Time to patch your Cisco routers by ZDNet's George Ou -- While Cisco isn't alone in upgrade complexity, the end result is that most end users never patch their routers and switches and just assume they never needs patching. This probably won't change until a conventional PC worm makes the jump to attack IOS vulnerabilities and causes massive damage.
Orange County Computer Security Consultant helps small businesses with technology solutions to grow and protect your business. Phone (714) 589-9423.
Orange County Computer Consultant

- Orange County Computer Security Consultant
- Orange County Computer Consultant helps small businesses with networking, installations and small business software.
Thursday, November 10, 2005
Look out Network Admins
Friday, November 04, 2005
Windows 2000 Security
By Benjamin Hargis
I was asked recently to go to a car dealership and do a security analysis on their Windows Server 2000 machine.
This is what I recommend doing to any Windows 2000 machine where applicable.
Make sure that the guest account is disabled. It comes disabled by default.
A problem I notice allot is when I go to companies, lots of accounts are still active for employees who no longer work there. They should be removed when the employee is terminated or leaves on their own accord. Disgruntled employees have been known to wreck havoc.
Group policies can and should be implemented in a Windows 2000 environment and audited to make sure there are no extra accounts or accounts with weak passwords.
Password security is also important; if your password is weak it will be cracked. I have been in companies where your password is your initials. That is to simple. Implement password policies and account lockouts after multiple failed login attempts. WARNING this can create a denial of service attack. Create multiple admin accounts and give them different rights. A strong password policy for administrative tasks.
Run Net Share from the command line to view open shares on your network and shut those down unless needed.
Go into the BIOS and set a user password and disable the ability to boot from a floppy, USB, or CD. People can easily grab the SAM file which is a password hash stored on your system from a Linux boot CD or other tools. Then attempt to crack the hash.
Change the administrator account to a different name. That is usually a crackers first attempt. Rename it to something other than root as well.
Use NTFS on all partitions this gives you more control and security than using the FAT file system.
Make sure that the "Everyone" permission is not allowed on your resources, directories, etc.
Have the last user logged on turned off. This makes it easier for an attacker to guess passwords. There already half way there the have the username.
Apply appropriate access control lists.
Don’t forget about the people around you and either lock your workstation when you leave or have a screensaver enabled with a strong password. Insider threats are a reality.
You can enable EFS encryption file system; you can encrypt whole directories as well. I suggest if your really paranoid or smart to look into a utility that allows you to choose different encryption algorithms. I do not like encryption standards that are closed. Meaning we cant see the source code. I prefer open source its easier to look for holes and attacks.
Make backups of all your important files. This is the most important thing I learned in System Administration. Backup, Backup, Backup to something that cannot be overwritten such as a CD-R.
To configure Security Policies use the Security Configuration Toolset you can make your job allot simpler by using snap-ins.
I visited Microsoft’s site to see everything they had, I have to say there is plenty of information.
Shut down services that are not needed. The more ports that are open and the more applications running the more avenues of attack.
Restrict access to Local Security Authority only to admin.
Change log in warning to something like. Authorized Personnel only, "all activities are logged and monitored. Violators will be prosecuted to the fullest extent of the law."
Shut down individual ports, that are not used.
I personally like smartcards for two form authentication. I recommend RSA secure ID for machines that need more security.
Enable auditing to track what users and possible intruders are doing on your system.
Everything from login attempts to access of objects can be audited in Windows 2000.
Protect the registry from anonymous access.
Make sure the audit logs are locked down so they cannot be erased, or tampered with. Only the admin should have rights to these files.
Install service packs.
Make sure that your antivirus is up to date with the latest signatures.
Run a Spy-Ware utility.
You can also run an online vulnerability checker such as Shields Up by Gibson Research.
Get automated patch software.
Remember that security is not something that can be finished. Keep up to date.
