Orange County Computer Security Consultant helps small businesses with technology solutions to grow and protect your business. Phone (714) 589-9423.
Orange County Computer Consultant

- Orange County Computer Security Consultant
- Orange County Computer Consultant helps small businesses with networking, installations and small business software.
Thursday, December 29, 2005
Thursday Morning
Wednesday, December 28, 2005
Yet another blog I started
Tuesday, December 27, 2005
Keep It Simple Stupid
More papers on security.
Saturday, December 17, 2005
Cisco PIX 506E
This firewall is a enterprise class security appliance. It could be used for small to medium sized businesses, sattelite offices and regional offices.It supports two 10/100 fast ethernet cards and also two 802.1q virtual interfaces.This alows your business to create a DMZ or demilitarized zone. This is a spot on your network that you put your webservers but not your backend servers like SQL or Exchange. Cisco took the approach of multilayered defense again with this product and it has alot of nice feautres to help protect your network and data.There are no moving parts making it more reliable.
The Cisco Pix 506E uses what Cisco calls Cisco Adaptive Security Algorithim.This provides statefull packet inspection it logs all authorized attempts to use the network as well as trying to block unauthorized access.The firewall is designed to look for common vulnerabilities, it looks for about 55 well known attacks.It inspects layers 4 through 7 os the OSI layers. The Cisco Pix 506E also looks at application data traversing the network and even protocol status.The designers of this firewall did a good job. The Cisco Adaptive Security Algorithim does protocol field checking and also URL length checking. It does not mention anything about if it can filter Unicode.It has over 100 applications already documented so you can allow or disallow them easily.
Cisco PIX Device manager allows administrators to manage their network remotely.Network or Firewall administratos can still create their own ACL's or access control lists and user and group based policies. Network administrators can decide which applications that are and are not allowed thru their network as well as protocols.Protocols that this device checks are HTTP, FTP,SMTP, DNS, SQl*Net,NFS,ILS, SCCP and many more.For instance I would not allow my employess to use Telnet, if they needed remote connectivity at all I would suggest SSH using a cool program called Putty for Windows based machines.
Since Im on the topic of remote management I will talk about some of the Cisco Pix 506E solutions.The are many different ways to mange this device. It can be troubleshooted and configured remotely.If you have a web browser which I hope all admins have, you can access this firewall through the Internet. It uses SNMP simple network management protocol for monitoring devices on the network.You can use Auto Update server, security monitor and management center for firewalls.
The firewall does auditing, has support for Dynamic devices on the network and can do software images.
The Cisco Pix 506E also has support for VPN's or virtual private networks.You can use either IKE Internet Key Exchange or IPsec.Cisco also offers VPN concentrators to speed up connections. I will be writing articles on those shorlty. The encryption standards it supports are DES data encryption standard, this is crackable. 3DES which is more secure and AES advanced encryption standard. I recommend the later. The VPN can work with NAT or network address translation which hides your internal IP address from the Internet. Support for up to 10 VPN uers.The firewall also supports TACAS+ and RADIUS.
VoIP- Voice over Internet protocol can also be ran thru this firewall. So that you can sleep well at night knowing that your multimedia and voice connections are secure.
This is probably my favorite about this device. Intrusion Prevention. This firewall has tools that protect it from many well-known attacks.
Dos or denial of service attacks are prevented from bringing down your network and firewall. I do question how much data this device can take before shutting down or how many packets it can drop quickly. There tools are called DNSGuard, FloodGuard, MailGuard, IPVerify and TCP intercept.
This firewall can also contact adminstrators real time thru a cell phone SMS or email thru a devich such as a RIM Blackberry.I have read of software that will allow you to SSH to your router, computer thru the Blackberry. Cisco's auditing software is called CiscoWorks Information management Solutions or SIMS.No not the game. It collects and anayzes data from across your network allowing you to prioritize threat levels.
Benjamin Hargis
Phuture Networks
http://www.phuturenetworks.com/
http://www.computersecurityadvice.com/
Friday, December 16, 2005
Voice over IP
VOIP stands for voice over internet protocol. Basically it means making phones calls over your local area network (LAN) or even across the Internet.
VOIP is normally cheaper than your PSTN that’s public switched telephone network i.e. your local carrier.
VOIP is a good choice for businesses as well to save money on long distance calls if they have many satellite offices. VOIP service providers usually have lower fees because they are not a government regulated currently as the phone systems which at one time were a monopoly. VOIP can even be free if you connect directly to another VOIP client.
VOIP routers can send your incoming phone calls to you anywhere thus cutting down on the number of lines and you can be reached anywhere you have a Internet connection.
This and the combination of technologies like WiFi are going to make for one huge network. That voice, data and video will be sent everywhere and from anywhere. With this VOIP technology you have allot more features as well such as Caller ID, Call Forwarding and answering services all from your computer or PDA.
There are some issues to still be worked on.
Here are some:
The amount of band with required.
Security issues- what type of encryption should be used and how much is going to slow down the call and network?
This is a exciting and new technology which I will be writing more about.
Benjamin Hargis
Wednesday, December 14, 2005
More info on Cisco PIX 501
This firewall is designed for homes and small businesses.This firewall can support up to ten users on a basic license from Cisco. It has a 133 MHz processor and comes with 16MB's of RAM. In addition it has 8MB of Flash RAM.
The Firewall also comes with 1 uplink port and a four port switch. It does not support Layer 2 transparent fire walling. It also does not support the routing protocol OSFP which stands for Open Shortest Path First. There is no VLAN-Virtual Local Area Network.
The PIX 501 allows you to setup a VPN-Virtual Private Network easily with the Cisco Easy VPN Server.
The firewall supports speeds up to 60Mbps bidirectional.
