Search This Blog

Wednesday, November 30, 2011

[SECURITY] [DSA 2355-1] clearsilver security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2355-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 30, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : clearsilver
Vulnerability : format string vulnerability
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-4357

Leo Iannacone and Colin Watson discovered a format string vulnerability
in the Python bindings for the Clearsilver HTML template system, which
may lead to denial of service or the execution of arbitrary code.

For the oldstable distribution (lenny), this problem has been fixed in
version 0.10.4-1.3+lenny1.

For the stable distribution (squeeze), this problem has been fixed in
version 0.10.5-1+squeeze1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your clearsilver packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7Wn9QACgkQXm3vHE4uyloaDgCfc++RS4cmU/+vrEhoRtVoLzQU
YgcAoJV5jRA7BZOCKHUUtcf34as7jssR
=Am2z
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20111130212850.GA20329@pisco.westfalen.local

How do you keep your security workforce?

  Researchers use Woodpecker to single out vulnerable Android phones | The Inside Story of Why Puma Dumped Four Cloud Vendors for One
 
  Network World Daily News PM

Forward this to a Friend >>>


How do you keep your security workforce?
Recruiting and retaining important IT staff -- particularly in the burgeoning security arena -- is a challenge for every organization and one that is only going to tougher. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

WHITE PAPER: Oracle

Application Upgrades and Service Oriented Architecture
A study by SOA Industry Analyst Zapthink shows that maintenance and change costs of SOA-based integrations, architected properly, are dramatically lower than traditional integration approaches. Read this whitepaper to understand why and how SOA-enablement will reduce cost and risk of Application upgrades for your organization. Learn More Today!

Researchers use Woodpecker to single out vulnerable Android phones
North Carolina State University researchers say some Android smartphone makers' efforts to go above and beyond the Google mobile platform's basics open their devices to security breaches. Read More

The Inside Story of Why Puma Dumped Four Cloud Vendors for One
Puma simplified its cloud strategy and saved money by consolidating from using four cloud vendors down to just one. Here's what they did and why they did it. Read More

Cyber Monday sales break record, surpass $1.25 billion
Consumers took advantage of Cyber Monday deals, racking up $1.25 billion worth of online purchases on the first business day of the week following Thanksgiving. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Google Translate glitch opens security hole
Developers moving to the upcoming paid version of Google Translate need to follow the documentation so their implementation of the package doesn't lead them to paying for someone else's use of the platform. Read More

Start-up Agari debuts with security to stop fake e-mail, phishing attacks
Start-up Agari debuts today with cloud-based e-mail security services aimed at allowing enterprises and e-commerce companies to identify and block fake and spoofed e-mail exploiting their legitimate business domain names to conduct scams and phishing attacks. Read More

iPad 3 rumor rollup for the week of Nov. 28
Pray that Apple doesn't release the iPad 2S instead of iPad 3. The iOSsphere is pulsing with rumors about a new technology for a high-definition display on the Next iPad; seething over an arcane listing of "new" iPads in an arcane iOS list; and pondering winning stock strategies to exploit the upside iPad 3 will surely usher in. Read More


WHITE PAPER: HP & Intel

Finding the right cloud solutions for your organization
Today's Instant-On Enterprises need to think differently about how they source and deliver services that are enabled by technology. They need to take advantage of a hybrid delivery model—one that truly optimizes the mix between traditional IT, private cloud, and public cloud. Learn more

They're never too young to learn about passwords
That the little girl had a netbook was slightly surprising, given that she couldn't have been older than seven or eight. But her conversation with her Mom about the machine - overheard at my son's basketball practice -- wasn't surprising at all, unfortunately. "Mommy, my password isn't working." (Hands netbook to Mom.) "What's your password again, sweetie?" "Password." Read More

Gumby-bot wriggles from Harvard University labs
Harvard University researchers have demonstrated a flexible new soft robot that borrows from the movements of squid, worms and other creatures to maneuver through tight spaces. The 5-inch robot is less susceptible to falls or smashing into things than hard-bodied robots, but would be more likely to suffer a puncture. Researchers are still working on how to enable such robots to move without an external... Read More

