Orange County Computer Consultant

My photo
Orange County Computer Consultant helps small businesses with networking, installations and small business software.

Friday, December 01, 2006

Computer Security News

Its Friday night. I'm listening to some techno and reading many different feeds. The one that caught my attention is about an Israeli computer security firm, discovered how to read enrypted pin traffic used by banks. The secret service is investigating this claim. It makes me wonder what type of encryption protocols are in place to protect me at my local ATM ? Are they strong ? Is there a standard or do banks get to choose ?

There were also some reports that Wall Street and other financial institutes could be attacked shortly. The goal of the terrorists is to hurt the US economy.

I also read a article today about how mainframes seem to have been forgotten. There are still IBM mainframes and I'm sure many other supporting our nations infrastructure. Security needs to be considered for all hardware and software on the network regardless of how old it is. Even printers are open season for experienced crackers.

In other news a hacker from Romania, hacked into NASA the department of energy and the US Navy. This worries me. Were talking the Navy and DOE. What type of testing is our goverment doing to protect against these attacks ? We have the NSA who is supposed to be protecting our networks and communications. But they choose to listen to US citizens. Protect first guys.

I still don't get why people don't use encryption. You hear almost every day. they got access to all these records. Is it that its too difficult to implement. I admit my grandma does not need it but our universities and goverment sure does.

Friday, November 17, 2006

Review of HP iPAQ hx2495

I just picked up one of these PDA's from Amazon. Im quite happy. It is a little heavy compared to my Toshiba PDA, but so much more powerfull. It has built in WiFi and Bluetooth. I connected to my corporate network with no problem at all.

I really missed having my PDA around. One day my Toshiba just quit. It was a refurbished model. I picked this up for $288.99. It was a good deal.

Thursday, November 16, 2006

McAffe Secure Internet Gateway



I just done with a presentation on the McAffee Secure Internet Gateway. This is a unified threat solution. It has Anti-Virus, Anti-Spware and firewall capabilities. It also has anti SPAM system.I stayed after the presentation to ask what operating system runs on the device. It is a modified version of RedHat. It is also checked by a outside third party for any vulnerabilities.

It comes in different models like the 3100, 3200 and 3300.

These models also have web filtering capabilities. This device is capable of protecting both POP 3 and SMTP fro email security.

To find out more go to www.mcaffee.com

Wednesday, November 15, 2006

Math and computer science

I'm currently in school majoring in computer science with a focus on security. I'm really need to brush up on my math skills. I was on Slashdot and came across this post about what type of math CS majors should look into.



Article on Slashdot

CCNA Notes

Flow Control provides data integrity prevents the sending host from overflowing the buffers of the receiving host. Sends data in segments. Synchronization and windowing is also handled at this layer.

Routing is handled at the network layer. The network layer is also responsible for routing thru the internetwork and network addressing.

Router update packets include RIP, IGRP, and OSPF.

Kevins Mitcnicks Security Advice

I came across this on Wired Magazine site. This is quoted from Kevin Mitnick. One of the most famous hackers of all time.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

  • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.
  • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
  • Use an antivirus product like AVG or Norton, and set it to update daily.
  • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
  • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
  • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
  • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
  • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
  • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
  • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.
This is great advice and I recommend following his points....

Friday, November 03, 2006

I love Open Source Software

I can do anyhting with Open Source, I love it. Need a webserver ? Get Apache. How about a web proxy why not try Squid ? Lets not even mention security. Vulnerability Scanners, Intrusion Detection Systems and its all free. The only thing I see is the learning curve and time it takes to configure and manage this software.

Tuesday, October 31, 2006

Attack can disable Windows Firewall

A attacker can send a crafted packet to shut down Microsoft Windows firewall. Not shocking. Microsoft has never been known for security. The attack involves ICS or Internet Connection Serivce.

The attacker would have to be on the local LAN for this to work properly.

