Saturday, 31 October 2015
From 2G Tuesdays to banning of iPhones, Facebook makes employees experience how Internet is accessed in developing countries
from
via CERTIVIEW
Lenovo launches Yoga 700 Windows 10 convertible laptop
from
via CERTIVIEW
Windows 10 will be automatically offered as an optional update for all Windows 7 and 8.1 customers, says Microsoft
from
via CERTIVIEW
Friday, 30 October 2015
Apple applies for patent for making iPhones shatter proof
from
via CERTIVIEW
Disney Researchers invent method for designing 3D printable connectors for connecting physical objects
from
via CERTIVIEW
8 innovative ways WhatsApp is being used in India
from
via CERTIVIEW
How To Track Processes With Active Directory Auditing
from Tom's IT Pro
via CERTIVIEW
Building the Next Generation of Cyber Professionals
New technologies lead to new products, which lead to a need for more cybersecurity professionals. It’s an ongoing cycle.
Future security professionals will need to focus on some key concepts in order to be knowledgeable and equipped to handle the stability and security issues of tomorrow’s technology.
Experience
Experience always has and always will be important in landing a job and keeping that job. You need to be able to perform the tasks required by a position. You might not be able to walk directly into the security profession of your dreams, but starting off in more mundane positions, excelling at accomplishing your work responsibilities will not only grant you experience, but also enable you to be recognized for your excellence, which usually equates to promotion and career advancement. More experience leads to more knowledge, and more applied knowledge leads to wisdom. Security professionals need wisdom to see the risks and responses that others overlook.
Coding Skills
There will always be IT positions that do not require programming ability, but a security professional is not likely one of them. Many future security positions will require coding skills. After all, with coding skills you can:
- Analyze suspicious programs to determine their function and intent.
- Craft filters and responses to attacks while waiting for a vendor to release a patch.
- Improve the function of open source programs or write your own code to solve problems.
Certifications
Experience can be a trump card, but many HR managers will not take a second look at a prospect unless he or she has certain specific requirements. Such requirements often include not having a criminal record, having a college degree and having specific certifications.
While training for some certifications is often geared toward passing an exam, achieving a certification at least provides a rough measurement of your knowledge level and capability. Someone who has a certification has a better chance at being considered for a job than someone else who has the same overall background but lacks certification.
To determine which certifications to pursue, survey 10 to 20 job postings from various organizations for the specific job you would like to have. List the certifications recommended or required in those postings. Use that list as a road map to gain the needed training and pass the certification exams. Re-perform this survey every three to six months to keep your progress on target.
Penetration Testing
Checking or verifying that a security implementation functions as expected and designed is often referred to as ethical hacking or penetration testing. A security professional will likely find that the need to perform his or her own internal security analysis will be increasingly essential in security management. Hiring consultants to perform penetration tests can be dauntingly expensive, so the ability to perform your own penetration tests is a significant benefit compared to others without such skills.
End User Acceptance Testing
Often security experts get caught up in enforcing the most secure implementation without considering how it impacts the work tasks of individuals. Security should always be adjusted to business needs and requirements. It is of little value to have a highly secure network if essential business tasks cannot be accomplished.
While developing and deploying new security solutions, take the time to review how the security improvements will affect users and business tasks.
Whenever possible, develop training to help end users adjust to new business processes before implementing significant security changes. If workers do not accept and adjust to security, they will often find a way to bypass or disable the security that they see as too inconvenience or having no direct value to their specific work activities.
Staying Prepared
As security experts, it is our responsibility to continuously prepare for new technologies and to encourage the adoption of improved security measures in order to increase stability and reduce exploitation. In order to stay vigilant, the next generation of security professionals should have experience, coding skills, certification, penetration testing skills and the ability to perform pre-deployment end-user testing.
Recommended Training
Building Cybersecurity Champions
from
CERTIVIEW
Swipe launches premium yet affordable 4G smartphone ELITE 2 exclusively on Flipkart from 8th November onwards
from
via CERTIVIEW
Gartner’s 2015 Hype Cycle identifies key green technologies
In response to growing demands from customers, partners and consumers, many organizations are moving beyond corporate social responsibility..
from
via CERTIVIEW
Net Neutrality activists from India write open letter to Mark Zuckerberg, CEO, Facebook
from
via CERTIVIEW
CCNA R&S Question of the Week: Switch vs. Hub
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
Answer: B.
Hubs are considered layer one devices. They are multiport repeaters. They full traffic to all ports, all the time. Switches (layer 2 switches) are layer two devices and forward traffic based on learning the layer 2 addressing (MAC address) of devices and determine the need to forward based on the location of the destination, relative to the source.
