Friday, 30 December 2016
Give Old Electronics a Second Life
from Tom's IT Pro
via CERTIVIEW
Microsoft Updated MCSE and MCSD Requirements for 2017
from Tom's IT Pro
via CERTIVIEW
Thursday, 29 December 2016
Amazon Announces Digital Day Discounts
from Tom's IT Pro
via CERTIVIEW
Best Lenovo Laptops for Business in 2016
from Tom's IT Pro
via CERTIVIEW
Lenovo Upgrades ThinkPad Line with New CPUs, Thunderbolt 3
from Tom's IT Pro
via CERTIVIEW
What is AWS X-Ray and How to Use It?
from Tom's IT Pro
via CERTIVIEW
Wednesday, 28 December 2016
7 Tips to Speed Up Windows 10
from Tom's IT Pro
via CERTIVIEW
Snowball Edge: Who Needs It and Why
from Tom's IT Pro
via CERTIVIEW
Tuesday, 27 December 2016
How to Build a Dynamic Inventory with Red Hat's Ansible
from Tom's IT Pro
via CERTIVIEW
Slack vs. Microsoft Teams: Which is Best for Business?
from Tom's IT Pro
via CERTIVIEW
Monday, 26 December 2016
What You Need to Know about AWS Shield
from Tom's IT Pro
via CERTIVIEW
Friday, 23 December 2016
How to Use PowerShell to Work with JSON Data
from Tom's IT Pro
via CERTIVIEW
Thursday, 22 December 2016
Best Security Firefox Add-Ons for IT Pros
from Tom's IT Pro
via CERTIVIEW
Wednesday, 21 December 2016
Tuesday, 20 December 2016
Top 5 Blog Posts of 2016
Global Knowledge’s top blogs of 2016 spotlight the rise of developers, the fear of hackers and an overwhelming love of tech toys.
We learned plenty about our readers when examining the most-viewed posts of the year.
They sought solutions—how can organizations improve software delivery to customers?
They sought security—how is the federal government planning to protect the data of private citizens?
They wanted a peek at the hottest gadgets—who doesn’t?
Here are our top 5 blog posts of 2016:
5. How the First Email Message was Born
“That first email was sent from one Digital Equipment Corporation computer to another DEC-10, which happened to sit beside each other in (Ray Tomlinson’s) lab.”
We send and receive so many emails a day that we tend to take it for granted. Well, so did its creator, Ray Tomlinson.
Tomlinson sent the first email in 1971 and thought so little of it that he didn’t even save the test message as a keepsake. It was so insignificant to Tomlinson that he only vaguely remembers the original message—it was something resembling “QWERTYUIOP.”
In fact, he didn’t realize the significance of his invention until he later showed it to a colleague.
Tomlinson passed away in March at the age of 74.
4. Federal Agencies Prepare for Massive Cybersecurity and Privacy Revamp
“The president’s unprecedented plan is a 35 percent increase in government-wide cybersecurity spending from the 2016 federal budget.”
This blog is probably more relevant now than when it posted in March. With Yahoo’s massive data breach and the recent DDoS attacks that impacted major web properties such as Netflix and Twitter, cybersecurity is a major concern for both businesses and consumers.
Recent intelligence findings concerning Russia’s influence in the presidential election have intensified fears as well. Can the federal government protect its own citizens from hackers?
In February, President Barack Obama created the Cybersecurity National Action Plan (CNAP), proposing a $19 billion budget to fund cybersecurity and update the government’s outdated IT systems. This post examines the details of the president’s plan and how Global Knowledge cybersecurity training can aid federal employees.
3. What Developers Can Expect in 2016
“As professional developers, we should know more than one programming language. … The question always remains, ‘Which language should I learn?’”
Author and developer Bradley Needham made some spot-on predictions in this early-2016 post.
He anticipated the importance of DevOps and tools that aid its success. He suggested developers learn more than one programming language and foresaw advancements in wearable tech and the software that drives them.
Needham also touches on artificial intelligence concerns that are sweeping the industry and stresses the need for software professionals to proactively work together to make sure “we get it right.”
2. Are DevOps and ITIL® in Conflict or Complementary?
“DevOps provides us with a fresh perspective to examine the ITIL framework in several key areas that will improve core processes, functions and principles within ITIL.”
