1.21.2010

High-tech Product Releases

High-tech product releases announced the week of January 20 include Bluetooth headsets that talk to you, a device that enables wireless music streaming, the MOTOROI smartphone, LG's first Android mobile, a range of powerful notebook computers from Sony and eco-friendly external hard drives from Samsung.

Intelligent Bluetooth headsets
Aliph Jawbone II Bluetooth Headset with NoiseAssassin (Black) [Bulk Packaging]Aliph's Jawbone ICON series is the first Bluetooth headset to offer users a personalized headset experience via their website software platform. The device has built-in, easy-to-use intelligent functions, such as a visual battery meter, free directory assistance, voice-to-SMS and voice dial. Aliph's Jawbone ICON series weighs in at just 8 grams and gives users up to 4.5 hours of talk time and 10 hours standby. Jawbone ICON Bluetooth headsets are priced at $99.99 and became available January 18.
  

A gadget that lets you listen to your music wirelessly Aperion Audio's Home Audio Link is a wireless adapter that enables consumers to stream audio from their computer, iPod, MP3 player and mobile devices to their home theater or audio system. Users can use the tiny device to wirelessly send music to up to three rooms in their house. The Home Audio Link costs $149 for the first unit and $70 each for additional units. The device will be out on January 28.



First Android-powered smartphone in Korea
MOTOROI smartphone (also called the XT720) will introduce Korean users to a new set of Android features including high-speed web browsing via WiFi, Google Maps, Gmail, YouTube videos and Google Talk. Motorola's smartphone has an 8 megapixel camera, Xenon flash, MP3 player, multitouch browsing, free access to local TV and audio channels via Terrestrial Digital Multimedia Broadcasting (DMB), up card and a 720p HDMI video recorder - the first of its kind to be offered in the Korean smartphone market. The MOTOROI will be available throughout South Korea in early February. No price was announced.to 8GBs of on-board storage, support for up to 32GB of storage using a Micro SD





LG goes Android
LG's first endeavor into the Android-powered mobile world is a touchscreen, social networking smartphone called the LG InTouch Max GW620. The phone boasts both QWERTY and touchscreen keyboards, a Social Networking Manager (called Linkbook), auto face-tagging photo features (that let you call, message or text your friends by touching their face in a photo), 5-megapixel camera for photos and videos, and a 3" touchscreen. The phone is available for free in the UK on a £20 (€23) per month two-year contract.
                                                       
Powerful, high performance mobile notebook computers

Sony has launched a new series of VAIO Z notebook computers that are designed to be tough, ultra-light and portable. The high-performance laptops are crafted from carbon fiber and aluminium, weigh less than 1.45kg and have a full 13.1" (33.3cm) HD (1920 x1080) display. The VAIO Z series will be released at the end of March. No prices were given.



 Eco-friendly designer External Hard Drives
Samsung has introduced a line of stylish "green" hard drives for the tech-savvy generation who want their gadgets to look good. The G Series includes 250GB, 320GB, 500GB, and 640GM versions in their G2 portable line and 1, 1.5 and 2 Terabyte models in their G3 Station range. The Hard Drives are designed to reduce energy consumption by more than 95 percent and go to sleep automatically after five minutes of inactivity. The hard drives will be available in mid-January. The 2TB 3G Station will cost $199.

1.20.2010

Cisco 5500 Series Wireless Controllers Optimizing Enterprise Video Over Wireless LAN


Asa 5500 Aip Security Services CARD-5Cisco Goes After Wireless

Can video delivered over a wireless networking connection be as good as video coming from a wired network? That's the challenge that networking giant Cisco (NASDAQ:CSCO) now is trying solve with new technology called VideoStream.

With VideoStream Cisco is aiming to enable enterprises to deliver HD quality video to multiple wireless end points. VideoStream is part of Cisco's overall Medianet strategy for delivering an architectural approach for networks that can handle all types of media and includes both wired and wireless connection points.

With the ratification of 802.11n, users have the bandwidth to do high speed data over wireless. The challenge that remains is that wireless is still a shared media, with one access point and multiple clients all contending for the same data and spectrum.


Functionally VideoStream includes a number of key components, among them is the ability to do reliable multicasting(define) which enables live broadcasting over an IP network. What Cisco has done is figure out a way to have video sent and error corrected from the wireless access point to the client endpoints at the highest wireless data rate available.

With stream prioritization technology, VideoStream provides users with another layer of wireless video quality control.

In one case there might be a special CEO video stream and on the other hand there could be a sporting event stream. With stream prioritization the network administrator can prioritize which stream should get more bandwidth for wireless delivery. Protecting video quality

Another element in VideoStream is something called – Resource Reservation Control.

As one of the main drivers behind the Cisco's video strategy, medianet builds upon the strengths of a pervasively deployed Cisco Unified Wireless Network solution with VideoStream technology. VideoStream technology leverages benefits delivered by a medianet and carries forward the rich service capabilities required for video like: traffic prioritization, protection, monitoring, and adaptability to deliver a scalable, high-performance, high-quality enterprise video experience over Wi-Fi.