Google picks up JotSpot

Jotspot was one of my prospects for a company who shall remain nameless. When I talked to a guy over there, I told him him how I thought that there idea was good and was amazed that Google has not bought them yet. Now I read this morning that they bought them.

They offer wikis to families and businesses.

http://www.jotspot.com

Cisco ASA 5500

Cisco ASA 5500

This is a review on the new Cisco ASA 5500

The Cisco ASA or Adaptive security appliance can use different modules for different security needs.

There are currently four unique modules. They include the firewall module, IPS which is a intrusion

protection system. Anti-x module and a VPN (virtual private network) module.

The benefits of this appliance is that modules can be added as your needs grow. All in one device.There is a business edition provides small to medium businesses with VPN and gateway capabilities.

The firewall module can be implemented to stop corporate users from abusing instant messaging, theintroduction of spyware and adware onto the corporate network.It will also protect against externalthreats suck as hackers or crackers. Policies can also be set up to bloak peer to peer file sharing.

The Cisco ASA 5500 can also provide VPN access for remote users. The SSL (Secure Sockets Layer) and also IPsec protocols can be used to encrypt traffic.

Different forms of authentication can be used such as Kerbeos, Microsoft Active directory, LDAP lightweight directory protocol and RSA secure ID.

Everythinbg can be controlled through the Cisco Security Manager, a all in one management platform. I watched a video on this at Ciscos website. I like the interface, you can even see attacks in real time and decide to section off that part of the network. Thats pretty slick. Another way to do this is through MARS, which is Cisco's analysis tool.

There are diffrent modules for different needs Some firewalls can support up to 1.2Gbps.

The Anti-X technology is based on Trend Micros technology to stop threats like viruses, spyware, trojans and worms.

Friday, October 13, 2006

CCNA Progress

Im still studying working on my CCNA, I'm studying IP addressing and subnetting currently. its going well. I have decided to rewrite my business plan for Phuture Networks. I'm going to focus solely on IT Security.

I injured my knee, I have been out of work for about a week since I cant drive. Its my right knee. The one good thing I can say about it, it has given me time to think. I have been analyzing allot of code in C, PERL and Python. I want to be able to read the stuff like English.

I have almost completed my introduction to engineering class. I like it. It has made me more methodical and detail oriented.

My son is getting huge, I cant believe how fast kids grow. Its really amazing.

Wednesday, October 04, 2006

Microsoft Vista and Pirates

Microsot has come up with a plan to thwart illegal software copies. The solution ? They will lock out anyone who does not register their OS within 30 days ! I wonder how long it is going to take for some skilled cracker to reverse engineer the code.

It will not actually lock you out just give you real limited functionallity. Which would suck. During the 30 days you will get popups. Lovely. Letting you know that you must register.

During this grace period warnings will be displayed and Vista will block access to the Windows Defender anti-spyware tool, ReadyBoost memory expansion feature and Aero advanced graphics option, Microsoft said.

Just run Linux. IMAO

Day 1 Studying for CCNA

I have made up my mind to stay focused on obtaining my CCNA or Cisco Certified Network Associate, I have downloaded many study guides and plan to read one chapter daily, out of my CCNA book. When I pass the exam I will focus on security. I would like to become a expert with firewall technologies, configurations and setup.

The main subject for today is the OSI layer or open systems interconnect. This is a standard that allows vendors software/hardware to communicate. There are seven layers for the OSI model. They include: Application, Presentation, Session, Transport, Network, Data and Physical layers.

The Application layer provides network access to programs, it also does error recovery and flow control. It makes sure that communications can be established by checking resources. The following protocols can be found here. NCP, SMB, Telnet, SMTP, Appletalk and SMB.

The Presentation layer does protocol conversion and my favorite encryption and data compression. This layer uses protocols such as NCP, TDI and AFP.

The Session layer does just that it opens a session it does connection establishment, data transfer and cloese the connection. The protocol NetBios can be found on this layer.