Author Paul Dooley doesn’t leave any gray area here—the answer, resoundingly, is “complementary.” Dooley notes there are no conflicts between DevOps and ITIL, and the collaborative nature of DevOps adds value to service transition, service operation and the Continual Service Improvement process.
Since ITIL is the hub of best practices for the IT industry, service providers benefit greatly by incorporating harmonizing services like DevOps. If implemented correctly, this type of practice should strengthen the alignment between the business and customer.
1. Tech the Halls: Top 12 Gadgets of the Holiday Season
“Whether you prefer to stand in line for hours to buy the newest smartphone or long for the days of 8-bit gaming, there’s a perfect tech toy for you this holiday season.”
Virtual reality gaming, video doorbells, app-controlled droids … the future is here when it comes to the most coveted tech toys for the 2016 holiday season.
Global Knowledge’s tech lovers selected the gizmos they want most this year. Some are easier to come by than others. (Apologies to anyone hoping to find an NES Classic under their tree on Christmas morning. Most stores sold out the day they went on sale.)
Whether you want an iPhone 7 or a new pair of wireless headphones, the best part about filling out your tech toy wish list is feeling like a kid again.
from
CERTIVIEW
Best VPS Web Hosting Services for Business
from Tom's IT Pro
via CERTIVIEW
Monday, 19 December 2016
Best IT Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
LinkedIn's Lynda.com Hit by Hack
from Tom's IT Pro
via CERTIVIEW
Internet of Things: Small Business’s Latest Security Threat
from Tom's IT Pro
via CERTIVIEW
Friday, 16 December 2016
MCSE and Other Evergreen IT Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
Best Apps for Getting Organized
from Tom's IT Pro
via CERTIVIEW
Thursday, 15 December 2016
Best Time and Attendance Software
from Tom's IT Pro
via CERTIVIEW
Best Computer Programming Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
Cisco's Still Doing Certification Right
from Tom's IT Pro
via CERTIVIEW
Wednesday, 14 December 2016
How IT Pros Can Make the Most of Twitter
from Tom's IT Pro
via CERTIVIEW
Tuesday, 13 December 2016
Mobile Device Management: Vendors And Comparison Guide
from Tom's IT Pro
via CERTIVIEW
Best Information Security Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
How to Overcome Gender Bias in Tech
from Tom's IT Pro
via CERTIVIEW
Monday, 12 December 2016
Can You Run A Business via a Smartphone?
from Tom's IT Pro
via CERTIVIEW
5 Best Augmented Reality Use Cases
from Tom's IT Pro
via CERTIVIEW
Sunday, 11 December 2016
DDoS Blog Series Part 2: How Do Consumers and Businesses Protect Against Cyber Crime?
“This demonstrates the fragility of the network and infrastructure.” — Shawn Henry, chief security officer, Crowdstrike
Several spectacular attacks in the past few months have demonstrated the power of distributed denial-of-service (DDoS) attacks and the importance of cybersecurity. DDoS attacks against blogger Brian Krebs, hosting provider OVH and domain name system provider Dyn crippled a reporter’s web site, shut down cloud-based customers and blocked access to major services such as Twitter, Amazon, Netflix, Airbnb and Etsy.
What can individuals and organizations do to prevent themselves from becoming an unwitting accomplice to an attack? Furthermore, what can organizations do to protect themselves?
A denial-of-service (DoS) attack allows cybercriminals to disable an organization’s Internet presence or block access to the business’s networks. Identifying these attacks are more straightforward, or at least easier to resolve, because they seem to originate from identifiable Internet Protocol (IP) addresses. The victim can then block incoming Internet traffic from the specific IPs.
When hackers launch a DDoS assault, the problem becomes much larger for two reasons:
- The number of computers performing the attack can be huge—an estimated tens of millions in the case of Dyn.
- The volume of the attack magnifies dramatically—an estimated 1.2 terabits per second in the Dyn attack, according to Chief Strategy Officer, Kyle York.
Many hackers deploy a remote access Trojan (RAT) to control usurped computers. If a hacker controlled one system and used it to attack and deny service to another organization, that wouldn’t be very effective. On the other hand, large-scale remote-control networks are often called Botnets, made up of malware (“bots”) or infected devices (“zombies”). Under direction of massive command-and-control networks, Cybercriminals use these hijacked systems to carry out a DDoS attack.
