Orange County Computer Consultant

My photo
Orange County Computer Consultant helps small businesses with networking, installations and small business software.

Friday, November 17, 2006

Review of HP iPAQ hx2495

I just picked up one of these PDA's from Amazon. Im quite happy. It is a little heavy compared to my Toshiba PDA, but so much more powerfull. It has built in WiFi and Bluetooth. I connected to my corporate network with no problem at all.

I really missed having my PDA around. One day my Toshiba just quit. It was a refurbished model. I picked this up for $288.99. It was a good deal.

Thursday, November 16, 2006

McAffe Secure Internet Gateway



I just done with a presentation on the McAffee Secure Internet Gateway. This is a unified threat solution. It has Anti-Virus, Anti-Spware and firewall capabilities. It also has anti SPAM system.I stayed after the presentation to ask what operating system runs on the device. It is a modified version of RedHat. It is also checked by a outside third party for any vulnerabilities.

It comes in different models like the 3100, 3200 and 3300.

These models also have web filtering capabilities. This device is capable of protecting both POP 3 and SMTP fro email security.

To find out more go to www.mcaffee.com

Wednesday, November 15, 2006

Math and computer science

I'm currently in school majoring in computer science with a focus on security. I'm really need to brush up on my math skills. I was on Slashdot and came across this post about what type of math CS majors should look into.



Article on Slashdot

CCNA Notes

Flow Control provides data integrity prevents the sending host from overflowing the buffers of the receiving host. Sends data in segments. Synchronization and windowing is also handled at this layer.

Routing is handled at the network layer. The network layer is also responsible for routing thru the internetwork and network addressing.

Router update packets include RIP, IGRP, and OSPF.

Kevins Mitcnicks Security Advice

I came across this on Wired Magazine site. This is quoted from Kevin Mitnick. One of the most famous hackers of all time.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

  • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.
  • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
  • Use an antivirus product like AVG or Norton, and set it to update daily.
  • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
  • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
  • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
  • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
  • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
  • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
  • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.
This is great advice and I recommend following his points....

Friday, November 03, 2006

I love Open Source Software

I can do anyhting with Open Source, I love it. Need a webserver ? Get Apache. How about a web proxy why not try Squid ? Lets not even mention security. Vulnerability Scanners, Intrusion Detection Systems and its all free. The only thing I see is the learning curve and time it takes to configure and manage this software.