Related Resources
Cisco White Papers
Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2
CCNA R&S Question of the Week Series
from
CERTIVIEW
Thursday, 29 October 2015
India to realize the target of 25% share of manufacturing in economy at best by 2025: Dun & Bradstreet India
from
via CERTIVIEW
VS Parthasarathy, Group CIO, Mahindra and Mahindra on how the group is using technology to prepare for the future
from
via CERTIVIEW
Best Virtualization Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
Researchers show trick to get around Uber’s surge pricing
from
via CERTIVIEW
ASRock Rack Launches Xeon D Motherboards
from Tom's IT Pro
via CERTIVIEW
Typesafe Announces Full Lifecycle Support For Apache Spark
from Tom's IT Pro
via CERTIVIEW
Server-Side Caching Continues To Evolve As SanDisk Releases FlashSoft 3.8
from Tom's IT Pro
via CERTIVIEW
Quickr eyes huge opportunity in services business; launches QuickrServices
from
via CERTIVIEW
Skype partners with Yash Raj Films and ErosNow to develop custom Bollywood Mojis
from
via CERTIVIEW
Blue Coat Mobile Malware Report 2015 – Mobile attacks more vicious than ever
from
via CERTIVIEW
Videocon Mobile Phones adds excitement to this festivity; announces the Biggest Festive Offer on its cutting-edge smartphones
from
via CERTIVIEW
Helpchat crossed 1 mn downloads on the Android store
from
via CERTIVIEW
JFrog Mission Control Expands Artifactory Managability Across Regional Datacenters
from Tom's IT Pro
via CERTIVIEW
Real-Life IT Horror Stories: The Day the Logic Bomb Went Off
Part 4 of the Real-Life IT Horror Stories Series
Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.
AMC’s television series “Halt and Catch Fire” shows North Texas’ rise as the “Silicon Prairie.” In the 1980s and early 1990s, it’s where IBM PC cloning was explored and where first-person shooter games were created. It’s also the site of the first “logic bomb”—the source of my horror story.
Very early in my career, a disgruntled employee used a logic bomb to digitally wipe out more than 160,000 corporate records. That happened at the first company where I had an IT job, in Fort Worth, Texas, my hometown.
A logic bomb is sometimes confused with a computer virus. However, a logic bomb is really a piece of code that is intentionally created to do malicious activities when a desired set of criteria is met. For example, a programmer could install a logic bomb to automatically delete a database if it didn’t receive some kind of code or signal after a set period of time.
The Effects of the Logic Bomb
That’s exactly what happened where I worked. There was a system programmer who had a reputation for being difficult to work with. A couple of years prior, he created code that would automatically delete corporate records if certain criteria were met. This programmer was fired in September 1987. A couple of days after his firing, the logic bomb went off, deleting about 168,000 important corporate records. The programmer who did this became the first person ever convicted of “harmful access to a computer.”
At the time, I was still in high school and was doing some IT work in the evenings. My mother had a connection in that company, which is how I was able to get the job. I was in a very entry-level role that involved running a printer attached to an IBM mainframe. I didn’t know much about organizations at the time, or really how they worked. I remember seeing the “higher-ups” running around with frantic looks on their faces. From my perspective, the volume of print that was produced increased dramatically, and I ended up working lots of extra hours while the organization was trying to recover from the data loss.
I remember at one point we had numerous federal agents on-site. At times, they would watch us print data and then they’d remove it from the printer to ensure that we didn’t look at what had been printed. It would not be the last time in my career that federal agents were involved. There was a time in the 1990s when some employees were accused of insider trading, and there was another time following 9/11 when some suspicious accounts at the company where I worked belonged to potential terrorists. But, those are stories for another time.
Young and Carefree No More
It took a while, but eventually the organization recovered from the data loss. I started that job in the summer of 1987, and I remember being so young and carefree at the time and generally having a good time at work. After that event, I began to realize how important IT is. This logic bomb had a profound effect on my career, and how I thought about IT.
I began to think a lot about this situation, and how it meant that those of us with technical IT jobs really do wield a lot of power under certain conditions. A few years later, when I had changed companies a few times and started to make my way up the corporate ladder, I thought of this event as being something that has always informed my view of IT change management. I’ve thought about how a good IT change management process would have detected the programmer installing the malicious code and would have saved the organization significant amounts of money related to recovery efforts.
I’ve worked all over the world, but stories like this are really what’s kept me in North Texas. There’s always something happening here in a behind-the-scenes way that is a significant contribution to the world of technology. These events have a way of shaping those of us in the area, which is why I think there are so many IT and telecommunications people that hail from North Texas.
Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.
Related Posts
When Your Website Goes Dark: Tales of DNS Malfunctions
The Espionage Denial Nightmare
The Avoidable DNS Disaster
from
CERTIVIEW
5 areas where Drones are making a huge impact
from
via CERTIVIEW
“CTE is focused on building the partnerships and talent base”
- What is the 2nd inning plan for Cambridge Technology Enterprise?
from
via CERTIVIEW
5 areas where Drones are making a huge impact
from
via CERTIVIEW
Can Dell Clear the Nebulae Around the EMC deal?
from
via CERTIVIEW
Wednesday, 28 October 2015
Researchers find vulnerabilities in use of certificates for Web security
from
via CERTIVIEW
Unitrends Takes Its Enterprise Backup To Version 9.0
from Tom's IT Pro
via CERTIVIEW
Seagate 8 TB Surveillance HDD Points To Increasing Video Surveillance Capacity Needs
from Tom's IT Pro
via CERTIVIEW
QNAP Announces Fanless Small Package NAS
from Tom's IT Pro
via CERTIVIEW
HP Announces Helion OpenStack 2.0 With Enhanced Lifecycle Management And Security Features
from Tom's IT Pro
via CERTIVIEW
Wrapping Up Dell World 2015 With Tom's IT Pro Interviews
from Tom's IT Pro
via CERTIVIEW
Security Operations Center (SOC) 101
from Tom's IT Pro
via CERTIVIEW
A smart city of 1 million will generate 180 million gigabytes of data per day by 2019, predicts Cisco study
from
via CERTIVIEW
Netmagic launches India’s largest data center in Mumbai
from
via CERTIVIEW
nGenx nWorkspace Gets Integrated File Sharing With nFinity Drive Release
from Tom's IT Pro
via CERTIVIEW
Real-Life IT Horror Stories: The Avoidable DNS Disaster
Part 3 of the Real-Life IT Horror Stories Series
Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.
