Orange County Computer Consultant

My photo
Orange County Computer Consultant helps small businesses with networking, installations and small business software.

Wednesday, November 15, 2006

Math and computer science

I'm currently in school majoring in computer science with a focus on security. I'm really need to brush up on my math skills. I was on Slashdot and came across this post about what type of math CS majors should look into.



Article on Slashdot

CCNA Notes

Flow Control provides data integrity prevents the sending host from overflowing the buffers of the receiving host. Sends data in segments. Synchronization and windowing is also handled at this layer.

Routing is handled at the network layer. The network layer is also responsible for routing thru the internetwork and network addressing.

Router update packets include RIP, IGRP, and OSPF.

Kevins Mitcnicks Security Advice

I came across this on Wired Magazine site. This is quoted from Kevin Mitnick. One of the most famous hackers of all time.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

  • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.
  • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
  • Use an antivirus product like AVG or Norton, and set it to update daily.
  • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
  • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
  • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
  • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
  • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
  • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
  • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.
This is great advice and I recommend following his points....

Friday, November 03, 2006

I love Open Source Software

I can do anyhting with Open Source, I love it. Need a webserver ? Get Apache. How about a web proxy why not try Squid ? Lets not even mention security. Vulnerability Scanners, Intrusion Detection Systems and its all free. The only thing I see is the learning curve and time it takes to configure and manage this software.

Tuesday, October 31, 2006

Attack can disable Windows Firewall

A attacker can send a crafted packet to shut down Microsoft Windows firewall. Not shocking. Microsoft has never been known for security. The attack involves ICS or Internet Connection Serivce.

The attacker would have to be on the local LAN for this to work properly.

Google picks up JotSpot

Jotspot was one of my prospects for a company who shall remain nameless. When I talked to a guy over there, I told him him how I thought that there idea was good and was amazed that Google has not bought them yet. Now I read this morning that they bought them.

They offer wikis to families and businesses.

http://www.jotspot.com

Cisco ASA 5500

Cisco ASA 5500

This is a review on the new Cisco ASA 5500

The Cisco ASA or Adaptive security appliance can use different modules for different security needs.

There are currently four unique modules. They include the firewall module, IPS which is a intrusion

protection system. Anti-x module and a VPN (virtual private network) module.

The benefits of this appliance is that modules can be added as your needs grow. All in one device.There is a business edition provides small to medium businesses with VPN and gateway capabilities.

The firewall module can be implemented to stop corporate users from abusing instant messaging, theintroduction of spyware and adware onto the corporate network.It will also protect against externalthreats suck as hackers or crackers. Policies can also be set up to bloak peer to peer file sharing.

The Cisco ASA 5500 can also provide VPN access for remote users. The SSL (Secure Sockets Layer) and also IPsec protocols can be used to encrypt traffic.

Different forms of authentication can be used such as Kerbeos, Microsoft Active directory, LDAP lightweight directory protocol and RSA secure ID.

Everythinbg can be controlled through the Cisco Security Manager, a all in one management platform. I watched a video on this at Ciscos website. I like the interface, you can even see attacks in real time and decide to section off that part of the network. Thats pretty slick. Another way to do this is through MARS, which is Cisco's analysis tool.

There are diffrent modules for different needs Some firewalls can support up to 1.2Gbps.

The Anti-X technology is based on Trend Micros technology to stop threats like viruses, spyware, trojans and worms.

Friday, October 13, 2006

CCNA Progress

Im still studying working on my CCNA, I'm studying IP addressing and subnetting currently. its going well. I have decided to rewrite my business plan for Phuture Networks. I'm going to focus solely on IT Security.

I injured my knee, I have been out of work for about a week since I cant drive. Its my right knee. The one good thing I can say about it, it has given me time to think. I have been analyzing allot of code in C, PERL and Python. I want to be able to read the stuff like English.

I have almost completed my introduction to engineering class. I like it. It has made me more methodical and detail oriented.

My son is getting huge, I cant believe how fast kids grow. Its really amazing.

Wednesday, October 04, 2006

Microsoft Vista and Pirates

Microsot has come up with a plan to thwart illegal software copies. The solution ? They will lock out anyone who does not register their OS within 30 days ! I wonder how long it is going to take for some skilled cracker to reverse engineer the code.

It will not actually lock you out just give you real limited functionallity. Which would suck. During the 30 days you will get popups. Lovely. Letting you know that you must register.

During this grace period warnings will be displayed and Vista will block access to the Windows Defender anti-spyware tool, ReadyBoost memory expansion feature and Aero advanced graphics option, Microsoft said.