Google Music vs. Amazon Cloud Player: How They Stack Up
The newest player in the cloud-based music space -- Google Music -- is stirring the pot with a number of competitive specs. How does it stack up to Amazon's popular Cloud Player? CIO.com's Kristin Burnham takes a look. Read More

Steve Jobs' worth, iPhone 5's arrival among 2011's top online question topics
Natural disasters -- the Japan earthquake and Hurricane Irene -- have spurred the most online news searches in 2011, though big news and rumors about Apple weren't far behind. Read More

 
 
 

SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Facebook under privacy watch for 20 years
  2. Hackers target IPv6
  3. 25 free open source projects IT pros will love
  4. iPhone self-combusts over Australian skies
  5. Cisco, Juniper, Check Point, Palo Alto among firms in security contest
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Hackers launch millions of Java exploits, says Microsoft
  8. Cisco tells HP to lose that suit
  9. RIM to offer multiplatform device management
  10. Free software activists to take on Google with new free search engine
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

[SECURITY] [DSA 2354-1] cups security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2354-1 security@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 28, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : cups
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2896 CVE-2011-3170

Petr Sklenar and Tomas Hoger discovered that missing input sanitising in
the GIF decoder inside the Cups printing system could lead to denial
of service or potentially arbitrary code execution through crafted GIF
files.

For the oldstable distribution (lenny), this problem has been fixed in
version 1.3.8-1+lenny10.

For the stable distribution (squeeze), this problem has been fixed in
version 1.4.4-7+squeeze1.

For the testing and unstable distribution (sid), this problem has been
fixed in version 1.5.0-8.

We recommend that you upgrade your cups packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7WagQACgkQXm3vHE4uylpgngCgy+xPdr3SGtgK+5zLkrIm2fHE
YdEAoJP3bofxwm/6M+akx0DSTXnRC183
=aY5X
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20111130173949.GA4943@pisco.westfalen.local

25 free open source projects IT pros will love

  CIO Q&A: How Citrix supports more workers with lower IT budget | Desire for Windows 8 tablet shrinking, Forrester says
 
  Network World Network/Systems Management

Forward this to a Friend >>>


25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known SourceForge projects he thinks IT folks will love. Here are his picks, along with a few of our own. Read More


RESOURCE COMPLIMENTS OF: Alcatel-Lucent

Discover the new currency for the networked-community age
Alcatel-Lucent's Allison Cerra and Christina James spent a year pursuing the essence of identity in the virtual world and beyond. With Identity Shift, they examine how technology, identity and expectations intersect, offering a compelling look at how we present and protect ourselves, build trust, and find value in the networked-community age. Click to continue

WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

CIO Q&A: How Citrix supports more workers with lower IT budget
Citrix CIO Paul Martine is the poster child for everything that Citrix markets to other CIOs. Read More

Desire for Windows 8 tablet shrinking, Forrester says
Interest in tablets with Microsoft's Windows 8 is plummeting, Forrester Research says. Read More

Two-thirds of firewall managers lack confidence in their security posture
In its annual firewall management survey, Tufin Technologies uncovered some disheartening details. For example, 1 in 4 firewall managers have never conducted an audit, and 66% of the managers think their processes put them at risk of a security breach. The alarm is sounding for a giant wake-up call. Read More


WHITE PAPER: Splice Communications

The Real Cost of Dealing with Carriers
What is the TCO for your company's data network services and solutions? If you work with one of the large carriers, it's probably a lot higher than you think. Read Now!