While acting as vice president of a performance-based Internet marketing company, I oversaw the migration to a new infrastructure, an important part of which involved changing over 300 of our DNS records. Imagine my horror when I discovered that we’d mistakenly misrouted nearly all of those records, taking the entire company down.
DNS Goes Down Taking Revenue Along With It
Performance-based marketers take all the risk, like buying media and sending emails, and are only reimbursed when and if, a resulting sale or conversion occurs. Our company ran the strong chance of bleeding cash just by advertising a product that didn’t convert. Days like our DNS outage were tough not only because they took the company offline, but mainly because they were completely avoidable.
What we did wrong is a checklist of all the top no-nos:
- Too few resources — First, our tiny team was already stretched to the limit, with everyone juggling six to eight mission critical deliverables every day. We didn’t give this migration the elevated “holy” status it needed to succeed.
- Not vetting employee qualifications – I assumed the person I’d assigned the task to (let’s call him “Mr. P.”) had DNS experience because of his two decades in software development. I only asked high level questions like, “Are you OK doing this?” and “Can you do it on Friday?”
- Bad timing – What was maybe the biggest mistake was performing a major change like this on a Friday, or more specifically, EOD Friday. Too many times at this company, employees sacrificed their weekends because executives insisted on Friday releases.
- Inadequate TTL settings — I did not personally ensure that the time to live (TTL) settings, which represent the time it takes to propagate DNS records, were set to the lowest value possible. Lower TTLs would have allowed us to quickly roll back any issues.
- A false sense of security — I shoulder surfed the start of Mr. P.‘s work on that Friday, witnessing five to seven of the DNS records get correctly get re-assigned. That made me think, “Of course he’ll do the other 300 correctly”.
The Nightmare Continues
That next day (Saturday, of course) while enjoying brunch with my family, I got a panicked call from our senior vice president of ad buying:
“All the URLs are going to other websites. The mortgage URL is going to the acne products, the acne products URL brings up the cell phone landing page. I’ve shut off all campaigns.”
I pulled up some URLs, and sure enough, each one was completely misrouted, at the exact time (weekend) when they’re supposed to be making the most money. I tried to call Mr. P, but only got voicemail. I immediately went into the office only to find that, (again, because we were all so busy, and because I’d not made this a priority for Mr. P.), we’d not documented how to access the DNS provider.
Lessons Learned
When we were finally able to track Mr. P. down, hours later, he discovered that the TTLs had not been set to five minutes as we’d thought. Most were still at six hours or more. Only after much internal stress, completely destroyed weekends, apologies to clients and the loss of over $20,000, did we get our 300 DNS records going back to the correct servers. Looking back, this incident really reinforced that fact that you can never take anything for granted. Just because somebody should know how to complete a task does not mean that they do. My advice to you is to make sure your team has the necessary skills to complete a task before you turn them loose. It’s much easier to address items with your staff than with your clients – trust me.
Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.
Related Posts
When Your Website Goes Dark: Tales of DNS Malfunctions
The Espionage Denial Nightmare
from
CERTIVIEW
Improving customer experience a top business priority- Accenture Study
from
via CERTIVIEW
Godaddy launches Godaddy pro program for web developers & designers
from
via CERTIVIEW
CISSP Question of the Week: Customer Credit Card Information
CISSP Question of the Week courtesy of Transcender Labs.
Your company has an e-commerce site that is publicly accessible over the Internet. The e-commerce site accepts credit card information from a customer and then processes the customer’s transaction. Which standard or law would apply for this type of data?
A. The Economic Espionage Act of 1996
B. PCI DSS
C. Basel II
D. SOX
The correct answer is B.
The Payment Card Industry Data Security Standard (PCI DSS) applies to any entity that transmits, stores, or accepts credit card data. This is a private sector standard and not a law.
The Economic Espionage Act of 1996 protects companies from industry or corporate espionage, and specifically addresses technical, business, engineering, scientific, or financial trade secrets.
Basel II is an accord that went into effect in 2006. This accord affects financial institutions. Its three main pillars are as follows:
- Minimum Capital Requirements — determines the lowest amount of funds that a financial institute must keep in hand.
- Supervision — ensures oversight and review of risks and security measures.
- Market Discipline — requests members to disclose risk exposure and to validate market capital.