The solution is that VideoStream understands how much total wireless bandwidth is available. If a request comes in from an endpoint and there isn't enough available bandwidth, the new request will get a video not available message, which will protect the quality for the users that are already receiving the video.

In order to help provide as much wireless bandwidth as possible, Cisco's VideoStream also has a method to improve wireless scalability for video delivery with packet replication.

Packet replication is not the same as how load balancing an application works for wired Web servers.

The VideoStream technology is part of Cisco's unified wireless software for all of their wireless controller products.

Yele Haiti


Founded by Grammy Award winner Haitian-born musician and producer Wyclef Jean, YƩle Haiti addresses problems concerning education, health, environment and community.

Donate $5 to the Yele Haiti Earthquake Fund (Wyclef's organization) by using your cell phone to text “Yele” to "501501"

Donate $10 to the American Red Cross by using your cell phone to text "HAITI" to "90999"
Your cell phone bill will be charged

#Haiti 7.0 Earthquake. Through IHG Priority Club I donated 10,000 points to help earthquake victims in Haiti to the Red Cross

@technical I donated $15 to help relief in Haiti to www.yele.org from web in reply to adriarichards

Please Donate to the relief effort in Haiti. They needs us now more than ever.  


1.18.2010

Sing Celebrate - For A King Celebrate Dr. Martin Luther King, Jr.



My Grandmother Billie Jean Williams was born in Haiti. She's 2/4 Jewish and American. She Married my grandfather Joseph Williams who's father was a slave.

Rheta Williams my mother and her family owned property in Louisiana, ran stores and were mostly teachers. They lived just on the other side of the Mississippi river where slavery was rampant.

I am grateful for all those who suffered, marched, and sacrificed for my freedom.



United States Army Of One Logo StickerHaving followed my Grandfather and father into the Armed Services United States Army I am very well aware that Freedom is not free. Billions have died from the diaspora, thru Haiti, to this land we call America. 

Today we honor the warriors who were the catalyst that brought about the dream of Martin Luther King, Jr.  "I Have a Dream": The Life of Martin Luther King, Jr. (Home Use)Happy Birthday to a King.

Wireless LAN Accessories

This in-building antenna is designed for recessed ceiling spatial diversity installations requiring wideband coverage of 2.4 GHz to 2.5 GHz & 4.9 - 5.85Ghz frequencies. This model combines three ultra flat omnidirectional antennas with isolation greater than 25dB within 1 aesthetic radome. It utilizes UL listed materials that meet strict UL safety specifications for in-building installations, including 3 x 12 inch Plenum rated pigtails that can be terminated with various types of connectors.


Antenna Dimensions:
0.35 lbs Weight
0.99” Depth
7.875” Length
4.1” Width
FEATURES: • Efficient omni-directional diversity and MIMO performance. Provides excellent performance using 3 total 2.4 & 5Ghz elements in a single, low profile design.• Easy to install and mount to a recessed ceiling tile system.• Plenum rated cable can be installed in many indoor mounting locations, not just plenum areas.• Covers 2.4 to 2.5 GHz for 802.11b/g, and 4.9 to 6 GHz for 802.11a and all US, European, and Japanese WLAN applications• Coaxial cable pigtails with various connector choices

Wireless Broadband


How quickly things change. Last year, broadband was the thing. Now that's history: wireless broadband is where it's at. And it's hardly surprising. Wireless connection - and a fast wireless Internet connection in particular - is fabulously convenient. Move your PCs to wherever you want them without worrying about trailing network cables everywhere; make Voice-over IP calls from the bathroom; surf from the sofa; stream music around your house wherever you want it.

Text "Haiti" to 90999 to donate to the Red Cross for Haiti relief. 100% of your $10 donation passes through.

The last time we looked at how to set up a wireless network, there were several qualifications, problems and caveats. Many new wireless devices simply didn't work properly out of the box - if at all - and Windows XP's wireless configuration boxes had the unfortunate habit of leading you round in circles.

All this is changing, though. And while the nature of radio waves is that you may occasionally suffer connection problems, things have moved apace in the last year. The advent of MIMO devices, which provide greater range and speed by using the radio waves that bounce off obstacles, is a huge step forward for the reliability of connections. And Windows XP Service Pack 2's much-improved wireless network support means there's really very little effort required to get yourself up and running.

There's one thing you should be aware of, though: security. You need to secure your new wireless network as soon as possible. The newest and safest encryption system, WPA, is a doddle to implement and extremely secure if you follow our walkthrough and setup tips. The word 'encryption' puts people off because it sounds complicated, but it's vital to secure your network from people leeching your connection, stealing your bandwidth and potentially gaining access to everything on your PC. An unsecured wireless connection is the equivalent of an open front door - it's a direct route to everything on your hard disk.

THE ESSENTIALS

While networking has become easier since the launch of Windows XP and its more or less self-configuring network connections, it can still be a topic couched in obscure jargon, which it's worth getting a passing knowledge of.