Microsoft: Office 365 a hit, especially with small businesses
Office 365, Microsoft's cloud collaboration and communication suite for organizations, is selling eight times faster than its predecessor, the Business Productivity Online Suite (BPOS), and has been particularly successful among small businesses, which make up over 90% of its customer base, the company announced on Tuesday. Read More

Mohawk Fine Papers builds integration-in-the-cloud
Just two weeks after Mohawk Fine Papers made the decision to sell its products on Amazon.com, integration work was complete, connections to its ERP system lit up and sales started rolling in. "Amazon generated tens of thousands of dollars in revenue immediately," says Paul Stamas, vice president of IT at the $83 million, 725-employee manufacturer of premium papers. Read More

Survey: IT certifications lead to jobs, higher pay
In this survey of 700 IT professionals, most say certifications have led to raises and better jobs, busting the myth that certs are nothing but a scam. Read More


WHITE PAPER: Quest Software

Create a Solid Backup Strategy
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

NetApp, Iron Mountain team up on medical archive service
NetApp is teaming up with Iron Mountain to offer its StorageGRID object storage software with two Iron Mountain medical data archiving services: the Digital Record Center for Medical Images and its vendor-neutral archive offering. Read More

HP pairs Autonomy and Vertica software
Hewlett-Packard is quickly putting to use its recent acquisitions of Autonomy and Vertica, integrating the software from these companies into a single software package, called the HP Next Generation Information Platform. Read More

Customer sues Epicor after ERP software project attempt ends in 'big mess'
A would-be Epicor customer is taking the ERP (enterprise resource planning) vendor to court over a "big mess" of a software project that it says ended up battering its bottom line instead of improving operations. Read More

 
 
 

SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 25 free open source projects IT pros will love
  2. Free software activists to take on Google with new free search engine
  3. iPhone self-combusts over Australian skies
  4. Cisco tells HP to lose that suit
  5. Hackers target IPv6
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Privacy to be punted again when 'balanced' against need for govt spying
  8. Open source tools for worship
  9. Cisco reorgs again, folds net management into new cloud group
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Network World Whitepapers Download: November 30, 2011

  A Glimpse into IBM's Collaboration Future | FireEye 1H 2011 Advanced Threat Report
 
  Network World Whitepapers Download

WHITE PAPER: IBM
A Glimpse into IBM's Collaboration Future
This white paper focuses on the evolution of Notes and Domino and highlights the broader shift in the collaboration market toward a blending of traditional collaboration services with newer social constructs and business applications—all accessible via mobiles, browsers and rich clients. Read Now


 

WHITE PAPER: FireEye
FireEye 1H 2011 Advanced Threat Report
The Advanced Threat Report is a technical look into the trends cyber criminals are employing to bypass traditional security. In the most recent semi-annual report from FireEye, they find that 99% of organizations are facing significant malware infections that have penetrated NGFW, IPS, AV, and Web gateways. Read now!


 

WHITE PAPER: Citrix
8 Reasons Why Citrix Beats F5
Is your network ready for the Cloud? Not with F5. Shift to Citrix NetScaler. Shift up to the Cloud. Download 8 Reasons Citrix NetScaler beats F5. Read now


 

WHITE PAPER: AMD
Business at the Speed of Virtualization
Enterprises increasingly rely on technology to serve as the enablers and accelerators of the business—not just to reduce costs but also to empower new business initiatives and increase the top line. Learn More!


 

WHITE PAPER: SonicWALL
10 Ways to Securely Optimize Your Network
Learn 10 ways SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. Read now.


 

 

Forward this to a Friend >>>

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_whitepapers_download_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

WindowsNetworking.com Monthly Newsletter of November 2011

-----------------------------------------
WindowsNetworking.com Monthly Newsletter of November 2011
Sponsored by: SolarWinds
<http://www.solarwinds.com/register/registrationshort.aspx?program=1643&c=70150000000PDzJ&CMP=BIZ-TAD-TG-NETMAN-RTBM-DL-2011>
-----------------------------------------

Welcome to the WindowsNetworking.com newsletter by Debra Littlejohn Shinder <http://www.windowsnetworking.com/Deb_Shinder/>, MVP. Each month we will bring you interesting and helpful information on the world of Windows Networking. We want to know what all *you* are interested in hearing about. Please send your suggestions for future newsletter content to: dshinder@windowsnetworking.com


1. Satisfy your Need for Speed with ReadyBoost
---------------------------------------------------------

Anyone who has worked with computers knows that you can never have too much memory. Conversely, you definitely can have too little memory. That's where most of us live – because even when we buy the latest, greatest and most powerful system, within a year or two it seems sorely lacking in comparison to the new ones on the market. Whether or not Bill Gates really said 640K of RAM should be enough for anyone, we're long past that point now.