The Sarbanes-Oxley (SOX) Act of 2002 was written to prevent companies from committing fraud by knowingly providing inaccurate financial reports to shareholders and the public. It is mainly concerned with corporate accounting practices. Section 404 of this act specifically addresses information technology.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
from
CERTIVIEW
Flipkart goes offline with Spice Hotspot
from
via CERTIVIEW
What happens to a lost smartphone?
from
via CERTIVIEW
Wipro wins 5-Year strategic engagement with Coop Norge Handel AS
from
via CERTIVIEW
Dyn brings Internet Intelligence solution to strengthen foothold in India
from
via CERTIVIEW
Orange Business Services drives digital transformation through IT service management platform with ServiceNow
from
via CERTIVIEW
Ericsson completes acquisition of Envivio
from
via CERTIVIEW
Polycom partners with directorate general supplies and disposals (DGS&D) to boost uptake of video collaboration solutions in government sector
from
via CERTIVIEW
Lenovo launches digital marketing campaign to engage B2B customers
from
via CERTIVIEW
Tata Sky deploys Brocade’s data center network solution to manage high volume traffic
from
via CERTIVIEW
Improving customer experience is top business priority for companies pursuing digital transformation: Accenture Study
from
via CERTIVIEW
Wipro wins 5-Year strategic engagement with Coop Norge Handel AS
from
via CERTIVIEW
Tuesday, 27 October 2015
Arvind Lifestyle Brands chooses 3DEXPERIENCE platform from Dassault Systèmes
from
via CERTIVIEW
Indian consumers increasingly comfortable using mobile apps for managing finances, survey finds
from
via CERTIVIEW
Oracle sees traditional rivals IBM and SAP nowhere in the cloud
from
via CERTIVIEW
The social impact of mobility
from
via CERTIVIEW
Oracle Announces Enhanced Integration Platform For Cloud, Mobile, IoT
from Tom's IT Pro
via CERTIVIEW
Oracle Announces Oracle Cloud Platform For Big Data
from Tom's IT Pro
via CERTIVIEW
Best Telecommunications Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
Ethernet HDDs Gain Traction, Exablox Demos NAS With Kinetic-based Toshiba KVDrives
from Tom's IT Pro
via CERTIVIEW
Epson WorkForce Pro 6000 Series Printers Designed To Fit Nicely Into A Workgroup Setting
from Tom's IT Pro
via CERTIVIEW
Almost 50% of Indian children admit to meeting a stranger they first met online, reveals Intel Security study
from
via CERTIVIEW
IT departments face obstacles to user mobility for fear of data breaches
from
via CERTIVIEW
Gemalto delivers IoT smart data to emergency responders throughout the U.S.
from
via CERTIVIEW
Asus Zenfone 2 Laser 5.5 available on Flipkart, priced at Rs. 13,999
from
via CERTIVIEW
Diwali comes early for Meizu fans Bring home the Meizu m2 for INR 6,999 and get a 32 GB Micro SD card free
from
via CERTIVIEW
Coolpad Note 3 completes another successful flash sale
from
via CERTIVIEW
Narendra Nayak appointed as new Managing Director for BlackBerry India
from
via CERTIVIEW
Real-Life IT Horror Stories: The Espionage Denial Nightmare
Part 2 of the Real-Life IT Horror Stories Series
By Phill Shade
Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.
About three years ago while in a galaxy, unfortunately all too nearby, I was working as a consultant for a small design company when I came across the nightmare of all nightmares: industrial espionage.
I was contacted by another consultant who had been analyzing the client’s network to optimize performance. While the first engineer was able to address several routine network issues, he had requested assistance in analyzing a possible data breach.
The Problem: Design Theft
Arriving on-site, the initial brief revealed that the company designed the distinctive cases used by major vendors to house their products. The issue was that their designs were showing up in illegal markets, sometimes before they were even in production.
Several days’ worth of investigation using Wireshark, GeoIP and graphical traceroute utilities showed an internal connection originating in the company’s design servers and reaching to St. Petersburg, Russia.
Capturing the Culprit
To confirm this observation, we created several fake designs and uploaded them to the server in question. We then attached Wireshark to a hub and connected the server back to the network switch. A capture filter was set inside Wireshark and set to the IP address of the server.
Within a matter of only a few hours, using Wireshark, we were able to observe a stealth connection originating in St. Petersburg and connecting into an open port on the design server. What followed wasn’t that much of a surprise as we watched the very designs we had loaded into the server copied and transferred back to Russia. We had our villain!
We saved all of our evidence, created a quick report and prepared our presentation before leaving for the day. The next day dawned and we met with our client contact to reveal our evidence and supporting documentation.
Initially, the presentation appeared to go well as we laid out our evidence, explained our methodology and concluded with a series of logical recommendations such as securing the network with a series of firewalls, implementing logging of transactions and basic data encryption.
It All Starts to Go Wrong
What ensued still lingers in my mind to this day for its colossal arrogance and blind adherence to a single view of things with all evidence to the contrary. Rather than accepting our findings and thanking us, the client instead stated:
“That can’t be true; you’re reading it wrong!”
To say I was surprised at this response was the understatement of the week. When I gathered my thoughts and asked why, the next shock ensued:
“Our network can’t possibly be compromised since we only use Mac computers and they are safe from hacking!” the client uttered with blind belief in modern advertising.
When we dared to ask what sort of security software or hardware they used to protect the network and infrastructure, we received nearly the same answer.
So hoping for the best, we presented our presentation to the department head, then the CTO and finally the CEO. Each piece of evidence, the Wireshark capture files, the GeoIP information and the traceroute results as well as the IANA address resolution was covered; only to be met with the same statement that there had to be a mistake and there was no need to follow any of the recommendations as this would make operating the network to difficult.
The Client Isn’t Always Right
Completely at a loss for words all we could do was present the invoice for services rendered and make our somewhat chagrined departure. Keeping a watch on the company revealed they were out of business in another year or so. I learned that sometimes all you can do is capture the culprit, present the evidence and hope for the best.
Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.