When you implement cryptography such as 3DES or DES it slows down the traffic.The PIX 501 can support anywhere from 50-unlimited users depending on your license
Cisco PIX Technology
Cisco PIX Security applications can enforce policies on users and applications.
Cisco PIX can protect you from many different network and Internet based attacks.
Cisco PIX offers secure connectivity, using methods such as SSHv2 Secure Shell Two and VPN virtual private networks.
This is fairly easy to setup.
Cisco PIX can provide you with secure VOIP voice over internet protocol.
IPSec or Internet Protocol Security IPSec can be setup for VPN's.
Cisco PIX Security appliances provide multiple layers of security.
This hardware/software based solutions is designed to look for anomolies aka weird traffic thats not normal on your network, which could be an indication of a attack.
There is over thirty different engines looking for different attack signatures.
The current version is Cisco PIX appliance version 7.0
Here are some of the feautures:
You can rollback previous configurations in IOS.
QOS- Quality of Service
You can update software on the fly with bringing down the hardware. No rebooting.
VPN client security
Layer 2 transparent firewall.
This is really interesting 3G mobile security services.
You can configure the firewall to block instant messaging, point to point networking P2P.
You have the ability to block applications trying to tunnel thru your network with encrypted
traffic.
Cisco PIX provide rich statefull packet inspection PIX can protect your voice, data, and video
traffic.
Version 7.0 also supports IKE or Internet Key Exchange.
Everything can be managed from Cisco Adaptive Device Manger which can be console and web based.
Benjamin Hargis CEO Phuture Networks
http://www.phuturenetworks.com
http://www.computersecurityadvice.com/
Here are some other sites for you viewing pleasure:http://www.checkmategame.blogspot.com
http://www.realestatelead.blogspot.com/
Sales Tips
Anticipate objections and be ready with rebuttals.
Get down to the real objection.
Follow up with all leads.
Do it the best its ever been done.
Its all numbers, dial more.
Provide value for customers.
Control the conversation, listen even more.
Follow ethical practices.
Planning, goal setting, decision making, delegation and communication work on improving these areas.
Toss out ideas at meetings.
Keep abreast of the market
Look for multiple sources of income.
Assume responsibility for your actions.
Build relationships.
Network like crazy.
Be resourcefull, ready, remebered and relentless.
Help customers discover the best solutions.
Persist and dont give up!
I've been in sales for 15 years this can be valuable to new sales people and veterans.
Building Internet Firewalls
This book covers the basics of firewall technology to the nitty gritty details. I highly recommend it. It is well written and covers such interesting topics as protocols, databases, security strategies and examles of firewall setups.
Building Internet Firewalls covers packet Filtering, Proxy Services, NAT- network address translation and VPN's virtual private networks. Firewall architecture such as single box, screened host, bastion host, multiple screened hosts, modems and internal firewalls for your intranets.
The different ways to filter traffic are also discussed in depth. You can filter based upon address, protocol, source and destination addresses amongst many other variables. It discusses both Micorsoft Windows and *nix based solutions.
It goes over Internet Services such as RPC, DCOM, DOM, CIFS, SMB, SSL, RAS, PPTP and so many others.
This book is a awesome reference to add to your security analyst book collection.
Microsoft Security Update
HTTPS Proxy Vulnerability (CAN-2005-2830)
File Download Dialog Box Manipulation Vulnerability (CAN-2005-2829)
COM Object Instantiation Memory Corruption Vulnerability (CAN-2005-2831)
Mismatched Document Object Model Objects Memory Corruption Vulnerability (CAN-2005-1790)
This can cause problems ranging from attackers reading web addresses sent to a proxy server to running malicious code on your hosts to gain admin access.
MS05-055Vulnerability in Windows Kernel Allows Elevation of Privilege (908523)http://www.microsoft.com/technet/security/bulletin/MS05-055.mspx
This one allows attackers to escalate or gain higher privleges than allowed an example would be a user with no rights gaining administrative control of the machine. It is possible to change kernel memory with this vulnerability. This can lead to remote code execution as well.
Tuesday, December 13, 2005
Cisco PIX 501 security appliance
The is a firewall thats easy to set up for home or small office. It has a four port fast Ethernet switch built in.
This firewall can provide up to 60Mbps data transfer or 3Mbps of encrypted traffic using (3DES) . This can be used for VPN's Virtual Private Networks.
It supports AES which is the Advanced Encrytion Standard at up to 4mbps.
Here is Cisco's overview of their product
SANS going to start IT college
Information Security Engineering
Information Security Management
This will not be easy there looking for high GPA's and recommendations from employeers.
Security Warrior
This is a great book that gets more technical than most books I read. What does it contain? What does it not :)
It has assembly programming tutorials, reverse engineering concepts and tools. Overflow attacks and ways to stop them or at least make it more difficult.
TCP/IP analysis and tools to help in your network engineering chores. It breaks down protocols and their strengths and weaknesses.
It also covers forensics, and anti-forensics. SQL, Wireless, VPN's and SSL.
There is so much in this book and its a great read and handy reference this is my third time reading it so I recommend it to any security analyst's bookshelf.
Bidding for Excel Vulnerability
I use many Linux Distributions on bootable CD's to recover these from clients who have forgot or lost their passwords. I can recover most files even ones that have been deleted.
Virus Definitions
Spyware is also rampant on the Internet is your homepage changing automatically? There is also the threat of keyloggers which could be logging your bank account info, or even your Amazon account information! Use tools such as SpyBot Search and Destroy or Adaware.
Monday, December 12, 2005
What is PERL?
PERL was created by Larry Wall. PERL is sometimes called the duct-tape of the internet. PERL can be used with popular database programs and implemented into websites as well.