Just run Linux. IMAO

Day 1 Studying for CCNA

I have made up my mind to stay focused on obtaining my CCNA or Cisco Certified Network Associate, I have downloaded many study guides and plan to read one chapter daily, out of my CCNA book. When I pass the exam I will focus on security. I would like to become a expert with firewall technologies, configurations and setup.

The main subject for today is the OSI layer or open systems interconnect. This is a standard that allows vendors software/hardware to communicate. There are seven layers for the OSI model. They include: Application, Presentation, Session, Transport, Network, Data and Physical layers.

The Application layer provides network access to programs, it also does error recovery and flow control. It makes sure that communications can be established by checking resources. The following protocols can be found here. NCP, SMB, Telnet, SMTP, Appletalk and SMB.

The Presentation layer does protocol conversion and my favorite encryption and data compression. This layer uses protocols such as NCP, TDI and AFP.

The Session layer does just that it opens a session it does connection establishment, data transfer and cloese the connection. The protocol NetBios can be found on this layer.

The Transport layer put messages into smaller packages adn does error detection and correction. Some of the protocols here NetBeui, NWLink, IP, IPX, and TCP.

The Network Layer does routing, handles addressing, translates logical addresses to physical ones as well as traffic management. The protocols here are IP, IPX, NWLink and NetBeui.

The Data Link Layer packages bits into frames so they can be transported over the network layer. There is also the MAC sublayer that puts the MAC address into the frame header.

The Physical Layer would bethe actual cabling, connectors and electrical signals transmitted on the wire.

That is my quick synopsis of the OSI layer.

Monday, October 02, 2006

Current BrainBench Certifications





I guess I really am a geek. This didnt take long at all....

Monday, September 25, 2006

Alexanders Doctor Visit

I took my son to the doctors today, he had to get four shots. I hated every second of it. He is only 4 months old. But its over for at least a couple months. My girlfriend went with me.

I made it into work late today, doctors note and all. I find my inbox is full of spam. We sell spam firewalls and but I guess the rules are not configured properly on our network. Today is a typical Monday, making cold call and not reaching anyone.

I'm currently enrolled in Engineering at a community college. It is ok. I can say it is making me think about things differently. It's like programming in the sense of breaking the complex problems into smaller chunks. I have always liked taking things apart as a kid. Now here is my chance to start building. Next semester, I will be taking more math and physics. I do not want to stop going to school. There are so many subjects that interest me. I'm a geek :)

I still want to take technical writing and drawing, CAD, CAM and more advanced electronics. I'm still undecided on my major. I'm thinking about information assurance or computer engineering.

Wednesday, August 30, 2006

Stolen Laptops and Data

It seems like daily I hear about security breaches, laptops being stolen. All this personal information is being leaked. I dont understand why people dont use encryption ? I admit it seems daunting, but there are programs out that now that require you to click a button. Its that simple. But what standard do you encrypt with ? I personally like AES which stands for Advanced encryption standard. It is FIPS compliant another lovely acronym that stand for federal information processing which means the goverment uses it to secure unclassified data.

If you want to know the ins and outs of the algorithihm here is a paper published by NIST.

AES Text

After finishing the document, I feel like I need another Red bull.

It talks abouts ciphers, bits, plaintext and other goodies. A knowledge of C C++ or Unix is helpfull. There are alot of functions.

XOR is used in the algorithim to encrypt plaintext into ciphertext.

The cipherkey itself can have lengths of 128, 192 or 256 bits.

There is to much math for me, gives me a headache, although I can understand some of the code.

Thursday, August 17, 2006

Microsoft Presentation

We had Microsoft come out to our office to show us Vista. It looks clen but the hardware requirements are going to require allot of people to upgrade. Thats good new to me but bad for consumers. Personally I love Linux. Vista looks allot like OS X. Apple's OS.

There are some new security feautures including a way to encrypt directories and filesystems. When I asked what encryption protocol would be used, I did not get an answer. That's marketing for you. I also read that Microsoft released 12 security alerts. 8 are critical. You can read about the here .

Wednesday, August 09, 2006

Goals and Career

I currently work for a large IT company consulting enterprise accounts on hardware software needs. I'm working on obtaining my Associates degree and have decided that my major is going to be information assurance. (IT Security). I plan on studying for my CCNA and have a goal of obtaining it by January of 2007. After I complete my self-study. I will go after my CISSP. Currently I'm a MCP or Microsoft Certified Proffesional.