Related Post
When Your Website Goes Dark: Tales of DNS Malfunctions
from
CERTIVIEW
Canon India steps into surveillance domain with new intelligent network cameras
from
via CERTIVIEW
Apple Pay will accelerate biometric transactions to nearly 5 billion by 2019, says Juniper Research
from
via CERTIVIEW
Kodak Capture Pro Software v5.1 helps businesses eliminate the hidden cost of bad data
from
via CERTIVIEW
“Launch by Quixey” now available on Google Play for mobile users in India
from
via CERTIVIEW
FreeCharge wallet reaches 5 million user landmark within four weeks of launch
from
via CERTIVIEW
Monday, 26 October 2015
Sony LIV launches its third exclusive online series, ‘Tanlines’
from
via CERTIVIEW
flydubai to enhance customer experience with NIIT Technologies
NIIT Technologies announced a long-term strategic agreement with Dubai-based airline flydubai .
The agreement will enable flydubai to..
from
via CERTIVIEW
BFSI takes a digital leap
from
via CERTIVIEW
Stanford University Offers Killer Online Certificates in Data Mining
from Tom's IT Pro
via CERTIVIEW
Researchers develop 3D concrete printer that can print smart walls
from
via CERTIVIEW
Samsung SM863 3D V-NAND Enterprise SSD Review
from Tom's IT Pro
via CERTIVIEW
Equinix Cloud Exchange Expands To Include Rackspace And IBM SoftLayer
from Tom's IT Pro
via CERTIVIEW
Indian public cloud services market will reach $731 million in 2015, predicts Gartner
from
via CERTIVIEW
When Your Website Goes Dark: Tales of DNS Malfunctions
Part 1 of the Real-Life IT Horror Stories Series
Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Check back each day for a new post. Read on if you dare.
Almost every IT administrator, whether they work in storage, networking, servers, or clients, has a story about the Domain Name System (DNS) not functioning properly. I collect DNS horror stories like some people collect bottle caps.
The Case of the Disappearing Domain
I was working at a start-up company that had grown from a dozen people to about 80 employees in a couple of years. It was a busy time, Web traffic was picking up every day. And then one Wednesday, we noticed a dramatic drop in incoming email, and the hits on the website dropped like a rock. But not rock bottom. Frantically, I tested from the outside and inside. Everything was fine.
The vice president of engineering called me. Some important quotes and contract negotiations from our customers weren’t coming through. I sent test messages. All of mine went through. The chief financial officer stopped by my office. He had just gotten off the phone with an investor. Our website was down, and we weren’t receiving emails from them. Then the CEO was in my office.
My sweaty fingers were wildly typing frantic magic incantations, desperately struggling to resuscitate our presence and existence in the networked world. We were slipping away. Hour by hour it was getting worse. And then nothing. Our network communications flatlined. All inbound communications had ceased. Yet we could still ping out. No one could get into our business. We were dead.
That was the painful day that I discovered the agony and defeat that having someone buy your domain name out from under you can cause. I knew the network was solid and working at the Internet Protocol level. We could get out to the rest of the world with the exception of PTR record authentications for outbound email that had begun to fail to some destinations. I discovered that another registrar had allowed some company to register the domain name we already “owned.” Our company name was stolen out from under us.
You might not think that DNS is a dangerous business that involves theft, espionage, sabotage, or outright hacker malice with no competitive angle. I know of several other second-hand occurrences of domain theft, including people having to file certification of their right to their business name, and other cases that went to court. But I have never had it happen to me again directly. We got our domain back, though it took several days for the email and Web services to start flowing fully again. I am now sure to lock in the registration so that no one can unregister the domain names of my business or those of my clients. Please be safe and always protect yourself.
Not-So-Active Directory
Domain names are everywhere—on billboards, radio, television, web videos, Skype, Lync, business cards and any other kind of communications. To have a DNS is to be able to communicate in business and personal aspects of life. All internal computer-based business operations, and all Internet-based and personal communications depend on the Domain Name System. Even being able to log in to computers with Active Directory, depends on DNS. Servers also need to log into their computer accounts in Active Directory and that depends on a properly functioning DNS too.
A colleague of mine was setting up a new Active Directory domain. They scripted the configuration and population of the domain for a development environment to be a clone of test system so that a team of people could work with realistic test data during development. The new domain controller worked perfectly. Redundancy is always a good idea. So they were setting up another Active Directory server.
The promotion of the second domain controller kept failing, telling them that the domain didn’t exist. They tried the domain several times and had been troubleshooting, but they were running out of time. The system needed to go live. They asked me to take a look. We had 15 minutes to get the second domain controller up and get 20 client machines joined into the domain and inoculated with group policies.
I was in the middle of another build, so I talked them through the troubleshooting of the problem. “Domain does not exist or cannot be contacted” they muttered. “But it’s right here!” they said, pointing at the console of the first—and only—domain controller.
I asked them to tell me the DNS settings. They brushed off the request, claiming that they had checked it a dozen times and it worked great, while they kept trying to get the second server online. It failed again.
I walked over to their console. “Show me the preferred and alternate DNS servers on the second machine,” I asked. The settings popped up and I noted coolly, “Those are the DNS servers on the client’s network, not the development network. Show me the first server.”