In the latest series of attacks, hackers used software called Mirai, an Internet-of-Things (IoT) Botnet. Instead of using infected home computers, they used smart devices found in everyday homes—webcams, DVRs, thermostats, TVs and refrigerators. Many IoT devices have built-in vulnerabilities, such as weak default passwords and extraneous network protocols. Mirai was able to exploit these weaknesses and launch massive data floods across the Internet.
There are numerous ways for consumers to protect against these kinds of attacks:
- Keep up to date on your vendor’s security patches. This includes Microsoft, Apple, Adobe and Google software.
- Have a currently-licensed copy of highly-rated antivirus or anti-malware software and keep the signatures current. When in doubt, check one of the sites that rank these products. This doesn’t need to be an expensive proposition—there are several free antivirus products with high ratings in the industry that suffice. Further, some Internet service providers, like Comcast, supply you with software as part of your subscription. If you or a direct family member work for the U.S. government, you are entitled to free antivirus protection as well.
- Practice vigilance on the Internet; watch for suspicious web sites or browser behavior. Also, understand that one of the largest vectors for malware is through email attachments.
- If it’s free on the Internet, it’s too good to be true—including pirate sites for downloading movies, TV shows, music, games and software.
- For your IoT devices, set them up with long, strong and complex passwords. If you can, look for services such as Telnet and Secure-Shell (SSH) and disable them. Occasionally, visit the vendor’s web sites to make sure you have the latest software for your smart devices. Lastly, when a manufacturer recalls their IoT-based product because of software insecurities, make sure you take advantage of it!
Any organization that has an Internet-facing presence could be the subject of a DDoS attack, which can be crippling, even for the largest companies. There are basic protections and mitigations any organization can invoke. These include:
- Follow industry-standard best practices:
- Be certain that each Internet-facing server only performs a single task, such as being a web server or responding to DNS queries.
- Perform system hardening by removing unnecessary services and staying current with security patches.
- Monitor your systems for signs of an attack.
- Prioritize redundancy by utilizing:
- multiple Internet service providers.
- multiple infrastructure resource servers, such as DNS on different IP networks.
- geographically-distributed data centers and processing.
- Consider using an anti-DDoS service such as Akamai/Prolexic, Amazon CloudFront or Cloudflare. Some of these organizations even offer free basic anti-DDoS products. Alternately, every major Internet service provider has services they can activate within their networks.
Related Post
DDoS Blog Series Part 1: Evolving Internet Attacks Turn Smart Devices Against You
Related Courses
Cybersecurity Foundations
Certified Network Defender (CND)
Certified Ethical Hacker v9
from
CERTIVIEW
Friday, 9 December 2016
Best Laptop Briefcases for IT Professionals
from Tom's IT Pro
via CERTIVIEW
Thursday, 8 December 2016
The Cult of Constant Learning in IT
from Tom's IT Pro
via CERTIVIEW
Best Twitter Handles for IT Professionals to Follow
from Tom's IT Pro
via CERTIVIEW
Wednesday, 7 December 2016
4 Reasons Why Now is the Right Time to Learn Web Development with TypeScript
Whether you’re a JavaScript beginner, expert or fanatic—now is a great time to learn TypeScript, a programming language designed to make JavaScript strongly typed and capable of supporting large-scale web applications. TypeScript is a superset of JavaScript, and its recent release, TypeScript 2.0, adds extra features, such as glob support, to make a developer’s life easier. It provides the flexibility to write JavaScript programs that can grow over time without becoming too unwieldy and frees you to concentrate on learning JavaScript frameworks, such as Express and Angular, that empower you to build both RESTful web services and modern client applications.
I just authored a new 5-day course on TypeScript—Essential TypeScript 2.0 with Visual Studio Code—a culmination of a four-month odyssey in which I not only had to learn TypeScript grammar and syntax, but also master an entirely new technology stack and toolchain. Here is a list of topics included in the course:
- Introduction to TypeScript
- TypeScript Language Basics
- Using Visual Studio Code with TypeScript
- Task Automation, Unit Testing, Continuous Integration
- The TypeScript Type System
- Functional Programming
- Asynchronous Programming
- Object-Oriented Programming
- Generics and Decorators
- Namespaces and Modules
- Practical TypeScript with Express and Angular
I thoroughly enjoyed the process of adding a new weapon to my arsenal as a software developer and the chance to venture off in an entirely new direction. Here are four reasons why now is the right time for you to learn TypeScript.
