Monday, 9 January 2012

Looking Best Network Management For Your Business

Network management means diverse things to diverse people. In some cases, it involves a single system specialist monitor network activity with an outdated protocol analyzer. In other cases, network management involves a dispersed database, auto poll of network devices, and high-end workstations generating immediate graphical view of system topology change and traffic. In general, Network management San Diego is an overhaul that employs a diversity of tools, applications, and devices to help out human network managers in monitoring and maintaining networks.

Any number or combination of network management disciplines can be outsourced including:

helpdesk and break-fix services
slip management
configuration running
change organization
asset administration
presentation management
service level organization


Your computer and networks need standard care to carry out at their optimal level. As your IT manager, Computer services San Diego monitors your computers and network health on a daily basis. Having this information permits us to proactively uphold your network and suggest strategic guidance before trouble occurs. Companies realize the cost remuneration and productivity gains produced by network expertise, they begin to add networks and enlarge reachable networks almost as rapidly as new network technology and products were introduced.

As companies realized the productivity gains and cost benefits created by network technology, they begin to enlarge network and add network almost as fast as new set-up technologies and products were introduce. Some companies were experience growing pains from deploy so many different network technologies. A qualified system services supplier such as Network management San Diego has the capability to adapt quickly to your evolving business needs and match its services to your specific requirements. In addition, you will have web admission to presentation reporting, while allowing a professional network services company to handle the day-to-day network management responsibilities.

The job will still be rigid, but the network will be more manageable. These deadly and time overpowering tasks can be made easier with software network management. Now your job will be less demanding. Instead of have to play catch up, you can now set up working on that promotion you have required. With fewer stresses and more time on your hands, you can with no trouble start making improvement that will be noticed.

Sunday, 8 January 2012

The different myths about Facebook social network

Facebook is a social networking website founded by Mark Zuckerberg and launched in February 2004. It currently has over 650 million users and is the most popular social networking website in the world. Considering its popularity, it is only natural there have been lots of rumors, myths and misgivings about the website. Many of these are entertaining and some others are just silly. Here is a list of some of the most well known myths circulating around in the web space.

◦Facebook is a stolen idea:

This is probably the most popular myth about facebook online. Mark was signed up along with a bunch of Harvard students to create ConnectU. Instead he neglected his work on that website and came up with Facebook before ConnectU was even launched. This does make him look like a villain, but to put it in perspective, Mark had actually already launched a website called Facemash before. Mark claimed that his work ‘Facebook’ was a natural extension of the ideas he had used in Facemash. Eventually though Facebook did end up paying $61 million in an out of court settlement to the founders of ConnectU.

◦Facebook will eventually be a paid service:

This myth clearly originated from people who do not understand how the Internet works. If Facebook starts charging its users, not all of its current 640 million users will be able to afford it, eventually leading users to move on the free social networking services. Also considering Facebook rolls in the millions from advertising to all these users, it just doesn't make any sense to charge users for it.

◦Facebook is primarily used by kids and undergrads:

When Facebook first arrived at the scene, it was meant only for Mark and his classmates. But within a year, its popularity shot up, but was still used primarily used by college students. This era did not last long either, and by 2006 only about one third of all its members were below the age of 25. Currently it has a user base ranges from students, to office goers, to housewives alike.

◦Facebook doesn't give two hoot about your privacy:

This myth also originates from a complete misunderstanding of an Internet business. An organization with a sound advertising model does not need to sell your data to make money, just because their services are free. Selling data would create a huge outcry from privacy advocates, which would eventually lead to the downfall of the given website. It is just easier and more profitable to not scare your users into leaving.

◦Facebook is going to sell your data: Facebook isn't charging you to use their network but in the end has to make some money. So they might be starting to sell your private information, like selling the email addresses etc.

Friday, 6 January 2012

Securing Your Network from Web Threats

With this post, I make another step into blogging by publishing a guest post written by the kind folks at GFI Software, a great security vendor and friends. Here it goes :

Securing Your Network from Web Threats

There is a price to pay for everything – while the Internet has proven to be an indispensable communication, research and promotional tool for most organizations, with it come a series of web threats and security risks.
What are the risks involved?