Not long ago, two gigs of RAM seemed perfectly adequate, but now even a "low end" $389 computer from Best Buy comes with 4 GB of RAM. You might be able to upgrade your older system by adding memory, but some inexpensive motherboards are limited in how much additional RAM they'll accept. What if you could get a little more memory in your Windows 7 PC without having to buy RAM and cracking open the case? You can, with the help of ReadyBoost.

ReadyBoost was introduced in Windows Vista, and it's been made better in Windows 7. ReadyBoost enables you to use a USB key, SD card or CF card to increase the amount of memory available in your system. However, this memory does have to meet the following specs:

* Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space. The 4-GB limit of Windows Vista has been removed.

* At least a 2.5 MB/sec throughput for 4-KB random reads

* At least a 1.75 MB/sec throughput for 1-MB random writes

There's a good chance that you won't know the specs of the key or card you want to use. No problem! Windows 7 will test the media for you and tell you whether it's fast enough to support ReadyBoost.

To enable ReadyBoost, put the media into your Windows 7 PC and then right click the drive representing that media and click Properties. You'll see something like the figure below.

<http://www.windowsnetworking.com/img/WN-MWN-November11-1.jpg>

If the drive is formatted as FAT32, you can create a ReadyBoost cache as large as 4GB. If you format it with NTFS, you can make it up to 32 GB – and that's a lot of extra memory!

Windows 7 uses Windows SuperFetch to assign files to store in the ReadyBoost cache. SuperFetch monitors files that are used (such as system files, application files, and even documents) and loads these files into the ReadyBoost cache. Then the files are encrypted using 128-bit AES. Note that encryption is always done when the medium is removable. If your computer vendor has provided internal memory for ReadyBoost, then they have the option of turning off the encryption, which speeds things up a little bit. You can remove the media whenever you want since only a copy of the original file is being stored in the ReadyBoost cache. If the system needs the file, it can always go back to the original file on disk.

When will you see the biggest bang for your buck after enabling ReadyBoost?

* If your disk performance value in the Windows Experience Index is less than 4.0, you should see some significant improvement.

* If you have high performance flash media – these are cards or keys designed for ReadyBoost – you'll see more improvement.

* If the flash media is connected to a high speed bus, such as an internal card, you'll see more improvement.

You should be aware that you probably won't see big improvement from ReadyBoost if you have a fast hard drive in your computer. By fast, I mean 7200 RPM or faster. Some high end computers today come with speedy SSD drives. However, many drives on laptops still run at 4800 RPM or 5400 RPM and so with those drives you should see some noticeable improvement. The type of operation also matters; if you do work that requires a lot of non-sequential reads, the ReadyBoost cache access will outperform even a fast hard drive.

You can use Performance Monitor to see what's happening with your ReadyBoost cache, as seen in the figure below.

<http://www.windowsnetworking.com/img/WN-MWN-November11-2.jpg>

See you next month! - Deb.

By Debra Littlejohn Shinder, MVP
dshinder@windowsnetworking.com


=======================
Quote of the Month - "The Cloud Blows (or was that the wind?)" - Anonymous
=======================


2. ISA Server 2006 Migration Guide - Order Today!
---------------------------------------------------------

Dr. Tom Shinder's best selling books on ISA Server 2000 and 2004 were the "ISA
Firewall Bibles" for thousands of ISA Firewall administrators. Dr. Tom and his
illustrious team of ISA Firewall experts now present to you, ISA Server 2006
Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. This book
leverages the over two years of experience Tom and his team of ISA Firewall
experts have had with ISA 2006, from beta to RTM and all the versions and builds
in between. They've logged literally 1000's of flight hours with ISA 2006 and
they have shared the Good, the Great, the Bad and the Ugly of ISA 2006 with
their no holds barred coverage of Microsoft's state of the art stateful packet
and application layer inspection firewall.