The Transport layer put messages into smaller packages adn does error detection and correction. Some of the protocols here NetBeui, NWLink, IP, IPX, and TCP.

The Network Layer does routing, handles addressing, translates logical addresses to physical ones as well as traffic management. The protocols here are IP, IPX, NWLink and NetBeui.

The Data Link Layer packages bits into frames so they can be transported over the network layer. There is also the MAC sublayer that puts the MAC address into the frame header.

The Physical Layer would bethe actual cabling, connectors and electrical signals transmitted on the wire.

That is my quick synopsis of the OSI layer.

Monday, October 02, 2006

Current BrainBench Certifications





I guess I really am a geek. This didnt take long at all....

Monday, September 25, 2006

Alexanders Doctor Visit

I took my son to the doctors today, he had to get four shots. I hated every second of it. He is only 4 months old. But its over for at least a couple months. My girlfriend went with me.

I made it into work late today, doctors note and all. I find my inbox is full of spam. We sell spam firewalls and but I guess the rules are not configured properly on our network. Today is a typical Monday, making cold call and not reaching anyone.

I'm currently enrolled in Engineering at a community college. It is ok. I can say it is making me think about things differently. It's like programming in the sense of breaking the complex problems into smaller chunks. I have always liked taking things apart as a kid. Now here is my chance to start building. Next semester, I will be taking more math and physics. I do not want to stop going to school. There are so many subjects that interest me. I'm a geek :)

I still want to take technical writing and drawing, CAD, CAM and more advanced electronics. I'm still undecided on my major. I'm thinking about information assurance or computer engineering.

Wednesday, August 30, 2006

Stolen Laptops and Data

It seems like daily I hear about security breaches, laptops being stolen. All this personal information is being leaked. I dont understand why people dont use encryption ? I admit it seems daunting, but there are programs out that now that require you to click a button. Its that simple. But what standard do you encrypt with ? I personally like AES which stands for Advanced encryption standard. It is FIPS compliant another lovely acronym that stand for federal information processing which means the goverment uses it to secure unclassified data.

If you want to know the ins and outs of the algorithihm here is a paper published by NIST.

AES Text

After finishing the document, I feel like I need another Red bull.

It talks abouts ciphers, bits, plaintext and other goodies. A knowledge of C C++ or Unix is helpfull. There are alot of functions.

XOR is used in the algorithim to encrypt plaintext into ciphertext.

The cipherkey itself can have lengths of 128, 192 or 256 bits.

There is to much math for me, gives me a headache, although I can understand some of the code.

Thursday, August 17, 2006

Microsoft Presentation

We had Microsoft come out to our office to show us Vista. It looks clen but the hardware requirements are going to require allot of people to upgrade. Thats good new to me but bad for consumers. Personally I love Linux. Vista looks allot like OS X. Apple's OS.

There are some new security feautures including a way to encrypt directories and filesystems. When I asked what encryption protocol would be used, I did not get an answer. That's marketing for you. I also read that Microsoft released 12 security alerts. 8 are critical. You can read about the here .

Wednesday, August 09, 2006

Goals and Career

I currently work for a large IT company consulting enterprise accounts on hardware software needs. I'm working on obtaining my Associates degree and have decided that my major is going to be information assurance. (IT Security). I plan on studying for my CCNA and have a goal of obtaining it by January of 2007. After I complete my self-study. I will go after my CISSP. Currently I'm a MCP or Microsoft Certified Proffesional.