Studies have shown that a good amount of employee daily Internet activity is spent on non work-related sites. Morse PLC, for example, reported that 57% of office workers use social networking sites for an average of 40 minutes a day. Moreover Nielsen research revealed that the greatest number of Internet videos watched was on weekdays between 12.00pm and 2.00pm, meaning when most people were at work.

This not only reflects one of the primary side effects of employee Internet use, cyberslacking, which results in lost productivity, but it also indicates that the corporate network is exposed to a series of web threats throughout the day. Harmless-looking websites could be hosting malware and, as a result, if an employee carelessly accesses such sites or downloads files from them, the network is then exposed to a series of security risks. Google Advisory, for example, has shown that frequently visited social networking sites, such as Facebook and Twitter, are regular victims of malware (read more).

Once a company network is infected with malware or spyware, depending on the damage caused, the business experiences a series of negative repercussions which can interrupt, or even halt, its daily operations. Furthermore, in certain cases data could also be compromised or stolen, meaning the company could also end up facing serious legal charges.

What should be done?

Enforcing web security is therefore essential for organizations to protect their systems from web threats. The first step an organization should take is to set an Internet usage policy with clear guidelines as to what type of web use is considered acceptable, while also informing employees that their Internet usage is being controlled.  Controlling employee Internet usage is possible using web monitoring software; the knowledge that their web activities are being monitored encourages employees to curb their non work-related browsing; this in turn – decreases the possibility of accessing dangerous sites.

The next, and most important, step is to make use of a solid web filtering solution which offers protection to the corporate network by checking downloads for malicious payloads and quarantining or deleting infected files. The chosen web filtering solution should also offer the ability to examine websites and scan for hidden files or scripts that are covertly downloaded when the user opens a link to that particular page.

The Way Forward

Businesses need to understand the concept that prevention is better than cure – the savings made in worker productivity, IT labor, and bandwidth – not to mention the cost of defending the organization in court – not only compensate for the investment in a web monitoring and filtering solution but also provides ongoing value.
This guest post was provided by Christina Goggi on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. More information: GFI internet monitoring software.
All product and company names herein may be trademarks of their respective owners.

How I'm Learning Mobile App Development

by: wkriski

I started out my journey to learn mobile application development by using Google to make sense of the landscape. Because I didn't want to learn a myriad of different platforms (for each type of mobile device) I persistently searched for a better way.



Eventually I found out about PhoneGap which allows you to write mobile apps using HTML5, CSS, and Javascript which is great because these are standard technologies. While I have some experience with them things have changed quite a bit.

So I bought a few book on these topics (including jQuery) and read the books to get an overview. But when I started coding I realized in general the books aren't that helpful. I was still pretty clueless. It's hard to find what you're looking for and they don't have examples for your specific problem.

So my basic workflow is:
■ come up with an idea for an app you want to build
■ build it with HTML5 and view it on a browser. I'm using jQuery Mobile for styling the app
■ search Google and often StackOverflow.com to find an example of what you're trying to do
■ search these sites again when something doesn't work, describing the problem 'jQuery mobile how to
   pass parameter to another page', 'jquery mobile how to append li to ul' and so on
■ sometimes blogs have examples or tutorials that help. Nettuts is a good site for tutorials as well.
■ jQuery Mobile is where the main help resides
 
I set up my xCode environment on my iMac and purchased a Developer licence so I can install the app on my iPhone for testing. But for the most part I am building the bulk of my app using HTML5 and viewing it in a browser (as a separate, small window to mimic the phone). You can also ftp the files to your server (I use hostgator) and view in on your phone in the browser.

This post is about 'how to learn' most effectively. It is 'exception based' meaning we learn when something doesn't work. Many people love 'The Khan Academy' videos but some have found that there are critical misconceptions even after watching the videos. So merely passively watching videos is not enough. Solving problems that will reflect these exceptions are key to learning. Anyone can do a very basic problem that is similar to what was in a lesson.

So in summary, if you are in a new area for yourself then read a few books and do some tutorials. But the real learning happens when you attempt to actually do something, in which case Google is your best friend.

Thursday, 5 January 2012

Android 4.0 Ice Cream Sandwich focused on x86

Some developers try to bring the latest version of Android for x86 processors.