Order your copy of ISA Server 2006 Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. You'll be
glad you did.

3. WindowsNetworking.com Articles of Interest
---------------------------------------------------------

* TechGenix launches MSPAnswers.com - Your guide to the world of Managed Services!
http://www.windowsnetworking.com/news/TechGenix-launches-MSPAnswers-com-guide-to-world-of-Managed-Services.html

* Managing PCs using Windows Intune (Part 3) - Managing Computers and Updates
http://www.windowsnetworking.com/articles_tutorials/Managing-PCs-using-Windows-Intune-Part3.html

* 15 Network Admin Apps for Windows Phone 7
http://www.windowsnetworking.com/articles_tutorials/15-Network-Admin-Apps-Windows-Phone-7.html

* Working with Hyper-V Snapshots in the Private Cloud (Part 1)
http://www.windowsnetworking.com/articles_tutorials/Working-Hyper-V-Snapshots-Private-Cloud-Part1.html

* Strategies for Monitoring Failover Clusters (Part 3)
http://www.windowsnetworking.com/articles_tutorials/Strategies-Monitoring-Failover-Clusters-Part3.html

* Top 10 Reasons Why Group Policy Fails to Apply (Part 1)
http://www.windowsnetworking.com/articles_tutorials/Top-10-Reasons-Why-Group-Policy-Fails-to-Apply-Part1.html

* McAfee Web Gateway - Voted WindowsNetworking.com Readers' Choice Award Winner - Anti Virus Hardware
http://www.windowsnetworking.com/news/WindowsNetworking-Readers-Choice-Award-Anti-Virus-Hardware-McAfee-Web-Gateway-Sep11.html

* Managing PCs using Windows Intune (Part 2) - Preparing Your Environment
http://www.windowsnetworking.com/articles_tutorials/Managing-PCs-using-Windows-Intune-Part2.html


4. Administrator KB Tip of the Month
---------------------------------------------------------

*Transfer Wireless Network Settings via USB Flash Drive*

The Windows Connect Now (WCN) feature lets you export and import your wireless network profiles via a USB flash drive. This can come in handy when setting up multiple PCs.

To export profiles in Windows 7, open the desired wireless network profile:

Click the network icon in the system tray, right-click the network name, and select Properties. Then on the Connection tab, click Copy this network profile to a USB flash drive.

Then to import the wireless network profile, insert the USB flash drive into a computer. On the AutoPlay dialog, click the Connect to a Wireless Network using Windows Connect Now shortcut or the Wireless Network Setup Wizard shortcut.

If the AutoPlay menu doesn't appear, you can manually import by running the SetupSNK.exe program on the flash drive's root directory.

For more administrator tips, go to WindowsNetworking.com/WindowsTips
<http://www.windowsnetworking.com/kbase/WindowsTips/>


5. Windows Networking Tip of the Month
---------------------------------------------------------

Are you new to virtualization? I know, they say that virtualization has gone "mainstream" and while that's true, that doesn't mean that everyone has had the time to learn about it and understand some of the key benefits and how to make them work. Maybe you've poked around in the Hyper-V manager or even created a virtual machine or two. What's the next step? Snapshots. Snapshots enable you to save virtual machines' state at a particular point in time. This is very useful when you're running a lab environment and you want to save a collection of virtual machines that represent a specific deployment or configuration scenario. Check out my article Working With Hyper-V Snapshots in the Private Cloud (Part 1) <http://www.windowsnetworking.com/articles_tutorials/Working-Hyper-V-Snapshots-Private-Cloud-Part1.html> to begin learning about the value of virtual snapshots.