Here is a sample of the courses:

Bachelor of Science - 127-128 credits

Programming and Computers - 25 Credits
CT-115 Introduction to Programming 3
CT-152 Introduction to Unix Completed 3
CS-130 Computer Science Fundamentals I 4
CS-220 Database Management 3
CS-230 Computer Science Fundamentals II 3
CT-301 Website Construction 3
SE-301 Software Engineering 3
SE-458 Senior Design Project 3
Computer Security - 18 Credits
CS-356 Web/CGI Programming Using PERL 3
CS-418 Operating Systems 3
NS-201 Network Security Protocols and Administration3
NS-351 Secure Website Administration **3
NS-352 Unix Administration and Security ***Completed3
NS-401 Network Security Theory and Algorithms3
Mathematics and Sciences - 21 Credits
MA-114 Algebra and Trigonometry 4
MA-124 Discrete Mathematics 3
MA-128 Introduction to Statistics 3
MA-261 Calculus I 4
MA-262 Calculus II 4
Science elective (1)3
Telecommunications and Networking - 6 Credits
TC-110 Introduction to Telecommunications 3
CT-240 Internetworking with Routers and Switches 3
Management - 6 Credits
MIT-201 Introduction to E-Business Completed
3
MIT-208 Internet and the Law 3
Humanities/ Social Sciences - 19 Credits
FS-100 Freshman Seminar 1
HU-331 or HU-332 Arts and Ideas3
SS-351 Ethics 3
Humanities/History/Philosophy electives (2)6
Social Sciences electives (2)6
English Communications - 9 Credits
EN-101 English Communications I 3
EN-102 English Communications II 3
EN-408 Writing Seminar in Technical Research3
Technical Electives - 24 Credits
Technical electives (6)18
Technical electives (2) - must be 300 or above6

Sunday, July 16, 2006

Final Project for Internet Technologies Class

My final project is about having a Internet presence. I already have this blog up, so I'm going to point a link here to my blog. This was my first online class and I enjoyed it. I will be taking critical thinking in August for my next online class.

I also have some articles that I have written that I would like to share with my classmates here is the link.

I also have a business website I made called Phuture Networks.

I have also beent thinking about doing some security podcast's. I keep up with numerous RSS feeds in my Firefox browser. I had a great time with this class and encourage my classmates to keep in touch. I can be emailed at phuturegenius@yahoo.com

Tuesday, May 23, 2006

A new Morning

It has been some time since my last post, things have been great. My son was born on May 5, he is awesome, most of my time now consists of working, and spending time with my family. Time management skills are in order here. There is so much going on in the IT industry. I like the fact that Apple has released a new Macbook. Its Intel Dual Core,and goes for $1099. I'm in the process of seeking for a new laptop. I have one, but could see myself owing 3. One for the windows platform, anohter for Apple Mac OS and well a third for Unix. Why ? Not only because Im a geek, but I write, try to code and just now getting into photos. I found my dads old 35mm. He is no longer around. So I like photography now. Some many gadgets to get, baby formula to buy. I feel like there is not enought time in the day. Not to mention blogging, soon podcasting. Well thats it today folks have a great one !!!!

Friday, April 28, 2006

The mischief makers BOTS

Bots can be automated to do just about anyhing, there really just scripts that are deisgned to do do network snooping. Here is the scenario, a new exploit is announced online, within minutes a cracker firs up his *nix box, code some PERL and bingo, this script is sent loose to probe networks looking for vulnerable PC's and delivering the result to a system in Finland.

First step is to keep your updates current, run a firewall, and dont use file sharing networks. I cannot stress this enough most malware comes thru those networkds even with Spyware running.

Phishers and VOIP

Now it seems that Phishers are reocrding automated services with VOIP, just imaagine calling into Bank Of America, your call is routed over a VOIP network and someone is on the the line with a digital recorder. Man does that suck, Im sure they already nknow how to decoded DTMF codes to get your banking account number. My suggestion get PGPhone, its a product that will encrypt your Voip traffic. That way they can try to do cryptanalysis and by the time they crack (they wont) You will no longer even need a bank account.

Tuesday, April 25, 2006

Search Engine Marketing Job

Well things are changing for the better in my life, I got a new job placing ads in search engines thru Yahoo Search Marketing and Google Adwords.Its a cool company too. I cannot beleive how much money is in the industry, and all the new stuff I'm learning about. The biggest issue? Click Fraud. There is alot but not as much as people think.