Routers

When people talk about wireless routers these days, they're talking about a wireless access point and router combined. The access point part allows your wireless PCs and devices to connect together; the router part allows those wireless devices to talk to wired devices and, crucially, gain access to your broadband connection. If your broadband is ADSL, you'll need a wireless ADSL router; if you have a Telewest or ntl subscription, which came with a cable modem featuring an Ethernet output, you need a wireless cable/DSL router. You can also get away with a cable/DSL router if your ADSL modem has an Ethernet port. There's some confusing terminology surrounding products too. Wireless routers are sometimes referred to as wireless gateways, switches or hubs - they're the same thing mostly.

Ethernet

Practically every PC motherboard these days has an Ethernet networking port with a maximum speed of 100Mb/sec (Fast Ethernet) or 1,000Mb/sec (Gigabit Ethernet). A wireless router will usually sport five Ethernet ports: one for the WAN (wide area network) connection, which connects to your cable or DSL modem supplied by your broadband ISP, and four for the LAN (local area network) side. You don't need to use these if you're going for a purely wireless setup, but they allow you to connect wired devices for one unified network, and it's useful to be able to connect with a wired connection for initial setup of your wireless security.

Network addresses

All modern networks, from your home LAN up to the Internet, now use the TCP/IP (Transfer Control Protocol/Internet Protocol) system to communicate; it's almost made all other network protocols obsolete. TCP/IP is a packet-switched networking system. This means data is divided up and sent from transmitter to receiver in small chunks. These packets of information can travel via different routes around the network and need to be routed to the correct destination. This is why the single most important concept in a TCP/IP network is the IP address. Every network adaptor - wired or wireless - on a network must be assigned a unique IP address for that network, so that data packets can find their way to the correct destination. Without exception, all wireless routers will by default handle that automatically via DHCP (dynamic host configuration protocol). The DHCP server in the router doles out an IP address to every wireless PC or device that tries to connect to it.

Gateways and DNS servers

As well as giving a wireless device an IP address, it also informs the device of three important bits of information it needs to communicate: the address of a gateway, the address of a DNS server and a subnet mask. The first two allow the device to communicate with the Net. A gateway is simply the IP address of the device that can route data to and from an external network; in the case of a home router, that external network is the Internet. So in the majority of cases, the gateway address is in fact the router's own IP address; it then acts as a broker, forwarding requests for web pages back and forth via a process known as NAT (network address translation).

A DNS (domain name system) server is one that a PC uses to translate 'friendly' web addresses (www.pcpro.co.uk, for example) into numerical IP addresses by which it can request web pages. The subnet mask is often the cause of confusion; it's a way of separating network subsegments. You don't need to worry about it, however - it's only of relevance to corporate-scale networks and doesn't impinge on getting your wireless network up and running.

Incidentally, NAT also acts as a safeguard in conjunction with any hardware firewall the router may have, since it means that external PCs on the Net can't get direct access to any given PC on your internal wireless network. This is in contrast to USB modems commonly supplied by ISPs, which place your PC onto the Internet directly and are an invitation to hackers.

Mac address

A second type of address you'll probably encounter is known as the MAC (media access control) address. Every standard Ethernet network device, including Wi-Fi access points and adaptors, has a unique hardware MAC address assigned to it at manufacture. For the end user, this is useful, because it allows MAC address-based security to restrict access to a wireless network.

NEW TECHNOLOGY

In the beginning - at least as far as consumers and small businesses were concerned - there was 802.11b, the first popularly adopted Wi-Fi standard. It offers a maximum theoretical throughput of 11Mb/sec, but in practice you're highly unlikely to achieve anything exceeding 5Mb/sec. Then came 802.11g to give a maximum theoretical throughput of 54Mb/sec, but again it's near impossible to achieve even a third of that in practice. But that isn't the only problem - variations in positioning and range make an enormous and unpredictable difference in the speed and reliability of both 11b and 11g wireless networks. This is particularly true in Europe as opposed to the US, where houses tend to be made of wood with thinner walls more easily penetrated by radio waves. Put joists, metal-reinforced concrete and so forth in its way and the results are unpredictable.

The standard issue

The solution may well lie in MIMO (multiple input, multiple output) technology. This forms part of the as-yet unratified standard 802.11n, which is set to replace 11b and 11g. MIMO splits one incoming data stream into multiple lower-rate streams, transmitting simultaneously via two or more aerials on the same channel. It improves both range and transmission speed by relying on a phenomenon known as multipath, where signals arrive at different times because of reflections. That's usually considered a problem, but here it effectively creates virtual radio channels along which more than one stream of data can be fed on the same frequency. Receiving the differing signals on multiple aerials, the two data streams can be reconstructed. Current WLAN MIMO technology has a maximum theoretical speed of 108Mb/sec - twice as fast as 802.11g and more than enough to cater for multiple users streaming multi-media files around a large house. MIMO offers higher speeds over longer range than conventional WLAN, so you'll be able to connect from further away without needing to spend extra on wireless bridges or repeaters.