6. Windows Networking Links of the Month
---------------------------------------------------------

* Free Ebook – Microsoft Virtualization R2 E-book Registration
https://profile.microsoft.com/RegSysProfileCenter/wizard.aspx?wizid=f4747d4a-eceb-4c4a-a8c1-07045bea9dd5&lcid=1033

* Hosting University – Dynamic Data Center Toolkit Education Center
http://www.hosting-university.com/ddc/

* How to Build a Private Cloud with System Center Virtual Machine Manager
http://blogs.technet.com/b/blainbar/archive/2011/11/04/screencast-your-first-steps-to-building-a-private-cloud-part-2-of-3-installing-system-center-virtual-machine-manager-2012-rc.aspx

* Data Protection Manager Planning and Deployment Guide
http://technet.microsoft.com/en-us/library/ff399113.aspx

* Disaster Recovery – It's Not a Nightmare with Virtualization
http://blogs.technet.com/b/virtualization/archive/2008/04/03/disaster-recovery-not-a-nightmare-with-virtualization.aspx


7. Ask Sgt. Deb
---------------------------------------------------------

QUESTION:

Hey Deb,

I heard that you could install Windows 7 from a USB key. What's up with that?
Thanks! –Noah Doan.

ANSWER:

Hi Noah,

Yes, you can install Windows 7 from a USB key. In the past with other operating systems, you may have found that trying to get them installed from a USB key wasn't the simplest thing in the world. Windows 7 changes all that. First, head on over to <http://www.microsoftstore.com/store/msstore/html/pbPage.Help_Win7_usbdvd_dwnTool> to download the USB download tool. Then double click the program file you downloaded and follow the steps in the wizard. When you run the wizard, you'll be asked for the location of the Windows 7 .iso file and the wizard will make the USB bootable. Is that cool or what? This is the admin tool you've wanted for years!

Give it a try – you'll like it.


TechGenix Sites
---------------------------------------------------------

MSExchange.org <http://www.msexchange.org/>
WindowSecurity.com <http://www.windowsecurity.com/>
ISAserver.org <http://www.isaserver.org/>
VirtualizationAdmin.com <http://www.virtualizationadmin.com/>

--
Visit the Subscription Management <http://www.techgenix.com/newsletter/>
section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
http://www.techgenix.com/advert/index.htm for sponsorship
information or contact us at advertising@windowsnetworking.com
Copyright c WindowsNetworking.com 2011. All rights reserved.

WindowSecurity.com Newsletter of November 2011

-------------------------------------------------------
WindowSecurity.com Newsletter of November 2011
Sponsored by: SolarWinds <http://www.solarwinds.com/register/index.aspx?Program=991&c=70150000000OfSU&CMP=BIZ-TAD-TG-X-NDM-DL>
-------------------------------------------------------

Welcome to the WindowsSecurity.com newsletter by George Chetcuti, BSc in Computing & IS (Honors), CISA, MCP, HP Certified. Each month we will bring you interesting and helpful information on the world of Security. We want to know what all *you* are interested in hearing about. Please send your suggestions for future newsletter content to: gchetcuti@windowsecurity.com


1. Cyber Security – a few thoughts!
-------------------------------------------------------

Attempting to explain Cyber security may be intricate, it is a complex topic and explaining the whole picture in few words is no easy task, but I find it helpful to use metaphors when explaining complex scenarios. In fact, I would like to share the approach used by Dr. Warren Axelrod in his online journal called Cybersecurity and the Critical Infrastructure: Looking Beyond the Perimeter. <http://www.isaca.org/Journal/Past-Issues/2006/Volume-3/Pages/Cybersecurity-and-the-Critical-Infrastructure-Looking-Beyond-the-Perimeter1.aspx>

If you are purchasing a new vehicle, most probably you will want to purchase one with the best safety features including seat belts, air bags, compressible front and rear sections, and other extra features that add value to the overall safety of the vehicle. Basically, you would go for the options that give you the best means of protection while you are driving. The same goes with Cyber security. Security aware individuals and organizations would secure their internal assets and networks as best as they can, so that any information within their networks is protected.