Where can you get PERL? http://www.perl.org/get.html
Website on PERL http://www.perl.org/news.html
The PERL Journal http://www.tpj.com/
Examle of PERL code:
A cheap alarm clock: perl -e ’sleep(120); while (1) { print "\a" }’
Random Password Generator
https://www.grc.com/passwords
It gives you 3 choices!
63 random alpha-numeric characters (a-z, A-Z, 0-9)
63 random printable ASCII characters
64 random hexadecimal characters (0-9 and A-F):
Friday, December 09, 2005
Want to learn ARM assembly?
Microsoft Security Video
From Microsoft Japan
http://www.microsoft.com/japan/athome/security/images/thinksecurity/tv/thinksec_1m.wvx
Thursday, December 08, 2005
Firefox Vulnerability
http://isc.sans.org/diary.php?storyid=920
This code was written just to test Firefox, and it worked.
Wednesday, December 07, 2005
Voice Over IP
You can check them out here : http://www.vonage.com/
Looking for a great debugger?
Tuesday, December 06, 2005
Wired buffer overflow show
Microsoft Internet Explorer Vulnerability
Disable Active scripting.
Follow this link to check out a paper on malicious active scritping:
http://www.cert.org/tech_tips/malicious_code_FAQ.html#ie56
Cisco Vulnerability
Best computer security websites
http://www.securityfocus.com
http://www.packetstormsecurity.nl
http://www.sans.org
http://www.cert.org
http://www.securiteam.com
http://www.linuxsecurity.com
http://www.phrack.org
http://www.neworder.box.sk
http://www.slashdot.org
http://www.google.com
http://www.securitynewsportal.com
http://www.infosyssec.com
http://www.snort.org
http://www.honeynet.org
http://www.dshield.org
http://www.astalavista.com
http://www.whitehats.com
http://www.incidents.org
http://www.microsoft.com
http://www.iss.net
http://www.cisecurity.org
http://www.networkintrusion.co.uk
http://www.isc.incidents.org
http://www.grc.com
http://www.foundstone.com
Web Programming
http://www.w3schools.com/
Global Information Assurance Cert
Here is all the certifications they offer:
http://www.giac.org/certifications/
TCP/IP
One of the best sites for Computer Security Training
Looking for Information on CISSP
Hardware Modification
http://www.hackaday.com
http://www.makezine.com/blog/
Cpanel
http://www.cpanel.net
Monday, December 05, 2005
Cisco CCNA Certification: Broadcasts, Unicasts, And Multicasts
A broadcast is simply a unit of information that every other device on the segment will receive. A broadcast is indicated by having every bit of the address set to its highest possible value. Since a hexadecimal bit's highest value is "f", a hexadecimal broadcast is ff-ff-ff-ff-ff-ff (or FF-FF-FF-FF-FF-FF, as the upper case does not affect hex value). The CCNA exam will demand you be very familiar with hex conversions, so if you're not comfortable with these conversions, get comfortable with them before taking the exam!At layer 3, a broadcast is indicated by setting every bit in the 32-bit binary string to "1", making the dotted decimal value 255.255.255.255.
Every host on a segment will receive such a broadcast. (Keep in mind that switches will forward a broadcast, but routers do not.) In contrast to a broadcast, a unicast is a packet or frame with only one destination. There is a middle ground between broadcasts and unicasts, and that is a multicast. Where a broadcast will be received by all, and a unicast is received by only one host, a multicast will be received by multiple hosts, all belonging to a "multicast group". As you climb the Cisco certification pyramid, you'll be introduced to creating multicast groups and controlling multicast traffic, but for your CCNA studies you need only keep certain multicast groups in mind.Class D addresses are reserved for multicasting this range is 224.0.0.0 - 239.255.255.255.
The addresses 224.0.0.0 - 224.255.255.255 are reserved for use by network protocols on a local network segment, and like broadcasts, routers will not forward these multicast packets. (Packets with these addresses are sent with a Time To Live of 1.)As a CCNA candidate, you should know that OSPF routers use the address 224.0.0.5 to send hellos, EIGRP routers use 224.0.0.10 to send updates, and RIP version 2 uses 224.0.0.9 to send routing updates. RIP version 1 and IGRP both broadcast their updates.Multicasting gets a bit more complicated as you go from your CCNA to the CCNP and CCIE, but by simply understanding what multicasting is, you go a long way toward securing the CCNA.
Cisco Router Security
Cisco router security command that is often overlooked. It doesn’t do you any good to set passwords for your ISDN connection or Telnet connections if anyone who can see your router’s running configuration can see the passwords. By default, these passwords are displayed in your running config in clear text.One simple command takes care of that. In global configuration mode, run service password-encryption. This command will encrypt all clear text passwords in your running configuration.Set a console password.If I walked into your network room right now, could I sit down and start configuring your Cisco routers? If so, you need to set a console password. This password is a basic yet important step in limiting router access in your network.
Go into line configuration mode with the command “line con 0”, and set a password with the password command.Limit user capabilities with privilege level commands.Not everyone who has access to your routers should be able to do anything they want. With careful use of privilege levels, you can limit the commands given users can run on your routers.Privilege levels can be a little clumsy at first, but with practice you’ll be tying your routers down as tight as you like. Visit www.cisco.com/univercd for documentation on configuring privilege levels.Configure an “enable secret” password.It’s not uncommon for me to see a router that has an enable mode password set, but it’s in clear text. By using “enable secret”, the enable mode password will automatically be encrypted. Remember, if you have an enable password and enable secret password set on the same router, the enable secret password takes precedence.These four basic steps will help prevent unwanted router access from inside your network. If only preventing problems from outside your network was as simple!