You'll need to spend more on the router itself, though. Not just because a pre-N router such as the Belkin costs around £75 to the £40 of a typical 802.11g router, but because you'll also need to buy matching PC Cards (or USB adaptors) to upgrade the wireless radios in your notebook or PC.

Apart from the inevitably high cost of buying a new technology, the chief drawback of MIMO is that until it's ratified by the IEEE the way in which it's implemented by manufacturers will be proprietary. This means there's no guarantee MIMO products from different manufacturers will work together at 108Mb/sec; it's more likely that everything will slow to standard 802.11g speeds. But having been using MIMO products - in particular, Belkin's Pre-N router and network card - for the last couple of months, we're big fans of the technology. Range and, more importantly, reliability of the connection are hugely improved.

Transfer big files, fast

Four months ago, we tested 15 wireless routers in a group test and saw clearly the benefits of MIMO technology over standard 802.11g. Although the MIMO-based routers were generally faster than 802.11g routers at close range, the real difference came when we moved our test notebook further away from the router: while many routers struggled to make a connection, the MIMO routers kept transferring at 9Mb/sec. At close range, the Belkin hit almost 17Mb/sec, so even a 100MB file transferred in less than a minute. We've included the full group test on the cover disc this month (click on the Editorial tab).

Streaming DVDs

Media streaming is one of the big selling points of home wireless networking; devices such as the Sonos Digital Music System spread audio around the house. The bandwidth demands of streaming MP3 audio are pretty modest; the standard data rate is just 128Kb/sec (or, to put it another way, less than 0.2Mb/sec). But video is a different matter, and high-quality DVD- Video in MPEG2 format is different again.

There are various systems and proprietary setups on the market that claim to transmit video over a standard 802.11g connection, and this they certainly do. What they can't do, however, is transmit DVD- Video in its original form without reducing its quality or its resolution. There are no magic solutions to the problem of bandwidth - a system either has enough for a given application or it must strip out some information in order to transmit a given data stream. The minimum bit rate for DVD-Video is 4Mb/sec and can extend up to almost 10Mb/sec for short, high-quality movies. This is only the bitrate required for the raw data - transmitting it over the network adds the significant data overhead of network communication protocols and error correction.

Despite the claims of many 802.11g products of 'turbo' modes giving more than 100Mb/sec, we've yet to encounter an 11g product fast enough to stream raw DVDs simply by sharing the DVD-ROM drive in Windows over the network. With MIMO, though, it's a different story. We've had a lot of success using Belkin's Pre-N router and accompanying network card to stream DVDs flawlessly from one PC to another - simply by sharing the DVD drive using standard Windows file sharing - at a separation of about 10m, with a partition wall in line of sight. The trouble is, there still isn't enough spare bandwidth available to be able to guarantee this will work for you, so buying a Pre-N setup purely to stream DVDs might result in disappointment.

SECURITY

As we've already pointed out, you must secure your wireless network as soon as possible after getting it up and running. There are three aspects to wireless security. In order of importance, these are encryption, stealth and access restriction.

Encryption

Encryption is the most important simply because if you use encryption properly the other two are unlikely to matter - your network should be safe from abuse.

There are two standards for encryption over Wi-Fi: WEP (wired equivalent protocol) and WPA (Wi-Fi protected access). WEP is the older of the two, and WPA has come about because WEP simply isn't secure enough. A fundamental flaw in its implementation - to do with the way it appends an extra section on the end of your chosen encryption key - means that over a moderately busy network a snooper can break WEP in a matter of hours.

Until recently, using WPA instead of WEP wasn't easy, since many devices didn't support it, plus comprehensive built-in Windows XP support only came with Service Pack 2. But that's changed now, and we'd advise anyone using WEP to change to WPA immediately. It's easier to set up too; whereas WEP needs a specific-length, impossible-to-remember hexadecimal key, WPA generates its keys from a password that can be anything from eight to 64 characters in length, using any normal characters including spaces. You can generate a long but easy-to-remember passphrase, simplifying things if you're setting up several PCs with wireless connections.

Remember that any encryption system is only as good as its passwords, and that applies equally to WPA. Short or easy-to-guess passphrases are a gift to hackers so, unlike a PIN, a four-digit number is basically useless. A hacker has no limit to the number of passphrases he can try, so yours has to be long and obscure enough that an automated passphrase generator won't guess it.

As well as short numbers, certain things you might think are clever should also be avoided. So, for instance, you might think 'darthvader' is a good one, but in fact every hacker has a dictionary list containing millions of well-known passwords like that. So, 'wallaceandgromit' is out, as is 'frodobaggins'.

Instead, you want a couple of random words, some numbers and some odd characters. For instance, 'cheese672 badger123?' is strong and highly unlikely to be broken by a dictionary attack. A unique sentence - not a well-known quote like 'Ross has a boiler in the living room' - is good too.

Stealth

By default, all access points come pre-configured with a standard name known as an SSID (service set identifier), which the access point merrily broadcasts to all and sundry, allowing clients to see that there's an access point to connect to. This is very useful in Starbucks, but the last thing you want in your home setup. So you should do two things: first, change the default SSID; and second, hide it by instructing the router not to broadcast its presence.

