Category Archives: Security

Ssshhhh. Security by obscurity is not practiced here. So don't disturb us, we're being vigilant.

Schneier’s Latest: Liar’s and Outliers

He has modified a chapter in a recent IEEE article:

And this video has a number of interesting thoughts (the comments are interesting as well:

Schneier on Security: How Changing Technology Affects Security

{youtube}hgEQfDV6NnQ{/youtube}

And now this, part of Chapter 17 from Gizmodo:

How to Trust Your Neighbors in a Networked World

Liars and Outliers by Bruce Schneier explains how civil structure continues advancing despite our best efforts.

Society can’t function without trust, and our complex, interconnected, and global society needs a lot of it. We need to be able to trust the people we interact with directly: as we sit next to them on airplanes, eat the food they serve us in the cabin, and get into their taxis when we land. We need to be able to trust the organizations and institutions that make modern society possible: that the airplanes we fly and the cars we ride in are well- made and well-maintained, that the food we buy is safe and their labels truthful, that the laws in the places we live and the places we travel will be enforced fairly. We need to be able to trust all sorts of technological systems: that the ATM network, the phone system, and the Internet will work wherever we are. We need to be able to trust strangers, singly and in organizations, all over the world all the time. We also need to be able to trust indirectly; we need to trust the trust people we don’t already know and systems we don’t yet understand. We need to trust trust.

Making this all work ourselves is impossible. We can’t even begin to personally verify, and then deliberately decide whether or not to trust, the hundreds-thousands?-of people we interact with directly, and the millions of others we interact with indirectly, as we go about our daily lives. That’s just too many, and we’ll never meet them all. And even if we could magically decide to trust the people, we don’t have the expertise to make technical and scientific decisions about trusting things like airplane safety, modern banking, and pharmacology.

Writing about trust, economist Bart Nooteboom said: ” Trust in things or people entails the willingness to submit to the risk that they may fail us, with the expectation that they will not, or the neglect of lack of awareness of that possibility that they might.” Those three are all intertwined: we aren’t willing to risk unless we’re sure in our expectation that the risk is minor, so minor that most of the time we don’t even have to think about it.

That’s the value of societal pressures. They induce compliance with the group norms- that is, cooperation-so we’re able to approximate the intimate trust we have in our friends on a much larger scale. It’s not perfect, of course. The trust we have in actions and systems isn’t as broad or deep as personal trust, but it’s good enough. Societal pressures reduce the scope of defection. In a sense, by trusting societal pressures, we don’t have to do the work of figuring out whether or not to trust individuals.

By inducing cooperation throughout society, societal pressures allow us to relax our guard a little bit. It’s less stressful to live in a world where you trust people. Once you assume people can, in general and with qualifications, be trusted to be fair, nice, altruistic, cooperative, and trustworthy, you can stop expending energy constantly worrying about security. Then, even though you get burned by the occasional exception, your life is still more comfortable if you continue to believe.

We intuitively know this, even if we’ve never analyzed the mechanisms before. But the mechanisms of societal pressure are important. Societal pressures enable society’s doves to thrive, even though there’s a minority of hawks. Societal pressures enable society.

And despite the largest trust gap in our history, it largely works. It’s easy to focus on defection-the crime, the rudeness, the complete mess of the political system in several countries around the world-but the evidence is all around you. Society is still here, alive and ticking. Trust is common, as is fairness, altruism, cooperation, and kindness. People don’t automatically attack strangers or cheat each other. Murders, burglaries, fraud, and so on are rare.

We have a plethora of security systems to deal with the risks that remain. We know how to walk through the streets of our communities. We know how to shop on the Internet. We know how to interact with friends and strangers, whether-and how-to lock our doors at night, and what precautions to take against crime. The very fact that I was able to write and publish this book, and you were able to buy and read it, is a testament to all of our societal pressure systems. We might get it wrong sometimes, but we largely get it right.

At the same time, defection abounds. Defectors in our society have become more powerful, and they’ve learned to evade and sometimes manipulate societal pressures to enable their continued defection. They’ve used the rapid pace of technological change to increase their scope of defection, while society remains unable to implement new societal pressures fast enough in response. Societal pressures fail regularly.

