody had heard of Android. Now it's nearly ubiquitous among smartphone users, and it's on track to become the most popular mobile operating system in the United States. When it comes to business use, though, Android still has some growing to do. Here's how to keep your Android phones and tablets safe from malware and hackers.

ICO orders Google to delete Wi-Fi data

Posted: 03 Nov 2010 09:00 AM PDT


The Information Commissioner's Office (ICO) has ordered Google to delete the Wi-Fi data the search engine accidentally collected using its Street View Cars.

Clean an infected email address book

Posted: 03 Nov 2010 09:00 AM PDT


People in my address book are receiving emails from me, but I'm not sending them. Each message contains a link to what I believe is a malicious website. Can you help?

Google’s Bug Bounty Program: Barbarians at the Gate

Posted: 03 Nov 2010 09:00 AM PDT


Google is offering hackers the chance to win a cash bounty if they can find vulnerabilities in the search giant's top Web applications such as YouTube, Blogger, Gmail and Google.com. Successful Google invaders can be awarded up to $3,133.70 for their hack as well as get their name added to a Google credit Web page.

Paid app, cloud service secure consumer Android phones

Posted: 03 Nov 2010 09:00 AM PDT


A new paid security app from Lookout Mobile Security works with the vendor's cloud-based services to detect and block smartphone malware on Android phones, and to backup more types of user data.

Tokenization: Five Things CIOs Need To Know

Posted: 03 Nov 2010 09:00 AM PDT


Data breaches are expensive-they cost an average of $6.75 million per incident, according to one study. One way to reduce the risk is to cut down on the places that handle sensitive data. Enter tokenization.

How FedEx Improved Security, Eased Access

Posted: 03 Nov 2010 09:00 AM PDT


By moving to an identification badge-management application, FedEx simplified its ID process from three badges to one while saving money and boosting security.

What You Need to Know About New IE Zero-Day

Posted: 03 Nov 2010 09:00 AM PDT


Internet Explorer is under attack again. Microsoft has issued a security advisory explaining a newly-discovered exploit impacting most versions of the Internet Explorer Web browser. The security advisory contains details about the threat, as well as some guidance to protect vulnerable browsers pending a patch from Microsoft to fix the hole.

Cisco rolls out social network monitoring software

Posted: 03 Nov 2010 09:00 AM PDT


Cisco this week unveiled software designed to let companies track customers and prospects on social media networks like Twitter, Facebook, blogs and other public forums and sites.

Basic Cisco Switch Configuration

Posted: 04 Nov 2010 02:59 AM PDT


In my opinion, the Cisco switches are the best in the market. Versatile, reliable, flexible and powerful, the Cisco switch product line (such as the 2960, 3560, 3750, 4500, 6500 etc) offer unparalleled performance and features.

Although a Cisco switch is a much simpler network device compared with other devices (such as routers and firewalls for example), many people have difficulties to configure a Cisco Catalyst Switch. Unlike other lower class switch vendors (which are plug-and-play), the Cisco switch needs some initial basic configuration in order to enable management, security and some other important features.

In this article I will describe the basic steps needed to configure a Cisco switch from scratch. I don't like graphical GUI or web management at all, so I will show you command line configuration which is much more powerful and makes the administrators learn what they are doing on the device.

STEP1: Connect to the device via console

Use a terminal emulation software such as PuTTY and connect to the console of the switch. You will get the initial command prompt "Switch>"

Type "enable" and hit enter. You will get into privileged mode ("Switch#")

 Now, get into Global Configuration Mode:

Switch# configure terminal
Switch(config)#

STEP2: Set up a hostname for the particular switch to distinguish it in the network

Switch(config)# hostname access-switch1
access-switch1(config)#

STEP3: Configure an administration password (enable secret password)

access-switch1(config)# enable secret somestrongpass

STEP4: Configure a password for Telnet access

access-switch1(config)# line vty 0 15
access-switch1(config-line)# password strongtelnetpass
access-switch1(config-line)# login
access-switch1(config-line)# exit
access-switch1(config)#

STEP5: Define which IP addresses are allowed to access the switch via Telnet

access-switch1(config)# ip access-list standard TELNET-ACCESS
access-switch1(config-std-nacl)# permit 10.1.1.100
access-switch1(config-std-nacl)# permit 10.1.1.101
access-switch1(config-std-nacl)# exit

!Apply the access list to Telnet VTY Lines
access-switch1(config)# line vty 0 15
access-switch1(config-line)# access-class TELNET-ACCESS in
access-switch1(config-line)# exit
access-switch1(config)#

STEP6: Assign IP address to the switch for management

!Management IP is assigned to Vlan 1 by default
access-switch1(config)# interface vlan 1
access-switch1(config-if)# ip address 10.1.1.200 255.255.255.0
access-switch1(config-if)# exit
access-switch1(config)#

STEP7: Assign default gateway to the switch

access-switch1(config)# ip default-gateway 10.1.1.254

STEP8: Disable unneeded ports on the switch

! This step is optional but enhances security
! Assume that we have a 48-port switch and we don't need ports 25 to 48

access-switch1(config)# interface range fe 0/25-48
access-switch1(config-if-range)# shutdown
access-switch1(config-if-range)# exit
access-switch1(config)#

STEP9: Save the configuration

access-switch1(config)# wr

The above are some steps that can be followed for basic set-up of a Cisco switch. Of course there are more things you can configure (such as SNMP servers, NTP, AAA etc) but those depend on the requirements of each particular network.

0 comments:

Post a Comment