They brought up the DNS settings. Both the preferred and alternate DNS settings for the first domain controller were set to the client’s network. We didn’t have permissions to register any records in their DNS infrastructure. My colleague had simply forgotten to set up an independent DNS zone and host it on our systems, then forward other requests to the client’s DNS servers. They adjusted the configuration and after a couple of hours of frustration were able to get everything running within a few minutes, just in time for the team of developers to arrive.
Always double-check your work when overtired. Always ask for help or another person to cross-check the settings when in doubt, or even when you’re sure of yourself. And always suspect DNS. I always say that “there are two things that can go wrong with Active Directory—time and DNS.”
Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.
from
CERTIVIEW
Mobiles at Rs 99, Laptops at Rs 6499, and Mini Flash Sales in Overcart’s Festive OTT Sale
from
via CERTIVIEW
Why #ITForParivahan is needed?
from
via CERTIVIEW
IT Taskforce – Ministry of Shipping and Road Transport & Highways
from
via CERTIVIEW
PMP Formula of the Week: Project Schedule Information
What piece of work performance information provides the most valuable information about a project behind schedule?
A. Cost Variance
B. Status of deliverables
C. Schedule variance
D. Estimate to complete
The correct answer is C.
Schedule variance compares the current status of the schedule with the projected status for the same point in time.
Related Resources
PMP Exam Prep Mobile App
Project Management White Papers
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp
PMP Formula of the Week Series
- PMP Formula of the Week: Forecasting a Necessary CPI
- PMP Formula of the Week: Forecasting a Necessary CPI Based on an ETC
- PMP Formula of the Week: Ahead or Behind Schedule
- PMP Formula of the Week: Point of Total Assumption
- PMP Formula of the Week: Rent, Lease or Buy?
- PMP Formula of the Week: Risky Task
- PMP Formula of the Week: Earned Value Management Methodology
- PMP Formula of the Week: Schedule Performance Index of 1
- PMP Formula of the Week: TCPI
- PMP Formula of the Week: Fixed-Price Incentive Fee Contract
- PMP Formula of the Week: S-Curve
- PMP Formula of the Week: Current Project Status
- PMP Formula of the Week: Project Schedule Information
- PMP Formula of the Week: Random Defective Article
from
CERTIVIEW
Vodafone Business Services to power connectivity for JCB’s construction equipment in India
from
via CERTIVIEW
IT for Parivahan
‘IT For Parivahan’ is a nationwide initiative from IT stalwarts such as Dr...
from
via CERTIVIEW
Sunday, 25 October 2015
Indian IT industry sharpens focus on emerging technologies
from
via CERTIVIEW
Self repairing cities: Researchers show the future of smart cities with robots that can fix streetlights and repair roads
from
via CERTIVIEW
Friday, 23 October 2015
Why we all need a Ravana in our lives
from
via CERTIVIEW
Carnegie Mellon researchers show how 3D printing can be used to repair damaged hearts
from
via CERTIVIEW
V5 Systems Quietly Exits Stealth At Dell World With IoT Security System
from Tom's IT Pro
via CERTIVIEW
MOFCOM Approves Samsung, Seagate HDD Business Integration
from Tom's IT Pro
via CERTIVIEW
Google Chrome’s Mute Tab feature lets you kill noise from auto playing videos
from
via CERTIVIEW
5 Must-Have Time Management Tips For IT Pros
from Tom's IT Pro
via CERTIVIEW
AWS’ Hottest New Products Launched at re:Invent 2015
Amazon Web Services’ yearly shindig, re:Invent, turned out to be yet another whirlwind of information and product releases. Here’s the skinny on all of the important new services, in the order of what I see as the most impactful. Like all major cloud providers these days, AWS is launching these services in beta or preview mode. But in AWS parlance, that simply means that the services don’t yet have all features they’d like to see in production. All of the services below are available for immediate use.
Amazon QuickSight – QuickSight is a pay-as-you-go, cloud-based data analytics and visualization platform. With it, AWS is taking direct aim at the lucrative business intelligence (BI) visualization market currently monopolized by a handful of players like Tableau, MicroStrategy, QlikView and others. It includes an in-memory analytics engine, collaboration capabilities, easy data discovery and report recommendation/creation for common tasks like Web log analysis, out of the box integration to AWS’ data sources, and a SQL interface. QuickSight claims to be a 10th of the cost of traditional visualization tools.
AWS IoT – With this service, AWS addresses one of the biggest challenges in creating an Internet of Things (IoT) architecture: how to scale your back-end system to deal with millions or trillions of disparate devices, each of which is sending or receiving only small packets of data on an unknown or sporadic schedule. It provides MQTT or REST interfaces; a responsive, highly scalable message broker bus; and uses a SQL-based real-time rules engine to transform messages and route part or all of the data to AWS data stores. Many partners like Intel have also released $100– $200 IoT starter kits to allow users to easily experiment with building IoT applications and interfacing with the AWS IoT back-end.
AWS Import/Export Snowball – One of the biggest challenges in using AWS has always been securely and cost-effectively migrating data into or out of the platform. To move vast amounts of data, customers typically had to drop that data onto dozens or hundreds of 1-2TB hard disks and then FedEx the disks back and forth. Snowball provides customers with a 50TB durable, easy-to-configure, secure, completely self-contained shipping crate. It’s about as simple as you can get, and only costs $200 per snowball.