The important thing to remember is this: no security system is perfect. It’s hard to admit in our technologically advanced society that we can’t do something, but in security there are a lot of things we can’t do. This isn’t a reason to live in fear, or even necessarily a cause for concern. This is the normal state of life. It might even be a good thing. Being alive entails risk, and there always will be outliers. Even if you reduced the murder rate to one in a million, three hundred unlucky people in the U.S. would be murdered every year.

These are not technical problems, though societal pressures are filled with those. No, the biggest and most important problems are at the policy level: global climate change, regulation and governance, political process, civil liberties, the social safety net. Historically, group interests either coalesced organically around the people concerned, or were dictated by a government. Today, understanding group interests increasingly involves scientific expertise, or new social constructs stemming from new technologies, or different problems resulting from yet another increase in scale.

Philosopher Sissela Bok wrote: “…trust is a social good to be protected just as much as the air we breathe or the water we drink. When it is damaged the community as a whole suffers; and when it is destroyed, societies falter and collapse.” More generally, trust is the key component of social capital, and high-trust societies are better off in many dimensions than low-trust societies. And in the world today, levels of trust vary all over the map-although never down to the level of baboons.

We’re now at a critical juncture in society: we need to implement new societal systems to deal with the new world created by today’s globalizing technologies. It is critical that we understand what societal pressures do and don’t do, why they work and fail, and how scale affects them. If we do, we can continue building trust into our society. If we don’t, the parasites will kill the host.

 

Schneier’s Latest: Liar’s and Outliers

He has modified a chapter in a recent IEEE article:

And this video has a number of interesting thoughts (the comments are interesting as well:

Schneier on Security: How Changing Technology Affects Security

{youtube}hgEQfDV6NnQ{/youtube}

And now this, part of Chapter 17 from Gizmodo:

How to Trust Your Neighbors in a Networked World

Liars and Outliers by Bruce Schneier explains how civil structure continues advancing despite our best efforts.

Society can’t function without trust, and our complex, interconnected, and global society needs a lot of it. We need to be able to trust the people we interact with directly: as we sit next to them on airplanes, eat the food they serve us in the cabin, and get into their taxis when we land. We need to be able to trust the organizations and institutions that make modern society possible: that the airplanes we fly and the cars we ride in are well- made and well-maintained, that the food we buy is safe and their labels truthful, that the laws in the places we live and the places we travel will be enforced fairly. We need to be able to trust all sorts of technological systems: that the ATM network, the phone system, and the Internet will work wherever we are. We need to be able to trust strangers, singly and in organizations, all over the world all the time. We also need to be able to trust indirectly; we need to trust the trust people we don’t already know and systems we don’t yet understand. We need to trust trust.

Making this all work ourselves is impossible. We can’t even begin to personally verify, and then deliberately decide whether or not to trust, the hundreds-thousands?-of people we interact with directly, and the millions of others we interact with indirectly, as we go about our daily lives. That’s just too many, and we’ll never meet them all. And even if we could magically decide to trust the people, we don’t have the expertise to make technical and scientific decisions about trusting things like airplane safety, modern banking, and pharmacology.

Writing about trust, economist Bart Nooteboom said: ” Trust in things or people entails the willingness to submit to the risk that they may fail us, with the expectation that they will not, or the neglect of lack of awareness of that possibility that they might.” Those three are all intertwined: we aren’t willing to risk unless we’re sure in our expectation that the risk is minor, so minor that most of the time we don’t even have to think about it.

That’s the value of societal pressures. They induce compliance with the group norms- that is, cooperation-so we’re able to approximate the intimate trust we have in our friends on a much larger scale. It’s not perfect, of course. The trust we have in actions and systems isn’t as broad or deep as personal trust, but it’s good enough. Societal pressures reduce the scope of defection. In a sense, by trusting societal pressures, we don’t have to do the work of figuring out whether or not to trust individuals.

By inducing cooperation throughout society, societal pressures allow us to relax our guard a little bit. It’s less stressful to live in a world where you trust people. Once you assume people can, in general and with qualifications, be trusted to be fair, nice, altruistic, cooperative, and trustworthy, you can stop expending energy constantly worrying about security. Then, even though you get burned by the occasional exception, your life is still more comfortable if you continue to believe.

We intuitively know this, even if we’ve never analyzed the mechanisms before. But the mechanisms of societal pressure are important. Societal pressures enable society’s doves to thrive, even though there’s a minority of hawks. Societal pressures enable society.