This makes it much more difficult for anyone to find and start attacking your setup. It's as easy as pie and simply requires you to think of a name and check the 'hide SSID' option, which your router will invariably have in its web-based configuration.

Access restriction

This is the most tedious aspect of wireless security to set up, but if you're paranoid MAC-address-based access control is one more obstacle in the path of a determined hacker. As we mentioned earlier, every Ethernet device has a unique MAC address which is unique for that device. By setting up a table of the MAC addresses of your wireless devices in the router, you can restrict access to only those devices - any device with an unknown MAC address will be refused a connection. The drawback is that you have to manually enter the MAC address of every device you want to connect, but that's only a problem if you frequently have new hardware or you want guest devices to connect to your network with the minimum of fuss. Some routers also allow you to flip this idea on its head and specifically deny access to MAC addresses you specify and allow all others. This can be useful if you suspect a particular PC on your network has been infected by a virus - by specifically denying it access to the wireless network until you're sure the infection has been cleaned, you reduce the risk of the virus spreading without having to physically remove the wireless adaptor.

Detecting unauthorised access

If you suspect someone's stealing your bandwidth by connecting without your consent, it can be difficult to verify. The best thing to do is go into your router's web-based configuration system and check the client DHCP list. This is the list of network adaptors currently assigned an address on the router. If you're using only one computer (or, more specifically, one network adaptor), there should be only one IP address listed, and it should correspond to the host name and MAC address of your PC. If there's more than one and you haven't forgotten about any other wireless devices you have, such as printers or media-streaming audio gadgets, someone else is probably connected.

Looking at the DHCP list isn't foolproof, though: if the person stealing your bandwidth has had the presence of mind to manually configure an IP address it won't show up in the DHCP list. But many routers also have a log-file feature, some of which show all clients making a connection - this should be foolproof if you can be bothered to wade through it. If it does seem that someone's piggybacking, note the MAC address and block it, then change your SSID and encryption keys, and also change to WPA if you're using only WEP.

Don't get too paranoid, though: if you've followed these instructions and WPA is properly set up, there's little chance of anyone breaking into your system. Enjoy your wireless freedom.

1.15.2010

Ubuntu Security

The Windows Mindset

If you are coming from a Windows background you are used to terms like antivirus, spyware, and firewalls. Linux is different and these are not as important.

Viruses

The fact of the matter is: viruses/worms take advantage of flaws or holes in the code. There are no significant Linux viruses "in the wild". Linux boxes are no less targets than any other OS.

Do not believe the suggestion that the Linux community is complacent or "behind the times" in terms of viruses, or any other security issue. Linux developers have not "ignored" viruses, rather the OS is built to be highly resistant to them and since the code is "Open" there are literally thousands of eyes watching .

For the most part, Linux anti-virus programs scan for Windows viruses which do not run on Linux.


Reasons AGAINST antivirus on Ubuntu:
  1. They scan primarily for Windows viruses.
  2. There is a high rate of false positives.
  3. Isolation/inoculation is poor.
  4. And currently there are no known active Linux viruses (so there is essentially nothing to detect).

Reasons FOR antivirus on Ubuntu:
  • You are running a file or mail server with Windows clients.
  • You wish to scan files before transferring them, by email, flash drive, etc., to a Windows machine.

Running antivirus can make some sense if you are intending to "protect" Windows users, however, for a variety of reasons, it is best if Windows users learn to protect themselves.

Note: There have been many documented cases in Windows and Linux that a buffer overflow in an antivirus product has been an attack vector!

If you would like to run an antivirus program on Ubuntu you have several choices :

Comments on wine

Discussions about running Windows viruses on wine crop up from time to time and it is possible to run some Windows viruses on wine.

See these links :

Take the same precautions with wine as you would with Windows. Do not install untrusted applications from untrusted sources.

Windows viruses will be confined to ~/.wine and they do not have permission to change system files. This means to remove them you simply:

Code:
rm -rf ~/.wine
Please take care, this command deletes everything in your wine directory including all data and all applications.

You then need to restore your wine directory from a known good backup (you do keep backups ?).


Firewall

GUFW (gui)

UFW - Desktops

UFW - Servers

Ubuntu includes a firewall, iptables, but by default nothing is engaged. This is reasonable as a default Ubuntu install opens zero ports to the outside world, so a firewall is redundant. However, installing "server software" will cause ports to open, so some people like to use a firewall as a catch-all layer to find mistakes in their configuration.

Another use for firewalls is for the administrator to forcibly impose network policies on the user.Also, a periodic audit of the system for open ports is a good practice. Running the "nmap" command from another machine, or using one of many online port scanners:

http://nmap-online.com/
https://www.grc.com/x/ne.dll?bh0bkyd2

Remember, what you care about are open ports. Closed ports and stealth ports are equally secure, in that they are inaccessible to the public.