Benjamin Hargis CEO & MCP
Phuture Networks
Visit us on the web! http://www.phuturenetworks.com
Article Source: http://EzineArticles.com/
Thursday, November 03, 2005
Free Micorsoft Security Toolkit
Wednesday, November 02, 2005
A great article on Spyware definitions
Spyware definitions released by ZDNet's Suzi Turner -- The Anti-Spyware Coalition (ASC) released their definitions of spyware today, available at the website. The document includes a table of technologies that could be classified as spyware, depending on factors including control, notice and consent. Another document (PDF) is available, with a summary of the nearly 400 public comments and the ASC's response. The coalition also outlined their [...]
I liked this article and thought it provided good information.
Google Base
Google Base: What might Google be up to? by ZDNet's Garett Rogers -- Google is smart, they know what they want, and more importantly they know what people want. The answer to both is "information" and "money". Looking at both of these "wants", they must decide how they can do this and stick to their "do no evil" guns.
Google has alot of information this is a good thing but also a concern about privacy. I like Google, they have great technology and I cant wait to see whats going to happen know that they are partnered with one of my favoite companies Sun Microsystems.
Monday, October 24, 2005
Open Source Firewall Scripts
Service Pack 2 For Micorosft Exchange Server Released
Friday, October 21, 2005
Microsoft Security
Ezine Directory
Wednesday, October 19, 2005
LISA '05
Tuesday, October 18, 2005
Website Development
Thursday, October 13, 2005
Microsoft releases new security product.
Wednesday, October 12, 2005
Phuture News
Its a UNIX operating system based on the BSD Berkely System Development kernel.It works on Pentium x86 and RISC based processors also Alpha Chips.Unix was designed by Dennis Ritchie and Ken Thompson. I've been working on my website and analyzing good keywords for more traffic. I own a computer security consulting business. It's called Phuture Networks. We can also perform search engine optimization and do consulting on hardware and software. Currently reading alot of psychology and talking to my friend about affiliates.
Friday, September 30, 2005
My company website
Ive been real busy lately studying books for MBA, learning all I can about marketing prospecting, search engine optimization.Its awesome. I got my IPOD Nano, I love it it is well designed and simplistic the way hardware and software should be. My time and life is consunmed with devouring material on finances, real estate, technology and girlfriend. I love educating myself college taught me to learn and I can cover more material on my own rather than class. I will be enrolling back into college to pursue degrees.
Wednesday, September 14, 2005
Organic Search Engine Results
Saturday, September 10, 2005
Real Estate Technology Analyst
Skills in Search Engine Optimization, Page Rank, Link Popularity, SEO, PPC, drip systems.
Familiar with Multiple Listing Services, and paid directories.
Website optimization for search engines: HTML, site structure, and page layout issues.
Identify and implement strategies for increasing traffic through organic search listings without creating the risk of sites being blacklisted.
Tracking and Reporting
Continually monitor organic search rankings to maximize traffic and sales
Keyword research including cataloging and indexing target keyword phrases
Keyword research using Word Tracker, Overture, Google and internal tools
Plans, organizes, and implements sales programs for the region. Coordinate directly with outside sales reps. Responsible for marketing and booking appointments for outside sales reps.
Provide realtors with product and service information to assist them in determining appropriate website, e-marketing and hosting solutions
Tuesday, September 06, 2005
Basic Astronomy

Hipparchus came up with magnitude
The moon is 240,000 miles away.
Ptolemy is one of the most famous astronomers.
Nova means new in Latin.
Kepler's three laws of planetary motion.
1. Planets move ecliptically (egg shaped)
2. Planets do not move at constant speeds but speed up when closer to the sun.
3. A closer planet moves faster than one that is farther than the sun.
Hans Lippershy built first telescope.
Newton- gravitation, nature of light, color, calculus.
Sunday, September 04, 2005
Labor Day Weekend
Friday, September 02, 2005
Python
Python is an interpreted, interactive, object-oriented programming language. It is often compared to Tcl, Perl, Scheme or Java.
Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing. There are interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac, MFC). New built-in modules are easily written in C or C++. Python is also usable as an extension language for applications that need a programmable interface.
The Python implementation is portable: it runs on many brands of UNIX, on Windows, OS/2, Mac, Amiga, and many other platforms. If your favorite system isn't listed here, it may still be supported, if there's a C compiler for it. Ask around on news:comp.lang.python -- or just try compiling Python yourself.
Many of Google's engineers code in Python.