And despite the largest trust gap in our history, it largely works. It’s easy to focus on defection-the crime, the rudeness, the complete mess of the political system in several countries around the world-but the evidence is all around you. Society is still here, alive and ticking. Trust is common, as is fairness, altruism, cooperation, and kindness. People don’t automatically attack strangers or cheat each other. Murders, burglaries, fraud, and so on are rare.

We have a plethora of security systems to deal with the risks that remain. We know how to walk through the streets of our communities. We know how to shop on the Internet. We know how to interact with friends and strangers, whether-and how-to lock our doors at night, and what precautions to take against crime. The very fact that I was able to write and publish this book, and you were able to buy and read it, is a testament to all of our societal pressure systems. We might get it wrong sometimes, but we largely get it right.

At the same time, defection abounds. Defectors in our society have become more powerful, and they’ve learned to evade and sometimes manipulate societal pressures to enable their continued defection. They’ve used the rapid pace of technological change to increase their scope of defection, while society remains unable to implement new societal pressures fast enough in response. Societal pressures fail regularly.

The important thing to remember is this: no security system is perfect. It’s hard to admit in our technologically advanced society that we can’t do something, but in security there are a lot of things we can’t do. This isn’t a reason to live in fear, or even necessarily a cause for concern. This is the normal state of life. It might even be a good thing. Being alive entails risk, and there always will be outliers. Even if you reduced the murder rate to one in a million, three hundred unlucky people in the U.S. would be murdered every year.

These are not technical problems, though societal pressures are filled with those. No, the biggest and most important problems are at the policy level: global climate change, regulation and governance, political process, civil liberties, the social safety net. Historically, group interests either coalesced organically around the people concerned, or were dictated by a government. Today, understanding group interests increasingly involves scientific expertise, or new social constructs stemming from new technologies, or different problems resulting from yet another increase in scale.

Philosopher Sissela Bok wrote: “…trust is a social good to be protected just as much as the air we breathe or the water we drink. When it is damaged the community as a whole suffers; and when it is destroyed, societies falter and collapse.” More generally, trust is the key component of social capital, and high-trust societies are better off in many dimensions than low-trust societies. And in the world today, levels of trust vary all over the map-although never down to the level of baboons.

We’re now at a critical juncture in society: we need to implement new societal systems to deal with the new world created by today’s globalizing technologies. It is critical that we understand what societal pressures do and don’t do, why they work and fail, and how scale affects them. If we do, we can continue building trust into our society. If we don’t, the parasites will kill the host.

 

Schneier’s Latest: Liar’s and Outliers

He has modified a chapter in a recent IEEE article:

And this video has a number of interesting thoughts (the comments are interesting as well:

Schneier on Security: How Changing Technology Affects Security

{youtube}hgEQfDV6NnQ{/youtube}

And now this, part of Chapter 17 from Gizmodo:

How to Trust Your Neighbors in a Networked World

Liars and Outliers by Bruce Schneier explains how civil structure continues advancing despite our best efforts.

Society can’t function without trust, and our complex, interconnected, and global society needs a lot of it. We need to be able to trust the people we interact with directly: as we sit next to them on airplanes, eat the food they serve us in the cabin, and get into their taxis when we land. We need to be able to trust the organizations and institutions that make modern society possible: that the airplanes we fly and the cars we ride in are well- made and well-maintained, that the food we buy is safe and their labels truthful, that the laws in the places we live and the places we travel will be enforced fairly. We need to be able to trust all sorts of technological systems: that the ATM network, the phone system, and the Internet will work wherever we are. We need to be able to trust strangers, singly and in organizations, all over the world all the time. We also need to be able to trust indirectly; we need to trust the trust people we don’t already know and systems we don’t yet understand. We need to trust trust.

Making this all work ourselves is impossible. We can’t even begin to personally verify, and then deliberately decide whether or not to trust, the hundreds-thousands?-of people we interact with directly, and the millions of others we interact with indirectly, as we go about our daily lives. That’s just too many, and we’ll never meet them all. And even if we could magically decide to trust the people, we don’t have the expertise to make technical and scientific decisions about trusting things like airplane safety, modern banking, and pharmacology.