Recently, a version of Android 4.0 Ice Cream Sandwich for x86 circulating on the Internet. A first port whose code is primarily intended for developers to make some tests more or less promising tablets and netbooks. Obviously, the optimizations in this version pre-intended mainly to processors AMD , better used.
Chih-Wei Huang, one of the developers who made his name in bump on porting Android on x86, explains that this release supports WiFi and multi-point touch. However, GPUs are not put to use for acceleration OpenGL ES. Same, speakers, photo sensors and Ethernet are not yet recognized.

Remember of course that such ports are not official, and Google has nothing to do with these versions. Google is Focusing on the giant ARM mobile, leaving it to those who wish to adapt it to x86. Note that AMD is no stranger to some of these optimizations in the code for x86 Ice Cream Sandwich. More information on specialized sites, such as Android-x86.org .

Read more:

28 Common Passwords – to Avoid

Creating secure passwords that will keep others out of your systems or websites is important. In some cases it is extremely critical. Many people use simple passwords that are so popular that it allows any individual with simple tools to break into the system or website.

One common problem is using joe passwords. Joe passwords are those that are the same as the username. Always avoid this.

Below is a combined list of 28 common passwords found by SplashData and Imperva. If you use one of these passwords don’t be surprised if your account is compromised. Change it ASAP!
password
123456
12345678
qwerty
abc123
monkey
1234567
letmein
trustno1
dragon
baseball
111111
iloveyou
master
sunshine
ashley
bailey
shadow
123123
654321
superman
qazwsx
michael
football
12345
123456789
princess
rockyou

Any passwords that resemble these, should be avoided. You can probably think up other passwords that are too easy to figure out. Remember, a password must be hard enough, that if someone sees you typing it, they can't figure it out.


Wednesday, 4 January 2012

Five Classic Web Attacks

While reading through my blog inbox and writing up my 2010 Wishlist for work, I thought I’d drop a quick post to highlight five web security ‘problem areas’ that still exist after at least a decade of patches, pleas, and regulatory requirements.

•SQL Injection
•Hack the Web Server
•Cross Site Scripting
•Cookie Tampering
•Session Hijacking

I often find myself explaining what these are and providing examples, in order to garner support for remediation.


SQL Injection:


Databases use a standard language for developers and users alike to enter and retrieve data, this is the structured query language (SQL). If a web application doesn’t validate the information being put into those queries, then someone can enter or retrieve as much information as they like about anything in those databases!

Hack the Web Server!:


Cross Site Scripting:


 
When a web site doesn’t validate the information it accepts, it becomes possible for someone to enter programming code into fields instead of usernames, passwords, or email addresses. The user sees a normal looking link or URL for a site, but that link is laced with programatic code that can steal their sensitive information without even being noticed.

Cookie Tampering:


Session Hijacking:

 
When a SessionID is discovered, it allows a 3rd party to assume the identity of the end-user. In most cases, this happens without notice by the end-user or the web application. The 3rd party is able to conduct transactions as though they were the actual end-user.
Web applications track each connection with an end-user as a session, using Session ID’s that are usually just a long string of characters. Sometimes these ID’s aren’t long enough to avoid duplication or aren’t random enough to avoid being guessed.
Cookies are special files stored for use by a web browser that typically contain an identity, an access level, or even account information. Although the cookies are stored on end-user (customer) web browser, attackers have become very adept at harvesting cookie contents.
We trust the sites we visit and yet Cross Site Scripting takes advantage of that trust in order to trick a victim into revealing their sensitive information. If you’ve ever seen phishing or pharming attacks you’ve seen Cross Site Scripting (XSS).
The granddaddy of them all! Most servers are vulnerable to some list of attacks, either directly or indirectly. When a 3rd party is able to takeover a server and compromise it, they are able to upload malicious software and act as if they are directly connected to the server. It becomes possible for massive fraud or identity theft to occur as the server is accessed or updated.
The most common attack against web sites! Our data is stored in databases, massive databases in most cases. In order for nearly all online web applications to function, they must be tied to a database somewhere. This is true when you access your bank statement, access iTunes, read the news at MSN, or even google something.