Let's go back to the vehicle metaphor, and think how secure the vehicle would be if there were no highway controls, no drivers' tests, and no monitoring and response by law enforcement! I can include other regulatory requirements, such as regular state vehicle inspections and other highway checks. No matter how well protected the vehicle may be from the inside, it would still be unsafe to drive it in insecure highways filled with outlaws roaming about.

Gratefully, that's not the case in the transportation world or at least in civilized countries. There are highway rules, traffic signs, speed cameras, tested vehicles and law enforcement by the respective governments. But who is responsible for controlling and managing security in cyber space? There is no single entity that is responsible for protecting the whole of Cyber space. On the other hand, there are ongoing efforts by major governments and international private organizations to coordinate Cyber security activities. For instance, last month member states from the European Union and the United States tested a coordinated approach to fight a fictitious cyber threat.

*What can private entities do to help out?*

More comprehensive IT risk assessments and mitigation techniques - Think outside the box. Today's threat landscape requires organizations to manage risks beyond their network perimeter and stop threats before they reach the network. A proactive mechanism known as upstream security offers the potential to increase the security and assurance of organizations. For instance, if your organization is prone to DDoS attacks and you decide to put in place a control mechanism, then consider mitigating such attacks at a location where bandwidth is abundant. There are third-party providers with massive bandwidth which can stop DDoS attacks, saving your entire organization and others sharing the same bandwidth from downtime!

A broader perspective of security training – Employee training and awareness programs should be set with a wider perspective of security rather than just dealing with organizational practices. Educate your users to follow security best practices everywhere, especially where and when they are most vulnerable. If users are accustomed to security best practices at their homes, at the airport, at an Internet café and other public places, then most likely they would transfer the habit wherever they are. Some may question why an organization should train a user on how to safely use a public computer while he or she is on a holiday. Perhaps the user might only end up with a compromised personal email account when using a public computer while on holiday but the consequences could be much worse if the user accesses sensitive company information from a public computer while on a business trip. Some users may take home sensitive files to continue their work using a vulnerable home computer and this is yet another reason why proper employee training is needed. Greater investment in security training and awareness has indirect benefits and surely needs to be considered by organizations.

Analyze threats and past incidents – It is absolutely necessary to handle security incidents and resolve them in the shortest time possible, however, do you perform a retrospective exercise after an incident has been resolved? The reactive part is important but the proactive part is gradually becoming equally important as more and more intrusion detection/prevention systems are being circumvented by new malware. Proactive tasks may include, analyzing data from which an emerging threat can be identified (recording patterns), lessons learnt from recovered incidents, and understanding the root cause of incidents (there are instances where an incident is solved but its root cause could not be easily identified). Organizations may not have the time at hand to perform intensive research projects but any knowledge gained while they are reacting to real threats should not be wasted. For instance, if your organization discovers a particular malware or any malicious activity then make sure that you let others know about your discovery and possibly post such information within a community as described below.

Participate in state or private security programs and initiatives – Organizations should allow their IT staff to participate in network information security related initiatives and programs. Training is good and necessary, however, hands-on experience is something that takes time to build and these programs may give that extra experience which may become handy when a threat hits your organization. Try to find a program that fits your bill. Programs and initiatives may take the form of building a security related tool or creating a conceptual idea, where you can benefit from the knowledge of experienced participants and researchers working together on the same project. For instance, in the UK organizations can join a community-based service where members can receive and share up-to-date advice on security threats, incidents and solutions. It is called the Warp program <http://www.warp.gov.uk/index.html> and is provided by the national government. Members can share a collective view of issues and solutions from peers within the community, which could include benchmarking to support better decision making. If participating in a security program is out of the question, then try to participate in security related forums, be active and don't only remain an observer. The concept of sharing security related information without exposing any private data is the way forward to fight cyber criminals.

Adhere to recognized international security standards – If your organization is bound with regulatory compliance and has achieved some form of accreditation such as PCI or ISO then it can be said that the organization has certain procedures, controls and policies in place. But if your organization is not bound with any regulations or does not have the time and money to get certified, then should it ignore security procedures and best practices? No matter how small the organization or limited the funds may be, every entity could follow best practices and procedures as explained in an established framework such as COBIT or ITIL. The creation of security policies, minimum security measurements, best practices, incident management, security controls and other elements of a well-recognized IT security framework can be customized according to the entity needs and then there's no need to re-invent the wheel. It is a known fact that cyber criminals attack SMEs due to their lack of security controls and measures!