Writing about trust, economist Bart Nooteboom said: ” Trust in things or people entails the willingness to submit to the risk that they may fail us, with the expectation that they will not, or the neglect of lack of awareness of that possibility that they might.” Those three are all intertwined: we aren’t willing to risk unless we’re sure in our expectation that the risk is minor, so minor that most of the time we don’t even have to think about it.

That’s the value of societal pressures. They induce compliance with the group norms- that is, cooperation-so we’re able to approximate the intimate trust we have in our friends on a much larger scale. It’s not perfect, of course. The trust we have in actions and systems isn’t as broad or deep as personal trust, but it’s good enough. Societal pressures reduce the scope of defection. In a sense, by trusting societal pressures, we don’t have to do the work of figuring out whether or not to trust individuals.

By inducing cooperation throughout society, societal pressures allow us to relax our guard a little bit. It’s less stressful to live in a world where you trust people. Once you assume people can, in general and with qualifications, be trusted to be fair, nice, altruistic, cooperative, and trustworthy, you can stop expending energy constantly worrying about security. Then, even though you get burned by the occasional exception, your life is still more comfortable if you continue to believe.

We intuitively know this, even if we’ve never analyzed the mechanisms before. But the mechanisms of societal pressure are important. Societal pressures enable society’s doves to thrive, even though there’s a minority of hawks. Societal pressures enable society.

And despite the largest trust gap in our history, it largely works. It’s easy to focus on defection-the crime, the rudeness, the complete mess of the political system in several countries around the world-but the evidence is all around you. Society is still here, alive and ticking. Trust is common, as is fairness, altruism, cooperation, and kindness. People don’t automatically attack strangers or cheat each other. Murders, burglaries, fraud, and so on are rare.

We have a plethora of security systems to deal with the risks that remain. We know how to walk through the streets of our communities. We know how to shop on the Internet. We know how to interact with friends and strangers, whether-and how-to lock our doors at night, and what precautions to take against crime. The very fact that I was able to write and publish this book, and you were able to buy and read it, is a testament to all of our societal pressure systems. We might get it wrong sometimes, but we largely get it right.

At the same time, defection abounds. Defectors in our society have become more powerful, and they’ve learned to evade and sometimes manipulate societal pressures to enable their continued defection. They’ve used the rapid pace of technological change to increase their scope of defection, while society remains unable to implement new societal pressures fast enough in response. Societal pressures fail regularly.

The important thing to remember is this: no security system is perfect. It’s hard to admit in our technologically advanced society that we can’t do something, but in security there are a lot of things we can’t do. This isn’t a reason to live in fear, or even necessarily a cause for concern. This is the normal state of life. It might even be a good thing. Being alive entails risk, and there always will be outliers. Even if you reduced the murder rate to one in a million, three hundred unlucky people in the U.S. would be murdered every year.

These are not technical problems, though societal pressures are filled with those. No, the biggest and most important problems are at the policy level: global climate change, regulation and governance, political process, civil liberties, the social safety net. Historically, group interests either coalesced organically around the people concerned, or were dictated by a government. Today, understanding group interests increasingly involves scientific expertise, or new social constructs stemming from new technologies, or different problems resulting from yet another increase in scale.

Philosopher Sissela Bok wrote: “…trust is a social good to be protected just as much as the air we breathe or the water we drink. When it is damaged the community as a whole suffers; and when it is destroyed, societies falter and collapse.” More generally, trust is the key component of social capital, and high-trust societies are better off in many dimensions than low-trust societies. And in the world today, levels of trust vary all over the map-although never down to the level of baboons.

We’re now at a critical juncture in society: we need to implement new societal systems to deal with the new world created by today’s globalizing technologies. It is critical that we understand what societal pressures do and don’t do, why they work and fail, and how scale affects them. If we do, we can continue building trust into our society. If we don’t, the parasites will kill the host.

 

Security Toys…Uhm, I mean, Quality Control for Networks

Quality Control for a projector is lamps and lenses and knowing how to keep the management system working.

Quality Control for a network is knowing how people will break into it, and knowing where it will break. So in that regard we need to know things in the same manner as a plumber knows what goes on in the pipes.

Wireshark does some of that. Being able to break into the system does some of that. Because if you can, someone who smells a perfect digital print worth millions certainly will be able to.