Iptables references :

The "problem" with iptables is that it is not particularly friendly to new users. Fortunately, there are several more user friendly interfaces available to allow you to manipulate your firewall (UFW, Firestarter, and Guarddog) :


A source of confusion sometimes occurs when users feel the need to be running firestarter/Guarddog for their firewall to be active. This is untrue ! Keep in mind that these applications are not firewalls, but rather configuration tools for ip tables. These applications should be run only to configure your firewall. Once configured, IP tables (the actual firewall) is active (at boot) without having to run firestarter/guarddog. firestarter will monitor traffic, but it runs as root and there are better monitoring programs, so configure you firewall, shut down firestarter/grauddog, and let IP tables do the rest


Browser / Spyware : Java/Flash/Ad-ware/Trackers/Cookies

This is where most users will have the most risk.
We all want Java/Flash, but our Internet browser opens us to attacks.

  1. Deny all cookies and add trusted sites, allowing only for session.
  2. Install NoScript. Again block all and add trusted sites to a white list.
  3. Install Safe History
  4. Adblocking : I block with a hosts file rather then Adblock Plus or Adblock Filterset.G because a hosts file protects more then just firefox.



See this link for additional information : How to Secure Firefox


The Ubuntu Mindset


Permissions and Encryption

The first layer of defense is file permissions. Permissions are used to set access and thus protect both system and user files.

Basic permissions
FilePermissions

See also umask at the bottom of that link. The umask value can be set in ~/.bashrc.

To set a "private home", as a user,
Code:
chmod 700 $HOME

How to's:

Running Server(s)

Common servers include NFS, Samba, FTP, SSH, VNC, RDP, and HTTP. Desktops become Servers if server software is installed.

Questions to ask yourself include:
  1. What port(s) or services does this software provide?
  2. Who will be able to connect to this? (i.e. is it restricted to a range of IP addresses Password protected?)
  3. What level of access will the visitor have to the system? (i.e. does the server run under a restricted user, or the root account? What can this restricted user do in a worst case scenario?)
  4. Does this service expose any additional information that's useful to a hacker? (i.e. does it allow users to transmit their passwords in cleartext? Does it have a 'statistics' view that reveals logged-in users, ip addresses, network configuration, or other potentially helpful information?)
  5. What is the security history of this software? Does it have a history of vulnerability and patch after patch? Or has it had a relatively unmarred history?

Examples :

SSH
VNC
Apache


Forensics


What to do when you think you have been cracked :
  1. Power off.
  2. Disconnect/disable your Internet connectivity.
  3. Now take a deep breath, re-boot, and read the logs. Ask for help if needed, but you really need to confirm that your system has been compromised.
  4. If you have been compromised, and have the time and interest, boot a live CD and image your hard drive. This image can then be used for forensic analysis.
  5. Re-install. Unfortunately, there is no way to trust a compromised system.
  6. When you install, be sure to install off line, use a stronger password, and research intrusion detection.

Intrusion References
CERT® Coordination Center (CERT/CC)
CERT® Coordination Center ~ Intruder Detection Checklist


My goodness ...


Further Reading:

Ubuntu wiki ~ Security page

Ubuntu wiki ~ Installing Security Tools

UDSF Security Analysis Tools

The Big Ol' Ubuntu Security Resource

Locking Down Ubuntu

Ubuntu geek ~ Security category

Security references Topics include Basics, firewall, Intrusion detection, Chroot, Forensics/Recovery, and Securing networked services.


Changing poison into medicine,
Nam-myoho-renge-kyo
 Technicowl
A person with ubuntu is open and available to others, affirming of others, does not feel threatened that others are able and good, for he or she has a proper self-assurance that comes from knowing that he or she belongs in a greater whole and is diminished when others are humiliated or diminished, when others are tortured or oppressed. ~ Archbishop Desmond Tutu, 1999

1.13.2010

Haiti's Other Earthquake

Restavek and Child Slavery: Haiti's Other Earthquake

Haiti holds a romantic and tragic place in the historical imagination -- a nation birthed by a successful slave rebellion, it was the first to abolish slavery in the Western hemisphere and briefly served as a beacon of hope for American abolitionists. However, it never realized its promise, for reasons that scholars and analysts can debate ad infinitum.

Perhaps most egregiously, its grinding poverty is so pervasive that an estimated 300,000 children have been given up by their parents to become restavĆØks -- a creole term for children sent to become house servants to wealthier Haitians. According to human rights workers and survivors of the child-slavery system, these children are forced to work long hours, are often kept out of school, are barely fed and clothed, and are routinely abused physically, emotionally and sexually.


Now, professional recruiters have made the situation even worse by making a business out of the longstanding informal practice. Last June, a United Nations expert on contemporary forms of slavery, Gulnara Shahinian, visited Haiti at the invitation of the government and issued a report that included the recommendations summarized below:

Since it is still struggling to recover from devastating storms in 2008 and will now be focusing effort on earthquake rescue, relief and repair, it's not likely that Haiti will have the resources to enact the reforms advocated by the UN, so private efforts such as Cadet's take on greater significance. Other high-profile philanthropic efforts include Haitian American musician Wyclef Jean's Yele Foundation. In 2008, Jean spoke to Al Jazeerah about his efforts to combat Haiti's food crisis:
Jean also sprang into action about the earthquake via Twitter,tweeting a way to contribute to the relief effort via text message.