Author: Chris Bryant
Tips On Buying A Cisco CCNA / CCNP Home Lab Kit
Most home labs are put together one router or switch at a time, but many CCNA / CCNP candidates prefer to buy kits where you get multiple routers and switches, along with all the cables and other connection devices you'll need.
While this is a good idea, keep a few things in mind when purchasing Cisco home lab kits.
Don't buy anything you don't need. The problem is that when you're first starting out with your Cisco home lab, you don't know everything that you need. (I sure didn't!) Keep in mind that you only need one transceiver per AUI port on a Cisco router, so if you're getting routers with two AUI ports in all, you don't need five transceivers in the kit. It doesn't hurt to have one spare, but three is a little too much.
More importantly, don't buy kits with old CCNA or CCNP study guides included. I've seen kits with books that were three years old and were of no use to the candidate. If you see a kit that looks good but includes books or manuals you just don't want, ask the vendor for a price that doesn't include the books. It never hurts to ask.
Watch the IOS version. Unless you've got access to IOS upgrades, you'll be working with the
IOS version that's on the routers and switches when you buy the kit for a while. You don't necessarily need the latest and greatest IOS version for CCNA study, but don't buy routers with IOS versions beginning with "10" unless you have an IOS to upgrade them with. (And make sure the routers have enough memory to handle the IOS you plan on putting on them.)
Purchasing a Cisco CCNA / CCNP Home Lab is one of the best investments in your career that you will ever make. Exercise just a bit of caution when purchasing your kit, and you'll be on your way to true Cisco success, in the exam room and on your network!
Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage , home of free CCNA and CCNP tutorials! Pass the CCNA exam with Chris Bryant!
Friday, December 02, 2005
Some things I would like to accomplish in my lifetime
Visit Japan
Master spanish
Get my pilot's license
Visit Tibet
Learn Zen
Get a degree
Get a degree in Computer Science
Get married
make money
Invest in Real Estate
workout daily
Speak chinese
Help mankind
Become a engineer
Get my HAM license
understand electronics
understand physics
be a better boyfriend
get my MBA
Get a PhD
Purchase a home
Pray daily
stop smoking
visit Europe
Purchase a powerbook
Purchase a Sun Workstation
Design Planes
Get a job in Aerospace
learn GO Get a handheld GPS unit
Purchase an Escalade
eat healthier
visit Bali
Retire in Montana
own a boat
Classes I'm planning on taking:
Personal Finance
Physics
Chemistry
Logic
Business Writing and Communication
Finance
Child Psychology
Web Design
PERL
PHP
C and C++
Cryptography and Security Mechanisms
Practices for Administration of Physical and Operations Security Security in Systems Architecture and Applications Disaster Recovery/Forensics
You may ask all those? Yes, I love learning. Wouldnt mind getting a PHD. :)
Classes Ive taken in no particular order
UNIX/Linux Operating System
Business 001 - Introduction To BusinessBusiness 005 -
Business Law I
Management 001 - Principles Of Management
Psychology 001 - General Psychology I
Philosophy 001 - Introduction To Philosophy
Internetworking
Electronics
Computer Repair
Computer Networking
Microsoft Windows
Spanish 001 - Elementary Spanish I
Computer Information Systems 787 - Network Essentials
Thursday, December 01, 2005
Configuration Guidelines from CERT
Home Network Security
Windows NT Configuration Guidelines
UNIX Configuration Guidelines
UNIX Security Checklist New Version 2.0
Anonymous FTP Configuration Guidelines
Wednesday, November 30, 2005
Here are some articles I have written!!
http://ezinearticles.com/?expert=Benjamin_Hargis
Feel free to read them and email them to friends and colleagues. Keep checking back as I plan to write alot more!!!
A great way to start investing
http://www.sharebuilder.com/sharebuilder/Index.asp
Check them out!!!
Looking for a great and cheap way to Try Linux, or Unix?
Class I'm thinking about taking.
Students will be introduced to the Perl scripting language syntax, data types, input/output, Managing System Processes, Database programming, CGI programming and Web Programming. Not an introductory programming course. Students need to have previous programming experience.
I love PERL there are so many things that it is usefull for. I want to be able to write flawless networking applications with it.
Looking for a good way to find files on your desktop?
http://www.download.com/3000-2379_4-10314159.html
It searches most file formats as well.
Friday, November 25, 2005
Free computer security software
Got Spyware?
There is now a bill in Congress to make Spyware illegal. Good luck at catching the creators, in the mean time here are two links you can use to get started on your journey against Spyware.
http://www.lavasoft.com/ Ad-aware
http://www.safernetworking.com/ Spybot Search and Destroy.
Note there is better version available for a cost. There are many things you can also do to protect your computer Keep Automatic Updates turned on for all of your Anti-Virus Software, and operating systems. Clean out your cookies as well there is often cookies placed to track your whereabouts on the Internet.
Now the subject of viruses. There are commercial anti-virus scanner like Symantec Norton Anti-Virus and MacAfee in fact many new computers come with trial versions. Unfortunately when these versions run out users most of the time ignore it and wonder why do I have a virus? Let me explain something just because you have a antivirus software program on your computer you are not cured. Virus writers do just that write new viruses and edit old ones to do new things. You need to update your signatures of your anti-virus software continuously. Crafty virus writer’s code Viruses to disable your anti-virus software!
There is free anti-virus solutions one is called AVG http://free.grisoft.com/. I personally use this product and love It, it is not a memory hog like Norton. And you can also set up schedules to run and get updates.
A good firewall is a must especially nowadays. This is because everyone for the most part is running DSL and Cable modems. Which are great for connectivity horrible because it’s like leaving your front door unlocked.
Check out http://www.zonelabs.com/ They have a product called Zone Alarm. It is customizable and blocks allot of attempts of entering your network. It is shocking to see the amount of people trying to get into your network. Zone Alarm will alert you to programs trying to access the Internet. This is kind of annoying but can be a life saver if a program is dialing Kenya on your telephone!! Zone Alarm can remember certain programs.