Good luck.

Introduction To Wireshark

Register for a complimentary Network Monitoring and Troubleshooting For Dummies

Network Monitoring and Troubleshooting For Dummies

Security Toys…Uhm, I mean, Quality Control for Networks

Quality Control for a projector is lamps and lenses and knowing how to keep the management system working.

Quality Control for a network is knowing how people will break into it, and knowing where it will break. So in that regard we need to know things in the same manner as a plumber knows what goes on in the pipes.

Wireshark does some of that. Being able to break into the system does some of that. Because if you can, someone who smells a perfect digital print worth millions certainly will be able to.

Good luck.

Introduction To Wireshark

Register for a complimentary Network Monitoring and Troubleshooting For Dummies

Network Monitoring and Troubleshooting For Dummies

Free Wireshark Training

Which is what Laura Chappell figured out and has dealt with. It isn’t for everyone in your organization, but someone in your organization should know this tool well enough to be certified in the use of it. DCinema networks are getting more complex as the shift to IMBs and more reliance upon TMSs and outside resources like satellites.

Chappell University – Online Wireshark Training

Wireshark · the world’s foremost netowrk protocol analyzer – Go deep.

That said, when I saw FREE on one of the training pages, I said, “Color me there.”

Chappell University – Training Schedule

 

2012 COURSE LIST

[Register] FEB 15 10am PST Wireshark 202: Coloring Rules free

[Register] FEB 16 10am PST Filter with Snort Rules [AAP Event]

[Register] MARCH 14 10am PST Wireshark 101: Introduction free

[Register] MARCH 15 10am PST Filter Expression Button [AAP Event]

[Register] APRIL 25 10am PST First 5 Troubleshooting Steps [AAP Event]

 

There is so much more to the Chappell website of course. On this page (Chappell University Online Portal) is a DVD ISO image with a Lab Kit, just the thing to get your techs launched into the concept of being a professional in the art…instead of knowing how to thread a film in the projector, they have to see how the movie threads through the network and which parts need a little lite oil, which might need a touch of the hammer.

One could always go with An Idiot’s Guide…oops, the Network Monitoring and Troubleshooting for Dummies book, available for download from another network consulting group. Go to Riverbed’s page: Network Monitoring and Troubleshooting for Dummies | Documents | Media & Downloads

Good luck to us all. One way or the other, the ideas and techniques of training the cinema tech support staff in the tools of their trade will prove worthwhile. Outsourcing seems so year 2000.

 

Free Wireshark Training

Which is what Laura Chappell figured out and has dealt with. It isn’t for everyone in your organization, but someone in your organization should know this tool well enough to be certified in the use of it. DCinema networks are getting more complex as the shift to IMBs and more reliance upon TMSs and outside resources like satellites.

Chappell University – Online Wireshark Training

Wireshark · the world’s foremost netowrk protocol analyzer – Go deep.

That said, when I saw FREE on one of the training pages, I said, “Color me there.”

Chappell University – Training Schedule

 

2012 COURSE LIST

[Register] FEB 15 10am PST Wireshark 202: Coloring Rules free

[Register] FEB 16 10am PST Filter with Snort Rules [AAP Event]

[Register] MARCH 14 10am PST Wireshark 101: Introduction free

[Register] MARCH 15 10am PST Filter Expression Button [AAP Event]

[Register] APRIL 25 10am PST First 5 Troubleshooting Steps [AAP Event]

 

There is so much more to the Chappell website of course. On this page (Chappell University Online Portal) is a DVD ISO image with a Lab Kit, just the thing to get your techs launched into the concept of being a professional in the art…instead of knowing how to thread a film in the projector, they have to see how the movie threads through the network and which parts need a little lite oil, which might need a touch of the hammer.

One could always go with An Idiot’s Guide…oops, the Network Monitoring and Troubleshooting for Dummies book, available for download from another network consulting group. Go to Riverbed’s page: Network Monitoring and Troubleshooting for Dummies | Documents | Media & Downloads

Good luck to us all. One way or the other, the ideas and techniques of training the cinema tech support staff in the tools of their trade will prove worthwhile. Outsourcing seems so year 2000.