1. Revenge of JavaScript
A compelling reason to learn JavaScript is that it can be used to write apps for more than just web browsers–you can use it to write desktop and mobile apps, as well as back-end services running in the cloud. JavaScript has unwittingly become one language to rule them all.
Web development has also matured to the point where it’s possible to write an app that has nearly the same interactivity and responsiveness as a traditional desktop application. With the advent of Single Page Applications (SPAs), turbocharged JavaScript engines quickly render rich, interactive web pages. It’s the perfect time to build SPAs because second generation frameworks have emerged that take web development to a whole new level and implement the Model-View-ViewModel (MVVM) pattern (or some MV-* variation), providing benefits such as better separation of concerns, testability and maintainability. Frameworks like Angular, Aurelia and React-Redux also provide tools for quickly scaffolding new applications and preparing them for production.
TypeScript has emerged as the language of choice for building many of these kinds of modern web apps because strong typing enables features we take for granted, such as interfaces and generics. It also provides capabilities most developers couldn’t live without, such as intellisense, statement completion and code refactorings.
2. JavaScript Has Grown Up
In 2015, JavaScript had its most significant upgrade since it was created in 1995 by Brendan Eich in a 10-day hackathon. With the release of ECMAScript 2015, JavaScript received a slew of new features, including classes, inheritance, constants, iterators, modules and promises. TypeScript not only includes all ES 2015 features, but it fast forwards to future versions of ECMAScript by supporting proposed features such as async and await operators, which help simplify asynchronous code. TypeScript lets you use advanced features of JavaScript by transpiling down to ES5, a flavor of JavaScript compatible with most browsers.
When you put modern JavaScript together with TypeScript, you get a powerful combination that gives you just about everything you might want for building SOLID applications that can run in the browser, on the server or on mobile and desktop platforms.
3. Shiny New Tools
The nice thing about TypeScript is that you’re free to use whatever tool you like, from a full-fledged IDE like Visual Studio or Web Storm, to a lightweight code editor, such as SublimeText, Atom, Brackets or Visual Studio Code. While there’s nothing wrong with any of these options, I prefer using VS Code for TypeScript development because it comes with TypeScript in the box and the team eats their own dog food by using TypeScript to build the editor.
Coming from a C# background, where I was confined to using Visual Studio on Windows, I appreciate being able to run VS Code on my Mac. VS Code starts quickly and I can open it at a specific folder from either the Finder or Terminal. I also found navigation in VS Code to be straightforward and intuitive, and you can perform many tasks from the command palette, including custom gulp tasks. VS Code functions as a great markdown editor with a side-by-side preview that refreshes in real time as you make changes. It has Git integration and debugging support, as well as a marketplace of third-party extensions that provide a variety of nifty services, such as TypeScript linting and Angular 2 code snippets. Put it all together and VS Code is a perfect fit for TypeScript development.
4. Living in Harmony
One of the most compelling reasons I can think of for picking up TypeScript is that it’s the brainchild of the same person who created C#, Anders Hejlsberg, who also invented Turbo Paschal and Delphi. Having such an amazing track record, I have a high degree of confidence in following him into the world of web and native JavaScript development. Anders has made it possible to be more productive and write code that is more resilient because the TypeScript compiler is able to catch problems at development time that would otherwise only become apparent at runtime.
Lastly, it’s significant that Anders did not choose to create a language that is different than JavaScript, such as CoffeeScript, but rather one that includes all of JavaScript with optional type annotations that disappear when TypeScript is compiled down to plain old JavaScript. In fact, all JavaScript is valid TypeScript, and you can insert annotations or leave them out wherever you like, giving you the best of both dynamic and static typing. In other words, TypeScript does not dictate that you follow any of its prescriptions.
All in all, the latest version of TypeScript gives developers what they pine for—additional features that create flexibility, productivity and power. But most importantly, it creates less headaches. I look forward to you joining me in the Essential TypeScript 2.0 with Visual Studio Code course to discover TypeScript’s capabilities.
Happy coding!