Should you have any ideas for content in future editions of the WindowSecurity.com newsletter or would like to ask questions, you're more than welcome to e-mail me at gchetcuti@windowsecurity.com

See you next month! – George


2. WindowSecurity.com Articles of Interest
----------------------------------------

* Microsoft Private Cloud - Overview of Hypervisor Security
http://windowsecurity.com/articles/Microsoft-Private-Cloud-Overview-Hypervisor-Security.html

* Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response
http://windowsecurity.com/articles/Using-Microsoft-Diagnostics-Recovery-Toolset-DaRT-Incident-Response.html

* Managing Active Directory with Forefront Identity Manager (FIM) 2010
http://windowsecurity.com/articles/Managing-Active-Directory-Forefront-Identity-Manager-FIM-2010.html

* Hunt Down and Kill Malware with Sysinternals Tools (Part 3)
http://windowsecurity.com/articles/Hunt-Down-Kill-Malware-Sysinternals-Tools-Part3.html


3. Tip of the Month
-----------------------------------------------

Get yourself acquainted with the best security sources out there, such as:

* The CERT Program
http://www.cert.org/

* Forum of Incident Response and Security Teams
http://www.first.org/

* The Information Security Forum
https://www.securityforum.org/

* SANS Information Security & Research
http://www.sans.org/


4. Latest Security Info and News
-------------------------------------------

* Upstream Security
http://blogs.windowsecurity.com/chetcuti/2011/09/02/upstream-security/

* Check out what's new with Sysinternals
http://blogs.windowsecurity.com/shinder/2011/11/14/check-out-whats-new-with-sysinternals/

* Offline File Policies
http://www.windows7library.com/blog/performance/offline-file-policies/

* Using Smart Cards with Windows 7
http://www.windows7library.com/blog/devices/using-smart-cards-with-windows-7/

* What is Identity Access Management (IAM)?
http://www.itinfomag.com/security-governance/what-is-identity-access-management-iam/

* Code Signing – Part 1
http://www.itinfomag.com/security-governance/code-signing-%e2%80%93-part-1/

* Have your accounts been compromised?
http://blogs.windowsecurity.com/chetcuti/2011/11/04/have-your-accounts-been-compromised/


5. Ask George a question
--------------------------

QUESTION:

Hi, I know that Remote access is a cool feature but the security risks are too high. At work, users are pushing hard to get access to internal resources remotely, but I don't want to create a weak spot in my network's security, any ideas please before my boss approves?

T Vita


ANSWER:


Hi T Vita,

There is a way to provide a safe channel over the Internet and give your users access to the internal network remotely but remember that any solution you put in place has its weaknesses too. I suggest using a VPN (Virtual Private Network) which can be easily set up through a VPN server or service on an existing machine with access rules set accordingly on the perimeter firewall/gateway. Depending on your solution, users may need to install a VPN client and some solutions support remote access from mobile phones as well. The important part of the setup is to make sure that your VPN server is configured to allow only what is needed and disable/block all the rest. Enable logging, check activity and replace users' passwords on regular basis. Make sure to disable users' accounts when they leave the company or their right to access the network remotely is revoked. Make sure that all users' machines connecting over a VPN have up-to-date antivirus protection and enforce strong passwords and multi-factor authentication. These are the kind of policies and security measures you would need to work on when deploying a VPN solution.


TechGenix Sites
----------------------------------------------------------------
ISAserver.org <http://www.isaserver.org/>
MSExchange.org <http://www.msexchange.org/>
VirtualizationAdmin.com <http://www.virtualizationadmin.com/>
WindowsNetworking.com <http://www.windowsnetworking.com/>

----------------------------------------------------------------
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright c WindowSecurity.com 2011. All rights reserved.