 

Certificate Authorities and DCinema

Another has been found to have introduced a man-in-the-middle attack vector, meaning that once a legitimate user opened the door by giving the correct credentials, someone slipped in and assumes the identity of that user with all their rights (usually kicking them off the system – something that should arouse suspicion but which happens so often, seems normal.

Last week the Big Kahuna of CAs, Verisign, had to admit that they also were hacked into and that data was stolen from their systems. Coming so long after the break-in and after people got used to the news that smaller sites were hacked (relatively smaller sites…still significant to the system though), this isn’t getting a lot of play. When Belgian CA GlobalSign was broken into the hue and cry approached ChickenLittle-ish. This week I see articles on Verisign that don’t get any clicks.

Is it that all the tech geniuses at all the dcinema installers and installation and distribution sites double-triple checked their firewalls and decided they were nuke free and nuke-proof? Or perhaps we are complacent, feeling that the industry is not like the bank industry, with no immediate link to buckets of spendable cash, and no one really focusing the industry. Or, perhaps more logically, the dcinema industry is just hoping that the entire unbuilt fortress of SMPTE compliance will get together before the jewels that the studios need to protect get too exposed, because – “Hey, we’re pedaling as fast as we can, and see, you wanted all these updates put into legacy equipment with constant patching to the legacy InterOp format…”

For bettor or worse, there is no universal trusted device list in the industry, most likely due to potential liability issues. This has led to every company and their brother having a separate list – though there is enough interplay that these are presumed to have enough intercourse that if one list is polluted with a rogue ‘signed’ utensil, it would be disseminated throughout the lists. So, the best and the worse of all possible worlds.

Into this is a RFI from a company (last week) suggesting that they can build a system…

This article is a work in progress. Here are some of the industry articles that provoked the issue:

Who to trust after the VeriSign hack? | IT PRO

VeriSign admits 2010 hack | IT PRO

Trustwave issued a man-in-the-middle certificate – The H Security: News and Features

Break-ins at domain registrar VeriSign in 2010 – The H Security: News and Features

Backdoor in TRENDnet IP cameras – The H Security: News and Features

Certificate fraud: Protection against future “DigiNotars” – The H Security: News and Features

OpenPGP in browsers – The H Security: News and Features

Google researchers propose way out of the SSL dilemma – The H Security: News and Features

Google wants to do away with online certificate checks – The H Security: News and Features

Is the end nigh for Certificate Authorities? | IT PRO

Certificate issuing stopped at KPN after server break-in discovered – The H Security: News and Features

Certificate Authorities and DCinema

Another has been found to have introduced a man-in-the-middle attack vector, meaning that once a legitimate user opened the door by giving the correct credentials, someone slipped in and assumes the identity of that user with all their rights (usually kicking them off the system – something that should arouse suspicion but which happens so often, seems normal.

Last week the Big Kahuna of CAs, Verisign, had to admit that they also were hacked into and that data was stolen from their systems. Coming so long after the break-in and after people got used to the news that smaller sites were hacked (relatively smaller sites…still significant to the system though), this isn’t getting a lot of play. When Belgian CA GlobalSign was broken into the hue and cry approached ChickenLittle-ish. This week I see articles on Verisign that don’t get any clicks.

Is it that all the tech geniuses at all the dcinema installers and installation and distribution sites double-triple checked their firewalls and decided they were nuke free and nuke-proof? Or perhaps we are complacent, feeling that the industry is not like the bank industry, with no immediate link to buckets of spendable cash, and no one really focusing the industry. Or, perhaps more logically, the dcinema industry is just hoping that the entire unbuilt fortress of SMPTE compliance will get together before the jewels that the studios need to protect get too exposed, because – “Hey, we’re pedaling as fast as we can, and see, you wanted all these updates put into legacy equipment with constant patching to the legacy InterOp format…”

For bettor or worse, there is no universal trusted device list in the industry, most likely due to potential liability issues. This has led to every company and their brother having a separate list – though there is enough interplay that these are presumed to have enough intercourse that if one list is polluted with a rogue ‘signed’ utensil, it would be disseminated throughout the lists. So, the best and the worse of all possible worlds.