Windows Service Pack 2 has a firewall in it and I recommend enabling it.
There are many web browsers that you can use. I love Open Source you can probably guess I’m using Firefox www.mozilla.org/products/firefox.com There are so many features that I can rave about like tabbed browsing, if your anything like me at home I have at least two or three browser running if using Internet Explorer, with Firefox I can have as many websites as I want open and tabs at the top with descriptions. it's ingenious in my opinion. I don’t have to switch browsers like I do with IE.
Internet Explorer is one of the most used browsers and most targeted. Mozilla Firefox has many advantages including security. It also does not use ActiveX.
Scan your own systems! To see what ports are open and running. DO you have services that do not need to be running?
Knowledge is power. I work for a technology company for three years and never have they trained any people in multiple departments on security that I'm aware of. I’m amazed to hear things from co-workers such as I don’t have an account with so and so bank but they wanted my information and I gave it to them! Corporate networks are and will continue to be infected by users that are untrained about computer security. People all the time open attachments that they do not know where they came from. Homes users are sometimes even more ignorant. That is not said in a mean way.
File Sharing programs are popular and an opening to viruses, Trojans and other lovely things you don’t want in your network.
For the best and current security tools, alerts and news use Google http://www.google.com/.
Microsoft Internet Security Accelerator
What exactly is ISA?
Microsoft Internet Security and Acceleration server is a web-cache, virtual private networks and application layer firewall.
For vendor information check out www.microsoft.com/isaserver.
I went to a Microsoft security conference and this is what I picked up.
ISA can inspect traffic coming into your network and also do HTTP filtering. It is designed to look for directory traversing. YOu can customize protocolsand policies based upon your criteria.
ISA allows for better authentication thru RADIUS remote access dial in server. You can also use products from RSA such as secure ID, which I recommend.
VPN's can also be customized thru ISA. VPN's are virtual private networks to allow remote users to access your network thru encrypted tunnels using protocolssuch as IPSec.
Internet Security Accelerator can also be used with Microsoft Exchange server for better security.
Internet Security accelerator allows traffic thru that has been deemed ok by the firewall administrator without additional packet inspection increasing performance of your network.
ISA will also cache webpages to allow faster access over the network.
There are always open source alternatives such as Squid, http://www.squid.org which is a open source proxy. This is just a few notes I took down that I thought I would share with the internet community. I hope this helps with any IT decisions.
Making Money
Then there is affiliate programs. I like Amazon http://www.amazon.com because I can select what books amongst other items I want displayed.
The possibilities are almost endless. It takes allot of writing, even more research and link building to get the results I’m looking for. I would like to make a fulltime income of the Internet and not even leave the house unless there is some interesting security problem or technical problem to get into. I'm thinking about just writing more security articles on a daily basis as well. I do it for fun and to share knowledge.
It must be the Colombian coffee this morning because my mind is racing with business ideas of ways to profit and turn nothing into something. I don’t want to reveal too much though because there is always competition :) I’m looking forward to going to the USENIX conference in December it should be a blast. I will be blogging and taking photos of every bit as well. Then I and my pregnant girlfriend will be making a trip to San Diego to Sea world.
This February I should be going back to college, I have attended like 6 community colleges, various trade schools and I'm not even a PH.D.. I think my problem is that I focus on only technical classes and not the General Curriculum suggested. YAWN. The classes I’m looking at? Oddly enough more psychology and ecommerce, maybe a design class. I took Java and could not stand it. They don’t offer Python.
Thursday, November 24, 2005
Windows Server 2003 Security
There is now forest trust that allows you to authenticate other companies in your WAN thru Active Directory, this simplifies some security issues for security and network administrators.
Kerberos is now availiable thru Windows Server 2003 to allow for better and more secure authentication.
Credential Manager allows secure storage for usernames and passwords as well as certificates.
You can now delegate what services can access other resources on your network.
.NET password is now integrated with Active Directory aloowing SSO or single sign on.
RBAC or Remote Based Access Control you can assign more efficient restrictions to manage access to information.
Systems administrators can disallow software to run, with the Software Restrcition Policy.
In Windows 2003 you can audit system alerts and even set up audits of individual users!
Account Management logs IP addresses and even calls for Logon and Logoff events.
You can now log security events in real time and export them to a SQL database to anaylze later.
PKI or Public Key Infrastructure is is system of digital certificates and CA or Certificate
Authorities to verify you are who you really say you are. This is great for ecommerce systems, think E-Bay. You want to know if your really giving your credit card information to E-Bay or E-fake.
Windows Server 2003 now helps with Wireless 802.1x., you can enable PEAP which is protected EAP for authentication.I suggest using WPA in conjuction. he encrytpion protocl they use is called EFS.EFS uses AES-256 which is very strong encryption. There should be security in depth applied.Two form authentication should be applied such as biometrics and passwords.Take a look at RSA secure ID cards.This provides great authetication for users on the move connecting to the corporate networks, or even home. I like open source solutions myself or even third party vendors for encryption such as RSA http://www.rsa.com.
Wednesday, November 23, 2005
XBOX 360 buggy.

I really do not find this shocking as it is a new product. There will be bugs and probably lots of them we have not even heard about possible vulnerabilities this might open up on your home network. Here is the link
http://www.xbox-scene.com/xbox1data/sep/EEFkZkkkyEHasmrPqu.php
I look forward to playing around with an Xbox 360 shortly. I will then write my own review. I have to admit it looks sweet and has some nice feautres.