Jean's efforts to combat poverty in Haiti are complemented by the work of other philanthropists, including former Pres. Bill Clinton, who serves as the UN special envoy to Haiti. He toured the island in March, 2009 with UN Secretary Ban Ki-Moon to survey efforts by his foundation and other organizations to expand education and nutrition programs. Clinton has been upbeat about Haiti's future, saying it...
"...offers unique opportunities for public and private investment to improve health and education in ways that will be good for Haitians and all their partners in our interdependent world."

Now that the earthquake has delivered to the country what Mr. Ban has called "catastrophic" and Haitian President Rene Preval has called "unimaginable," considerably more effort will be required to ensure that those investments are made and the benefits trickle down to the poorest Haitians so that they will be able to feed and care for their own children. Ultimately, only economic development and sustained human rights activism will finally allow the island to realize the dream that its founders fought so desperately to achieve more than 200 years ago.

How to help - Haiti- Charitable Organizations

A list of charitable organizations active in the nation


msnbc.com
updated 11:11 p.m. CT, Tues., Jan. 12, 2010

The U.S. State Department Operations Center said Americans seeking information about family members in Haiti should call 1-888-407-4747. Due to heavy volume, some callers may receive a recording. "Our embassy is still in the early stages of contacting American citizens through our Warden Network," the U.S. State Department said in a statement. "Communications are very difficult within Haiti at this time."

For those interesting in helping immediately, simply text "HAITI" to "90999" and a donation of $10 will be given automatically to the Red Cross to help with relief efforts, charged to your cell phone bill

1.12.2010

Toshiba Satellite E205 with Intel 802.11n Wireless Display Technology



The E205 will be available for $999 on Best Buy’s site on January 12, (TODAY) and will appear in retail stores several days later.



The coolest feature of the E205? With the push of a button you can beem wirelessly whatever you're watching then stream 720p video from the notebook to (like Hulu) to your big-screen TV, courtesy of Intel’s new Wireless Display technology. The video is carried over 802.11n to the Netgear box, and is then converted to a wired HDMI signal. Best Buy bundles a special box from Netgear that acts as a wireless receiver and plugs into your HDTV via HDMI.

 

1.11.2010

Wi-Fi Alliance

 The Wi-Fi Alliance is a global, non-profit industry trade association formed in 1999 to certify interoperability of Wireless Local Area Network products based on the IEEE 802.11 standard and amendments with more than 200 member companies devoted to promoting the growth of WLANs. Certification programs ensure the interoperability WLAN products from different manufacturers, with the objective of enhancing the wireless user experience.


Wi-Fi Alliance Certification Programs address: Wi-Fi products based on IEEE radio standards 802.11a/b/g/n Wi-Fi Protected Access certification , wireless network security(WPA, WPA2 and WPS for personal and enterprise deployments), authentication mechanisms used to validate the identity of network devices (EAP), and support for multimedia content over Wi-Fi networks (WMM and WMM Power Save. (WPS) Wi-Fi Protected Setup certification.

1.10.2010

802.11n is Ratified - Cisco Celebrates with New Lower Prices


The Industry's Favorite 802.11n AP Now at a Fraction of the Cost
Your users want a wireless network that can provide 7x more video and 9x the speed. Your business needs the investment protection that comes with the fastest-growing and most widely deployed 802.11n technology. You want the confidence that comes from deploying a ratified standard, but for a low price.

Cisco is leading the market transition toward 802.11n and for a limited time only, we're offering an exclusive deal that removes the barriers to adoption of the industry's most powerful wireless technology.
Take advantage of the 11n Acceleration Kit, which includes:
» Learn more about Cisco 802.11n
» Learn more about Scalable Wireless Performance
Accelerate your adoption of 802.11n technology by taking advantage of this exclusive deal.
1-877-330-3409
When calling, use code:
"Celebrate"
Register for the
11n Acceleration Kit promotion.
Register Now https://apps.cisco.com/gdrp/coiga/showsurvey.do?surveyCode=5016&keyCode=184584_5

1.09.2010

Wireless Networking

Wireless Networking Is the New Cellular.


Remember back in the day when we had a brick Motorola cellular phone. My mom had one in the car so she could call me to come pick her up from the post office. Anyone over 29 will remember.




I remember the time because at the time I was a telecommunications specialist in the
 army with a green brick phone at my disposal during field exercises.

 I also remember thinking this cell phone is eventually going to replace my home phone. In 2001 I reduced my home plan down to (no kidding) $23.00 dollars a month basic service and used my cell phone as my house phone. I should have invested in stocks. Motorola stock went up and like most people I never saw that coming.

Like cell phones just about everything connected to a network will eventually be wireless. It won't be long before network servers and high throughput devices go wireless.