Here is a sample of the courses:

Bachelor of Science - 127-128 credits

Programming and Computers - 25 Credits
CT-115 Introduction to Programming 3
CT-152 Introduction to Unix Completed 3
CS-130 Computer Science Fundamentals I 4
CS-220 Database Management 3
CS-230 Computer Science Fundamentals II 3
CT-301 Website Construction 3
SE-301 Software Engineering 3
SE-458 Senior Design Project 3
Computer Security - 18 Credits
CS-356 Web/CGI Programming Using PERL 3
CS-418 Operating Systems 3
NS-201 Network Security Protocols and Administration3
NS-351 Secure Website Administration **3
NS-352 Unix Administration and Security ***Completed3
NS-401 Network Security Theory and Algorithms3
Mathematics and Sciences - 21 Credits
MA-114 Algebra and Trigonometry 4
MA-124 Discrete Mathematics 3
MA-128 Introduction to Statistics 3
MA-261 Calculus I 4
MA-262 Calculus II 4
Science elective (1)3
Telecommunications and Networking - 6 Credits
TC-110 Introduction to Telecommunications 3
CT-240 Internetworking with Routers and Switches 3
Management - 6 Credits
MIT-201 Introduction to E-Business Completed
3
MIT-208 Internet and the Law 3
Humanities/ Social Sciences - 19 Credits
FS-100 Freshman Seminar 1
HU-331 or HU-332 Arts and Ideas3
SS-351 Ethics 3
Humanities/History/Philosophy electives (2)6
Social Sciences electives (2)6
English Communications - 9 Credits
EN-101 English Communications I 3
EN-102 English Communications II 3
EN-408 Writing Seminar in Technical Research3
Technical Electives - 24 Credits
Technical electives (6)18
Technical electives (2) - must be 300 or above6

Sunday, July 16, 2006

Final Project for Internet Technologies Class

My final project is about having a Internet presence. I already have this blog up, so I'm going to point a link here to my blog. This was my first online class and I enjoyed it. I will be taking critical thinking in August for my next online class.

I also have some articles that I have written that I would like to share with my classmates here is the link.

I also have a business website I made called Phuture Networks.

I have also beent thinking about doing some security podcast's. I keep up with numerous RSS feeds in my Firefox browser. I had a great time with this class and encourage my classmates to keep in touch. I can be emailed at phuturegenius@yahoo.com

Tuesday, May 23, 2006

A new Morning

It has been some time since my last post, things have been great. My son was born on May 5, he is awesome, most of my time now consists of working, and spending time with my family. Time management skills are in order here. There is so much going on in the IT industry. I like the fact that Apple has released a new Macbook. Its Intel Dual Core,and goes for $1099. I'm in the process of seeking for a new laptop. I have one, but could see myself owing 3. One for the windows platform, anohter for Apple Mac OS and well a third for Unix. Why ? Not only because Im a geek, but I write, try to code and just now getting into photos. I found my dads old 35mm. He is no longer around. So I like photography now. Some many gadgets to get, baby formula to buy. I feel like there is not enought time in the day. Not to mention blogging, soon podcasting. Well thats it today folks have a great one !!!!

Friday, April 28, 2006

The mischief makers BOTS

Bots can be automated to do just about anyhing, there really just scripts that are deisgned to do do network snooping. Here is the scenario, a new exploit is announced online, within minutes a cracker firs up his *nix box, code some PERL and bingo, this script is sent loose to probe networks looking for vulnerable PC's and delivering the result to a system in Finland.

First step is to keep your updates current, run a firewall, and dont use file sharing networks. I cannot stress this enough most malware comes thru those networkds even with Spyware running.

Phishers and VOIP

Now it seems that Phishers are reocrding automated services with VOIP, just imaagine calling into Bank Of America, your call is routed over a VOIP network and someone is on the the line with a digital recorder. Man does that suck, Im sure they already nknow how to decoded DTMF codes to get your banking account number. My suggestion get PGPhone, its a product that will encrypt your Voip traffic. That way they can try to do cryptanalysis and by the time they crack (they wont) You will no longer even need a bank account.

Tuesday, April 25, 2006

Search Engine Marketing Job

Well things are changing for the better in my life, I got a new job placing ads in search engines thru Yahoo Search Marketing and Google Adwords.Its a cool company too. I cannot beleive how much money is in the industry, and all the new stuff I'm learning about. The biggest issue? Click Fraud. There is alot but not as much as people think.

I'm currently learning about Google's API's and plan on taking PHP next semester. Everything is going webbased. This is cool and scary at the same time. Most of the stuff on the net is vulnerable on the net there are exploits posted daily. How much stuff of mine do I really want on the web? Besided this and a couple of other blogs not much.