The Value Of An Oracle Database
About the Author: For more information please see http://www.money-market-info.co.uk
Active Scripting
How to stop 'Active Scripting' in home PCs by ZDNet's George Ou -- A supercritical zero-day IE flaw has been released in to the wild by a reckless British company. There are no patches available as of 11/22/2005. Here is what you can do now to protect yourself. You must disable "Active Scripting" on all Windows computers running Internet Explorer 5.5 or 6.0 even if you have Windows [...]
Thursday, November 17, 2005
Ezine Expert Author
I have been doing alot of writing lately on security topics you can check them out here:
ezinearticles.com/?expert=Benjamin_Hargis
Todays Security Alerts from CERT
Microsoft Windows Image Processing Vulnerabilities
US-CERT Technical Cyber Security AlertTA05-292A
Oracle Products Contain Multiple Vulnerabilities
US-CERT Technical Cyber Security AlertTA05-291A
Snort Back Orifice Preprocessor Buffer Overflow
On another note the German goverment is warning of new strains of Sobig a trojan thats turns PC into email spam bots. look for patches at Microsoft. www.microsoft.com
Wireless Security
When you set up your wireless router or WAP your signal is broadcast. This broadcast usually goes further than your home or business. People like to drive around finding unsecured wireless access points. This is known as Wardriving, some hackers even mark spots on the sidewalk to let other hackers know your home or business is offering free Internet service, or worse yet access to your data.This is not to scare you but make you aware.
Diasble broadcasting so people cannot you your wireless network.
Your routers come with pre-configured system ID's its called a SSID or Service Set Identifier, its very simple to locate this information on the Internet for default SSID's I recommend changing this to something hard to guess. Use alphanumeric's to make it even harder to guess.
Use encryption to protect your network. WEP or Wireless Encryption Protocol is not secure, I have cracked my own network with a Linux machine running Kismet. WEP's keylength is only 40 bits, once you collect enough data from packets its only a matter of time for a determined cracker.Instead use WPA which is WI-Fi protected access. This is more secure.
Configure your router to block incoming outgoing traffic you do not use. Consider blocking Port 23 Telnet and Even FTP.
Router manafacturers have default passwords which I find many home users do not change. CHANGE THEM!
Invest in a software firewall and keep your system up to date. In the month of October 2005 there have been several security flaws listed by Microsoft. Keep Informed.
Security Process
Asset and Risk Based INFOSEC lifecycle.
To implement a comprehensive security plan in I.T. and strategies for risk management.
What is CIA?
Confidentiality, Integrity, and Availability
Confidentiality- making sure your data is available to only those allowed.
Integrity- making sure your data has not been altered in any way. Think bank transactions or chemical formulas.
Availability- making sure your data is available. Hackers often use denial of services attacks to bring down your servers or networks by overloading them with packets.
Hackers use attack trees to determine every possible entrance into your networks. This can be through modems connected to your network, routers, switches, and application vulnerabilities, almost anything connected to your internet.
Make it difficult to determine your OS, which hackers use for Banner Grabbing. This is a simple fix that many systems administrators leave.
Change your banner to display a security warning.
Many people have difficulty understanding security processes alone implementing solutions.
What is SMIRA? Simple methodology for INFOSEC based risk assessment.
Risk management is the practice and process of identifying threats and vulnerabilities to assets. This helps making the correct decisions to implement the necessary safeguards to help your organization carry out its mission.
Organizations should look at threats, vulnerabilities, assets and safeguards.
Risk Assessment
The goal is to have a list of your critical assets. Critical in understanding mission, objectives and operations and what if scenarios.
Then to implement safeguards to protect those assets.
Vulnerability Assessment
This is when you look for vulnerabilities in existing applications and determine there severity. The vulnerabilities will be rated. This includes physical security, web application reviews, policy and procedure reviews, host assessments and OS reviews, and vulnerability scans.
Threat Assessment
This is the process, of identifying existing and potential threats to assets and environments. This will also be based on severity.Where can threats come from? Disgruntled employees, script kiddies, hackers, crackers, foreign governments, and your competition. You can look for threat indicators in your server, logs, CCTV, intrusion detection systems like SNORT. http://www.snort.org
What can threats cause?
Loss of businessDeathFinancial lossCorruption of data.Inability to work, servers down or running slowly.Confidentiality issues.
What are assets?
User IT OperationsStaff Connectivity DocumentationSecurity SystemsThird partiesPaperFilesMedia, like disk, CD’s and USB drives.File, Web, EMAIL, Storage, Application serversAnything of value to the company.
Hackers like to get there hands on all information no matter how unimportant it may seem it can be used to filter out more information.
How do you protect yourself against threats and protect your assets?
Have policies and procedures in place.
Employee awareness of security issues.
Software security in place
Hardware security in place.
Physical security.
Environmental Security. I.e. water level sensors.
Communication security- to protect your phone lines, and PBX systems.
Personnel security.
There is a lot of software on the internet that allows even technically challenged people to run scans on your systems to try to crack them. Anybody that knows how to search Google can easily find such tools. The way the Internet is evolving and more and more people joining the Internet the security risks increase.
Attackers gain information on your systems by doing Domain Lookups with Whois. Port scans using many available tools to find out what you’re running and then do internet searches to find exploit code to crack your systems. Once they find out what applications you’re running it’s only a matter of time before they can crack your systems if you are not protected.
Attackers like to get information on your Domain Names, IP addresses, then they will scan your network looking for live hosts. This can be accomplished with tools like NMAP by Fyodor http://www.nmap.com . By using a tool like NMAP you can send UDP, ICMP, and TCP packets.
This is done to identify host by looking at responses. At this point attackers find out what applications are being used, or any information the host is willing to give out. The more services you have running the more opportunities for someone to remotely exploit your hosts. This can be very time consuming for the attacker. The goal is to find out what OS platforms are being run. Are they Unix, Microsoft Windows or Apple Mac OS? From here it easy much easier for someone to look for shellcode to use against your system.