AWS Config Rules – AWS Config is a service that lets users inventory and track changes to AWS-side resources. It’s been around for some time, but was limited to only reporting static configurations and histories. With Config Rules, users can now set actions to be taken if/when configurations go out of spec. Users can also programmatically ensure compliance with tagging taxonomies, security guidelines and other best practices. The service hooks into Lambda, which now supports even Python scripts, to call functions that can do anything from terminating servers and rolling back configurations to raising alerts.
AWS Database Migration Service – One of the most complicated and nerve-wracking steps in any migration is cutting over the database layer – a process that normally involved some downtime and/or overtime. With AWS Database Migration Service (DMS), users can now push-button migrate a running database. All data synchronization and cutovers happen transparently behind the scenes, allowing systems to remain up and running during the migration. The DMS also includes a Schema Conversion Tool which automagically assesses and converts data formats, syntax, and stored procedures/functions from the source to the target. This greatly simplifies migration from costly, proprietary engines like Oracle or SQL Server to lower cost, open source alternatives like MySQL and PostgreSQL.
Amazon Kinesis Firehose – Kinesis, launched only two years ago, is a highly scalable managed service to ingest huge amounts of streaming data. One of the biggest limitations to the service, however, was that performing a simple load of streamed data into AWS required a fleet of expensive EC2 instances which you had to set up and maintain yourself. Firehose completely obviates the need for these EC2 fleets behind Kinesis. If you’re looking to load that data into S3 or Redshift, Firehose can complete that operation with just a few clicks in the console. AWS also alluded to Kinesis Analytics – a soon-to-be-announced service to run standard SQL queries against live streams of Kinesis data, again removing the need for EC2 instances. AWS also upped the maximum retention period of Kinesis data from 24 hours to seven days.
Amazon Elasticsearch Service – Elasticsearch (ES) is a document-oriented, popular open source text search engine for uploading, indexing, and querying massive document stores like journals, web pages, or Web logs. It does everything Apache Lucene can do, plus more. With ES, AWS offers the functionality of Elasticsearch as a scalable, fault tolerant, pay-as-you-go managed service — greatly reducing the time and costs required to create and maintain the infrastructure behind Elasticsearch. At first glance, ES directly competes against another AWS service called CloudSearch, and it will be interesting to see how, or if, they choose to differentiate the two.
Some of the other interesting announcements were a host of changes for Lambda, including Python support; Web Application Firewall as a Service (AWS WAF); Amazon Inspector , an automated security assessment service; RDS support for MariaDB; and a swath of changes around EC2, Container support, and Mobile Hub.
Although we’ve presented what we feel are the most exciting announcements to come out of AWS re:Invent, a full list of all service announcements can be found on AWS’ New Announcements page. At any rate, the announcements at re:Invent 2015 signal that AWS is only pushing the gas pedal harder to put yet more distance between themselves and the competition.
Related Training
AWS Training
from
CERTIVIEW
CCNA R&S Question of the Week: No Acknowledgment of Receipt
Which transport layer protocol provides best-effort delivery service with no acknowledgment of receipt?
A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP
Answer: E.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are transport layer protocols, IP is network layer and HTTP & Telnet are looked at as upper layer protocols or applications. UDP is best-effort, with no reliability or acknowledgement of receipt.
Related Resources
Cisco White Papers
Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2
CCNA R&S Question of the Week Series
- CCNA R&S Question of the Week: Full-Duplex Ethernet Network
- CCNA R&S Question of the Week: OSI Model Layer
- CCNA R&S Question of the Week: Connection-Oriented Service
- CCNA R&S Question of the Week: No Acknowledgment of Receipt
from
CERTIVIEW
Thursday, 22 October 2015
How Flipkart prepared itself for the Big Billion day
from
via CERTIVIEW
How Flipkart prepared itself for the Big Billion day
from
via CERTIVIEW
Best Wireless Networking Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
Dell's OptiPlex 7040 'Micro' Features Intel Unite Conferencing Technology
from Tom's IT Pro
via CERTIVIEW
50 percent of repetitive IT outsourcing jobs can be assigned to robots in the next 3 years, finds study
from
via CERTIVIEW
South Korean researchers use Big Data to create virtual dance teacher
from
via CERTIVIEW
Identity Defined Security Alliance, Letting Risk Dictate User Privileges
from Tom's IT Pro
via CERTIVIEW
Lenovo launches 4G smartphone, VIBE P1m at Rs 7999 on Flipkart
from
via CERTIVIEW
In Awe of IBM Insight 2015’s Wow Factor
It seems like every time I’m preparing to attend one of IBM’s large user conferences, event organizers just keep upping the wow factor. Whether it’s Serena Williams sharing how using data improved her tennis game or Kevin Spacey preaching about how technology empowers the rule breakers, I am amazed at how these celebrity keynote speakers always bring the message down to its essence with an IBM spin. Having No Doubt or Aerosmith waiting backstage doesn’t hurt that wow factor either.
So now it’s time for IBM Insight 2015, and who’s on the bill to speak but Hollywood legend Ron Howard – or as Eddie Murphy and I like to call him, “Opie Cunningham.”
A TV icon twice over and one of Hollywood’s most talented director/producers, Howard helped make some of our generation’s greatest films, like Apollo 13 and A Beautiful Mind, as well as some that, while not so great are some of my favorites: Willow, Cocoon and How the Grinch Stole Christmas.