We are seeing devices that transmit Hi-Def TV and DVD signal from AV receiver to a monitor. Wireless networking technology has changed the face of enterprise, small-to-medium, and SOHO Biz and personal networking.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104 (CWNP Official Study Guides)Now is the time to capitalize on the opportunities that wireless networking
 brings to Information Technology careers. The Certified Wireless Network
 Administrator-CWNA certification is the first step in the Certified Wireless
 Network Professional-CWNP line of certifications and is focused on
 administering an enterprise 802.11 WLAN. CWNA includes topics such as
 802.11 standards, security, management, protocol analysis, QoS, site
 surveying,  and radio frequency.




Instek GSP-827 Spectrum AnalyzerAdditional certifications focus more intensely on security, protocol analysis, Instek GSP-827 Spectrum Analyzer $4, 2300.00
  • Frequency Range: 9kHz~2.7GHz
  • Input Range: -100dBm~+20dBm
  • Average Noise Floor: -130dBm/Hz
  • Power Measurements: ACPR/OCBW/CH Power
  • Split Window: Simultaneous Measurements in Two Separate Frequency Spans
QoS, design, advanced surveying, VoWiFi, location tracking, and RF spectrum management.

1.03.2010

Dell XPS 8000 Discontinued? What The Hell Dell?

Nook e-reader gains new appeal as 'rooted' wireless tablet

Appeal as unhacked e-book reader also strong judging by faithful user raves. http://bit.ly/63qGBa



Barnes and Noble NOOK ebook readerNook devotees, including wants the Nook despite negative reviews, mainly because it has many features not always available on competing devices including Wi-Fi, a replaceable battery, the open Android OS, and one that reads the ePub format.

1.02.2010

Information Technology Jobs In America: Corporate and Government




http://www.computerworld.com/s/article/9139190/Salary_Survey_2009
Information Technology Jobs in America: Corporate & Government Career Guide (Information Technology Jobs in America: Corporate & Government)
The information technology industry continues to grow in the U.S. and globally. Information Technology Jobs in America: Corporate & Government Career Guide shows where the jobs are, in the U.S. IT Services Sector and in U.S. Federal and State and Municipal government agencies and departments. The book covers new territory – not a technical guide – this career guide goes beyond, to show Americans the largest source of jobs in the U.S. in this growing industry. Section I Good News – Companies Keep Hiring as Demand Grows. Why ‘Outsourcing’ May Lose Its Power as a Scare Word. Shifting Occupations in the Industry. More Managing - Less Programming. Tech Jobs with Government Are Lively Stable, Secure, and Well-Paid. Salaries show a Higher Paid Class of Employees. Experience Is an Acceptable Substitute for Education. Core Skills Include Business-Process Understanding.
Section II Explains how to make contact with this special sector for IT jobs, IT service providers, and how to build a career in the IT services sector.
Section III Explains Technology in Government, public unionism for emerging technology jobs and the desirable salaries of these emerging technology titles. The authors describe the technological developments that make technology in government possible. They define the modified processes that now call for staff in Relational Databases, Web Portal Development, Infrastructure Development and Maintenance, Network Computing, Data Security, e-Government, and e-Commerce.

Section IV "What Jobs Are Available in Federal, State and City Government," brings to the forefront the thousands of information technology jobs that exist in all 101 Federal agencies, and in U.S. State and Municipal government agencies and departments. Detailed Tables show current Information Technology Job Titles for Federal and State and City information technology jobs, Salaries, 5-year Salary Projections, and Estimated Pensions. Financial facts explain why, in today’s global economy, an IT career in government is a desirable choice.

Section V Provides a Step-by-Step guide to "Completing the Application & Hiring Process" for an information technology job in both the Federal and State and City government personnel hiring systems. It explains why a Civil Service Exam is not required in most cases; why experience is an acceptable substitute for education in most government jobs, how to fill out an Experience and Education paper or Knowledge-Skills and Abilities Statement, and Factors for Job Class Salary Ranking and Candidate Ranking. Appendices include Sample Federal IT Job Announcements, and Sample State & City IT Job Descriptions with Qualifications Required, and Required Application Forms.

Section VI Provides Analytical Articles on Today’s Tech Jobs: C++ Computer . Java and JavaScript . Visual Basic . Sun Solaris, Unix, Linux, Network Tech Jobs . Oracle, SQL, FoxPro, Sybase, Database Management . Software Programmer; Software Engineer . Network Programmer, Network Systems . Telecommunications . Web Developer . IT Procurement, IT Training, Project Management and more.


1.01.2010

2010 Predictions: What's on Deck for Cameras?




Flip Video camcorders  From Cisco. Simple, pocketable, and sharing-friendly video cameras.. Here's how 2009's major camera trends will continue in 2010's Consumer Electronics Show announcements...or so we think.
Fujifilm FinePix F70 EXR 10X-optical-zoom lens adaptable EXR sensor in a 0.9-inch-thick frame, making it one of the most versatile pocket cameras currently available
camcorder, the excellent Kodak Zi8.