Wednesday, November 16, 2005
Sony BMG Spyware
F-secure and Symantec have put out updates to remove this spyware.
Home Computer Security
The goal of computer security is to keep unauthorized users from using your resources. This can be anything from your computer to your printer or even your web camera. Detection is another important aspect that should be monitored as well.I often get asked "Why should I worry?"
Maybe you shouldn’t. If you are concerned about any of your files or the possibility of losing them you should care. There is also online banking that many people use to watch their accounts. Malicious users can also use your computer to launch attacks against other networks, or put files on your computer as a means of storage. Even if you have the computer just to send email to Grandma don’t think that you are not at risk. Attackers like to hide there tracks by jumping thru multiple locations such as your computer.
Malicious users can take over your webcam and watch and even listen to you!Attackers like to use multiple systems to launch denial of service attacks-sending tons of packets to bring a network to its knees.
Identity theft is huge right now. Your credit report should be reviewed frequently. Identity thieves can gain allot of information from your home computers. FTC said there are approximately over 10 million victims a year. If your ID is stolen or think it is visit www.consumer.gov/idetheft. Never send out your personal information in email it is not secured.The risk is getting greater daily as more people connect to the Internet. Script Kiddies download tools that make breaking into computers as easy as pressing a button. Security patches are offered thru vendors but most people do not bother to patch there systems or have the time.Do people in your household use file sharing programs? I cannot believe the amount of Spy ware and viruses that are hidden in some of those files. I removed over 600 different Malwares from a home computer who thought they were just downloading music.
The system was always freezing and changing homepages in Internet Explorer. Not to mention these file sharing programs can be sharing your financial data, medical records, secret recipes or your last tax return.Key loggers can be on your system recording every keystroke and emailing it to an attacker, enemy or even your spouse. This includes IM's, Emails, and passwords anything.
There are Anti-Virus software that will detect most of these programs.Anti-Spyware can also detect allot of MalWare or malicious code.
Use strong passwords that are alphanumeric or use a password strength tool. I would not use anything in a dictionary American or Foreign as those can be cracked easily thru Brute Force.
Don’t use the same password for every account. Change your passwords regularly, and don’t write them down.I recommend making regular backups of at a minimum your critical system files. Back up to a CDR to ensure that your data cannot be overwritten.
Please monitor your children’s surfing habits and teach them about the dangers of the Internet.
I recommend installing filtering software to keep their curious minds out of the wrong sites.Staying abreast of Anti-Virus updates.Don’t open email attachments that can contain viruses or other malware.
Don’t run programs if you don’t know where they came from than can have Trojan horses. Trojan Horse is a program that appears to be a regular program such as Solitaire buts its actually sending your bank account information to an email address. Attackers can also take over your computer have .mp3 file ran at 3AM in the morning to scare you, even open and close your CD-DRIVE door.
Disable JAVA, JavaScript and Active X
Keep up to date on patching your operating systems and applications. In Windows you can set up automatic updates. You can also visit the Windows Update site.
Microsoft releases patches even second Tuesday of the month this is known in IT as black Tuesday, there is always allot of patches. Upgrade to Service Pack 2.
Internet Explorer always has security issues.
There are Open Source browsers like Firefox http://www.firefox.org which is a great browser and has more security feautures. Firefox has allot of great add ons as well that can make researching more effective amongst other utilities
Disable scripting in emailEnable NAT Network Address Translation on your router. This will hide your private IP address from the Internet. While still allowing computers to access the Internet. Most network firewalls have IP NAT masquerading where multiple device on the Internet appear as one IP address.Make sure you are not enabling shares on your computer for any of your drives. This will look like a hand holding a drive in Microsoft Windows.
Be aware of Phishing these are Internet Con-Artist looking to catch a some fish. Emails are sent that look like Bank Emails, Amazon and PayPal, it amazes me how many people I work with think its the real thing.If your considered about security consider encryption. For Home users look into PGP or Pretty Good Privacy to secure your email, you can even encrypt your hard drive.When you think you have deleted your files they are still retrievable consider a file wiping utility.
Use a Surge Protector.
No firewall can stop all attacks.
Article I wrote on Firewalls
can ruin you and your businesses reputation.
This is a paper about firewalls protecting your company from outside threats and unauthorized access.
A firewall is a great start. Firewalls can be both hardware and software based. There are many different firewall vendors some of the bigger names are Cisco, Symantec, and Checkpoint. The difficult part is configuring the firewall.This is where many intruders bypass security, because the firewall is poorly
configured.
I would like to mention that there are many Open Source programs and operating systems that offer great firewall software. I personally believe that OpenBSD has one of the most secure operating systems and firewall configurations if done right. FreeBSD also has firewall software, it is called IPTABLES.IPTABLES offers packet filtering, NAT and you can even change packets in Linux. I have to say you can do anything you want in Linux, because the source code is right
there. It’s a beautiful thing. Linux also uses this; you can build a firewall with the old system sitting in your garage and two Linux compatible network cards.Linux can be hardened, this means to make the operating system more secure. I like the tool Bastille Linux its is developed by Jeff Beale.
To really get a grasp on firewalls you need to understand TCP/IP and allot of different protocols to know if you should allow or deny them into your network. IP addresses identify hosts on the Internet they look like this 127.214.234.54. Firewalls can block IP addresses, ports, protocols and even keywords that come into packets. Hackers that want into you network have many different tools at their disposal to try to bypass firewalls. One common attack is known as
Denial Of Service or DOS attacks. The attacker simply floods your network, firewalls with so many packets that it cannot handle them and sometimes crashes. Firewalls are available with DOS filtering to keep these attacks low, and start dropping packets.