I'm currently learning about Google's API's and plan on taking PHP next semester. Everything is going webbased. This is cool and scary at the same time. Most of the stuff on the net is vulnerable on the net there are exploits posted daily. How much stuff of mine do I really want on the web? Besided this and a couple of other blogs not much.

What Linux Live CD's are good for security?

I use Whoppix alot, it is a great CD, with alot of good tools, categories include penetration testing, wireless testing, it has compilers being that is Linux, it has a ton of usefuill perl scirpts and a vulnerability DB.

You can find it here:

Wednesday, April 05, 2006

Apple and Dual Boot

This is great, but why not triple boot? I know its possible, what if I want to run Windows 2000 Mac OS X.. and BSD or any flavor of Linux? I like many operating systems for many different reasons. Im looking at VMware so I can run virtual machines to test code in a controlled enviroment. I want to analyze malware and peek beneath the hood to see what functions and system calls it might be trying to access.

Microsoft now offers a virtual server, for free :) I like free stuff Go open source. I have not tested it yet. Im curious to see how stable it is lol.

Pay Per Click Management

I have created another blog for my day to day activities at a PPC management firm I work for check it outby clicking on the title Pay Per CLick Management.

DRM- Digital rights management

The word for the day is Digital Rights Management
Is it ok to burn and copy music or to use servies for Limewire? I know it's illegal. I cant think of someone nowadays that does not burn music, I personally notce everything that I read I can find online and it usually more up to date.

The copyright protection schemes will continue to be cracked. Is it of any use?

DRM is used on DVD's, product activation, and digital water marketing.

Monday, January 30, 2006

Adware

I hate Adware, I'm always looking for great tools to get it removed. Here is a great adware and spyware remover.If your PC is running slow, or downloand alot of music, I recommend checking this out!

No Adware

Saturday, January 28, 2006

Krav Maga

Today I woke up and went to my first Krav Maga class.It was fun and a great workout. They also played really cool music which was a plus. I have been blogging alot I have three blogs up currently and one website. I have decided to blog my classes online, not only for a learning experience, but to rehash my studies and to give back to the online community. My classes this semester are HTML and Ecommerce.

Thursday, January 26, 2006

Southern California Linux Expo

Well SCALE is around the corner. Im excited, I think I'll drag my girlfriend along with me to introduce her to Linux. She uses MS Windows which I do as well at work and at home. I use Linux as well. I prefer Linux for the reason that so much good software is availiable and its free. I also have my choice of compliers ready at my disposal.

What is SCALE? Click on the link above to check it out.

This is my plan:

These are the talks I will be attending.

Day 1

A Look at the Current and Future Face of PHP
Lunch
Fighting Spam using Linux and Open Source Tools
phpWebSite Open Source CMS
Linux Network Security

Day 2
Performance Tuning Linux Applications With DTrace
So you want to be a consultant
Exhibiton
New Features in MySQL 5.0, 5.1, and beyond

Tuesday, January 24, 2006

Department of Justice VS. Google

The Department of Justice wanted access to search queries on Google. The DOJ asked Google to release search records for a particular week. Then they asked for a list of all URL's indexed in Google. This is insane thats like over a billion URL's.

Google said no.

Yahoo did release search results. No personal information was released.

AOL did comply. No personal information released as well.




Sunday, January 22, 2006

Sunday

Its Sunday morning, I got up early lifted some weights and got my car washed. Then me and my girlfriends made a trip to Costco to return a DVD/VCR combo. We already have one. There was no problem with the return which was nice.

We are now watching Lord of War with Nicholas Cage. It 's about a gun runner, I like it. I will probably be going back to Blockbuster today to return the rest of the movies. I also rented Pirates of the Silicon Valley, its about the making of Apple and Microsoft. Its also good. It shows how crazy Steve Jobs actually was. I dont know if he still is :)

Friday, January 13, 2006

Back to School

I have enrolled back into school I'm taking HTML and Ecommerce, lets see how I can profit from this.