Related Courses
Essential TypeScript 2.0 with Visual Studio Code
from
CERTIVIEW
Best Business Continuity And Disaster Recovery Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
What Businesses Need to Know About Augmented Reality
from Tom's IT Pro
via CERTIVIEW
Tuesday, 6 December 2016
Best Telecommunications Certifications For 2017
from Tom's IT Pro
via CERTIVIEW
10 Business Skills Every IT Manager Needs
from Tom's IT Pro
via CERTIVIEW
Monday, 5 December 2016
How to Issue WMI Queries from Linux
from Tom's IT Pro
via CERTIVIEW
Decommissioning Old IT Equipment Made Easy
from Tom's IT Pro
via CERTIVIEW
Sunday, 4 December 2016
DDoS Blog Series Part 1: Evolving Internet Attacks Turn Smart Devices Against You
“Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down.” — Bruce Schneier, security expert
A denial-of-service (DoS) attack is a cyber assault intended to block legitimate access to organizations and servers on the Internet. There are two types of DoS attacks: a standard DoS and a distributed denial-of-service (DDoS).
A classic DoS attack is initiated by only a small number of Internet Protocol (IP) addresses—often the assault originates with a single computer or network.
A DDoS attack uses hundreds, thousands or even millions of IP addresses and systems. On Oct. 21, in the largest attack of its kind, hackers used vulnerable home devices such as DVRs and webcams to flood the services of Internet infrastructure provider Dyn. This DDoS attack overwhelmed the victim’s Domain Name System (DNS) servers and made many well-known Internet domains, such as Netflix and Twitter, unavailable for a short period of time.
The attack against Dyn used a Botnet of web-facing devices under control of hacker software called Mirai. Traditionally, hackers use Botnets made up of compromised home computers, PCs and other general purpose systems. Unsuspecting end users open malicious email attachments or respond to prompts and pop-ups from malicious web sites, thereby infecting their computers and becoming part of the Botnet. Mirai was different; it used smart devices like web-accessible baby monitors, surveillance cameras, printers and other Internet of Things (IoT) devices to flood Dyn’s servers on behalf of the attackers.
Typically a simple DoS attack depends on someone sending a malcrafted message across a network—such as the infamous WinNuke—to a target system or have someone open a poisoned file in an application. This could cause a program to close involuntarily, a Blue Screen of Death in Windows or a kernel panic on Mac OS X.
Malcrafted message DoS are effective as single attacks until the victim strengthens their network or patches their systems, at which point hackers are blocked and the attack fails.
Whether a DoS or DDoS, cybercriminals can use three or four other nefarious attack mechanisms:
- Application floods—servers providing Internet resources are overwhelmed by malicious requests. These could be, for example, against a company’s web servers or against supporting infrastructure. The hacker group Anonymous famously targeted the Church of Scientology with an application flood in 2008, overwhelming their servers and knocking their web site offline for a short time.
- State-Exhaustion attacks—similar to application floods, these render the underlying computer or network software incapable of response by targeting the connections that are initiated to the victim systems. Whether to web servers or DNS, a system that is deluged cannot respond to legitimate connection requests.
- Volumetric attacks—as the name implies, they inundate a company’s customer-facing portal or their ISP with malicious network traffic beyond the victims’ ability to respond.
- Protocol attacks—the objective is to disable complete networks and organizations by misusing normal network traffic, violating the rules for standard communication. This disrupts the ways computers connect to each other or exchange information. Many of the Internet protocols we use today were developed in a far more simplistic time. Hackers can read the Internet standards (called a Request for Comments or RFC) and look for opportunities to use these protocols in a criminal way.
Between the work done by Internet service providers, regulators and the government, efforts are underway to remove the underlying mechanisms used in DoS and DDoS attacks. Part 2 of this blog series will examine how organizations and individuals can avoid becoming victims.
Related Post
How the Seismic DDoS Attack on Dyn Shook the Internet
Related Courses
Cybersecurity Foundations
Certified Network Defender (CND)
Certified Ethical Hacker v9
from
CERTIVIEW
Friday, 2 December 2016
How to Use Test Kitchen to Check Infrastructure Code
from Tom's IT Pro
via CERTIVIEW
Best Practices for Running Productive Meetings
from Tom's IT Pro
via CERTIVIEW
Thursday, 1 December 2016
Best Computer Networking Certifications For 2017
from Tom's IT Pro
via CERTIVIEW