Into this is a RFI from a company (last week) suggesting that they can build a system…

This article is a work in progress. Here are some of the industry articles that provoked the issue:

Who to trust after the VeriSign hack? | IT PRO

VeriSign admits 2010 hack | IT PRO

Trustwave issued a man-in-the-middle certificate – The H Security: News and Features

Break-ins at domain registrar VeriSign in 2010 – The H Security: News and Features

Backdoor in TRENDnet IP cameras – The H Security: News and Features

Certificate fraud: Protection against future “DigiNotars” – The H Security: News and Features

OpenPGP in browsers – The H Security: News and Features

Google researchers propose way out of the SSL dilemma – The H Security: News and Features

Google wants to do away with online certificate checks – The H Security: News and Features

Is the end nigh for Certificate Authorities? | IT PRO

Certificate issuing stopped at KPN after server break-in discovered – The H Security: News and Features

Half of Fortune 500s, US Govt. Still Infected with DNSChanger Trojan

More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the  criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows.

Source: FBI

The malware, known as the “DNSChanger Trojan,” quietly alters the host computer’s Internet settings to hijack search results and to block victims from visiting security sites that might help scrub the infections. DNSChanger frequently was bundled with other types of malware, meaning that systems infected with the Trojan often also host other, more nefarious digital parasites.

See the full article at:

Half of Fortune 500s, US Govt. Still Infected with DNSChanger Trojan

More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the  criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows.

Source: FBI

The malware, known as the “DNSChanger Trojan,” quietly alters the host computer’s Internet settings to hijack search results and to block victims from visiting security sites that might help scrub the infections. DNSChanger frequently was bundled with other types of malware, meaning that systems infected with the Trojan often also host other, more nefarious digital parasites.

See the full article at:

Lesson One: Who’s on the Network

{youtube}95om-Mr3Af0{/youtube}

The beauty of this tool is that it is free. Here is what they say the highlights are:

PRODUCT USAGE:

  • IP Address Tracker Highlights:
  • Track an unlimited number of IP addresses for a unified, at-a-glance view of your entire IP address space
  • See which IP addresses are in use – and which are not
  • Eliminate manual errors while ensuring that IP addresses are listed in the right place
  • Determine the last time an IP address was used
  • Pre-populate key statistics like DNS and response time

The Solar Winds IP Address Tracker can be downloaded from the Solar Winds site at: SolarWinds-IPAddressTracker-v1.zip For pro or beginner, it is a good first tool to use as the week turns to next week and the administration of your system hasn’t been done.

It is simple enough to use straight after download, but you will find an email in your inbox that will give you links to several courses of materials. Except for those who make IP their daily business, we’d recommend them all.

As you would expect, since everything in digital cinema seems to change every year, IP is going to change this year. Early in June the first official day of IPv6 will come and go. Nothing will change since so much of our equipment has been developed for this day to come and go. But it would be a good thing to have a handle on the situation well in advance. Who knows what switch or router is so old and the firmware so grey that it might freak on the new larger numbers.

On the more practical level, new projectors are going to have IMBs as well as SMS units. One more set of IP addresses to track. Why not train a few people on this in your organization?

Lesson One: Who’s on the Network

{youtube}95om-Mr3Af0{/youtube}

The beauty of this tool is that it is free. Here is what they say the highlights are:

PRODUCT USAGE:

  • IP Address Tracker Highlights:
  • Track an unlimited number of IP addresses for a unified, at-a-glance view of your entire IP address space
  • See which IP addresses are in use – and which are not
  • Eliminate manual errors while ensuring that IP addresses are listed in the right place
  • Determine the last time an IP address was used
  • Pre-populate key statistics like DNS and response time

The Solar Winds IP Address Tracker can be downloaded from the Solar Winds site at: SolarWinds-IPAddressTracker-v1.zip For pro or beginner, it is a good first tool to use as the week turns to next week and the administration of your system hasn’t been done.

It is simple enough to use straight after download, but you will find an email in your inbox that will give you links to several courses of materials. Except for those who make IP their daily business, we’d recommend them all.

As you would expect, since everything in digital cinema seems to change every year, IP is going to change this year. Early in June the first official day of IPv6 will come and go. Nothing will change since so much of our equipment has been developed for this day to come and go. But it would be a good thing to have a handle on the situation well in advance. Who knows what switch or router is so old and the firmware so grey that it might freak on the new larger numbers.

On the more practical level, new projectors are going to have IMBs as well as SMS units. One more set of IP addresses to track. Why not train a few people on this in your organization?