You can believe that as a former reporter, current tech blogger and reluctant fiction writer, I will be on the edge of my seat as Howard sheds some light on his storytelling philosophy during IBM Insight’s Wednesday general session, “Make Your Mark – Disrupt Your Marketplace.” Howard will share the stage with his long-time producing partner Brian Grazer, along with Fredi Lajvardi, a nationally recognized STEM educator and the subject of the documentary, “Underwater Dreams,” and major motion picture, “Spare Parts.”
As if this isn’t enough to keep IBM Insight 2015 attendees enthralled, Adam Levine and a little Grammy-winning band called Maroon 5 will be performing during IBM Insight’s customer appreciation event.
I’m a Twitter geek, so one of the highlights of IBM Insight 2015 for me will be hearing Twitter VP of Data Strategy Chris Moody kick off IBM Insight’s Monday morning general session “Leave No Problem Unsolved – Transform Your Industry.” Moody will provide insight into how Twitter handles its vast data ecosystem.
Laurent Borne, Whirlpool’s general manager of Connected Appliances, will also speak during Monday morning’s general session on how his company is innovating its products for the ensuing Internet of Things wave. David Kenny, CEO of The Weather Company, and Jack McMaster, President of the Preparedness and Health and Safety Services at the American Red Cross, will share innovations applied at their organizations through insightful data.
In addition to the general sessions, IBM Insight 2015’s expected 14,000 attendees will get a chance to take advantage of seven keynotes, nine super sessions and more than 1,600 sessions and hands-on labs.
Jason Silva of National Geographic Channel’s Brain Games will lead IBM Insight’s Social Business super session entitled “Technology Transcendence: Giving Your Collaboration Tools a Brain.” Silva will discuss the ability to extend collaboration with technologies like cognitive computing to increase our potential as individuals and change the way we work together. Also during this super session, IBM’s Rob Koplowitz will discuss how the power of Watson and other emerging technologies are making teams and people more productive at work.
IBM Insight’s remaining eight super sessions will cover:
- Mobile – Context is King: How Mobility is Changing the Game in the Insight Economy
- Strategic Data Partnerships – Reimagine Analytics for the Insight Economy with Twitter and the Weather Company
- Systems and Architecture – From Challenges to Shared Vision: The Path Toward a Comprehensive Big Data Analytics Solution
- z Systems – Distinguish Your Business: Compete by Driving Real-Time High-Quality Insights
- Cloud Data Services – Building Today’s Business in the Cloud
- Information, Integration and Governance – Achieving Comprehensive Information Integration and Governance
- Internet of Things – IoT: Insight for Business Transformation
- Security – Stop Unknown Threats Before You’re Breached: Apply Analytics to the Challenge of Security
Global Knowledge is sponsoring IBM Insight’s Hands-On Labs station, as well as the Certification and Testing Center. The Hands-On Labs are located in Mandalay Bay at Bayside F on Level 1, and the Certification and Testing Center is in Surf D-F at Level 2.
If you’re attending IBM Insight, stop by to see us at Booth 750 in the Solution Center at Mandalay Bay. If you can’t make it, be sure to follow us at @GKonIBM for updates from IBM Insight 2015.
from
CERTIVIEW
10K HDDs Alive And Well, As Toshiba Launches 12 Gbps AL14SE
from Tom's IT Pro
via CERTIVIEW
We are going to build the world’s IT infrastructure – Micheal Dell
from
via CERTIVIEW
Bangalore startup deploys beacons to create IoT enabled shopping district
from
via CERTIVIEW
Wednesday, 21 October 2015
Egnyte To Expand Advanced Monitoring And Reporting Capabilities
from Tom's IT Pro
via CERTIVIEW
Dell Announces Refreshed OptiPlex AIO Lineup
from Tom's IT Pro
via CERTIVIEW
Advanced Persistent Threats (APT) 101
from Tom's IT Pro
via CERTIVIEW
Dell Cloud Platform System Standard Announced, Breaking Entry Barriers To Hybrid Cloud Solutions
from Tom's IT Pro
via CERTIVIEW
Western Digital Announces Acquisition Of SanDisk For $19 Billion
from Tom's IT Pro
via CERTIVIEW
Progress Launches 2nd Edition of Incubator Program in Hyderabad
from
via CERTIVIEW
Greyhound Knowledge Group picks stake in Internet of Style; strengthens consumer technology research focus
from
via CERTIVIEW
CISSP Question of the Week: Terrorist Attacks
CISSP Question of the Week courtesy of Transcender Labs.
Your organization has asked the security team to add terrorist attacks to the organization’s business continuity plan. Which type of threat does this represent?
A. Natural environmental threat
B. Supply system threat
C. Manmade threat
D. Politically motivated threat
The correct answer is D.
A terrorist attack is a politically motivated threat. A terrorist attack is usually an attack against a particular country view from a group that opposes that the political views of that country. Often, a particular group takes credit for a terrorist attack. Politically motivated threats include strikes, riots, civil disobedience, and terrorist attacks.
Natural environmental threats include floods, earthquakes, tornadoes, hurricanes, and extreme temperatures.
Supply system threats include power outages, communications interruptions, and water and gas interruption.
Manmade threats include unauthorized access, explosions, disgruntled employee incidents, employee errors, accidents, vandalism, fraud, and theft. While terrorist attacks are caused by man and could therefore be considered a manmade attack, they are more often classified as politically motivated attacks because they are planned and carried out by terrorist organizations. Most manmade attacks are more limited in scope when considering the perpetuator.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
from
CERTIVIEW