Firewalls do not protect you from internal threats such as employees bringing in viruses from home. Or remote users using VPN's (virtual Private Networks) bypassing your firewall. Think about if you bring your son to work and he downloads music on your fast company internet connection only to introduce your corporate network with a worm or even worst a Trojan horse. Service ports that are open to the public such as Port 80 HTTP, have know vulnerabilities on the Internet. FTP has many vulnerabilities as well.
Are there different types of firewalls?
Yes. There are hardware and software firewalls. You might be even using Zone Alarm or Black Ice Defender. These are software based firewalls, the more I
study firewall technology I realize that everything truly is a software firewall. A computer is nothing without software to tell it what to do.
Packet Filters
Packet Filters look at source and destination addresses. This is where firewall rule sets come in to play. The firewall administrator must determine which source and destination ports and addresses to allow or deny. The security administrator needs to keep up to date with alerts on vulnerabilities as new holes are found and created daily. A technique known as spoofing can sometimes fool firewalls but making it appear that a packet is coming from inside the protected
network when in fact it is an attacker changing the source address.
Application Gateways
Application Gateways are like errand boys. You request a file and the application gateway grabs it for you.This is great for logging connections, and setting
up authentication as well.
Statefull Packet Inspection
Statefull Packet Inspection is a technique used by Cisco PIX firewalls and Checkpoint Firewalls these firewalls look at the data coming across the network.It can also authenticate connections, users can usually not notice that the firewall is in place. Allot of firewalls now allow you to configure VPN's which is awesome if you have remote workers and satellite offices and need to transfer data securely.
Intrusion Detection is also something to consider, I like SNORT. SNORT can detect known attacks against your system and does a great job at logging them if set up correctly. There are thousands of different software and hardware solutions you can purchase for you home or network. I happen to like Open Source, because I like learning and knowledge and the Open Source community has taught me more than the corporate world ever will. A book I would like to recommend that is great for learning about firewalls is called simply enough Building Internet Firewalls, it is by O'reilly. That is all for now. One last tip, backup, backup, backup.
Tuesday, November 15, 2005
WEP VS WPA
Steve Gibson weighs in on WPA-PSK keys by ZDNet's George Ou -- Brute forcing cryptographic keys is only interesting from a top secret or academic standpoint. Brute forcing a random 8 character alphanumeric WPA-PSK key for a home is a fool's errand because there are infinitely cheaper and easier ways to penetrate a home network by some other means.
Thursday, November 10, 2005
Look out Network Admins
Time to patch your Cisco routers by ZDNet's George Ou -- While Cisco isn't alone in upgrade complexity, the end result is that most end users never patch their routers and switches and just assume they never needs patching. This probably won't change until a conventional PC worm makes the jump to attack IOS vulnerabilities and causes massive damage.
Friday, November 04, 2005
Windows 2000 Security
By Benjamin Hargis
I was asked recently to go to a car dealership and do a security analysis on their Windows Server 2000 machine.
This is what I recommend doing to any Windows 2000 machine where applicable.
Make sure that the guest account is disabled. It comes disabled by default.
A problem I notice allot is when I go to companies, lots of accounts are still active for employees who no longer work there. They should be removed when the employee is terminated or leaves on their own accord. Disgruntled employees have been known to wreck havoc.
Group policies can and should be implemented in a Windows 2000 environment and audited to make sure there are no extra accounts or accounts with weak passwords.
Password security is also important; if your password is weak it will be cracked. I have been in companies where your password is your initials. That is to simple. Implement password policies and account lockouts after multiple failed login attempts. WARNING this can create a denial of service attack. Create multiple admin accounts and give them different rights. A strong password policy for administrative tasks.
Run Net Share from the command line to view open shares on your network and shut those down unless needed.
Go into the BIOS and set a user password and disable the ability to boot from a floppy, USB, or CD. People can easily grab the SAM file which is a password hash stored on your system from a Linux boot CD or other tools. Then attempt to crack the hash.
Change the administrator account to a different name. That is usually a crackers first attempt. Rename it to something other than root as well.
Use NTFS on all partitions this gives you more control and security than using the FAT file system.
Make sure that the "Everyone" permission is not allowed on your resources, directories, etc.
Have the last user logged on turned off. This makes it easier for an attacker to guess passwords. There already half way there the have the username.
Apply appropriate access control lists.
Don’t forget about the people around you and either lock your workstation when you leave or have a screensaver enabled with a strong password. Insider threats are a reality.
You can enable EFS encryption file system; you can encrypt whole directories as well. I suggest if your really paranoid or smart to look into a utility that allows you to choose different encryption algorithms. I do not like encryption standards that are closed. Meaning we cant see the source code. I prefer open source its easier to look for holes and attacks.
Make backups of all your important files. This is the most important thing I learned in System Administration. Backup, Backup, Backup to something that cannot be overwritten such as a CD-R.
To configure Security Policies use the Security Configuration Toolset you can make your job allot simpler by using snap-ins.
I visited Microsoft’s site to see everything they had, I have to say there is plenty of information.
Shut down services that are not needed. The more ports that are open and the more applications running the more avenues of attack.
Restrict access to Local Security Authority only to admin.
Change log in warning to something like. Authorized Personnel only, "all activities are logged and monitored. Violators will be prosecuted to the fullest extent of the law."
Shut down individual ports, that are not used.
I personally like smartcards for two form authentication. I recommend RSA secure ID for machines that need more security.
Enable auditing to track what users and possible intruders are doing on your system.
Everything from login attempts to access of objects can be audited in Windows 2000.
Protect the registry from anonymous access.
Make sure the audit logs are locked down so they cannot be erased, or tampered with. Only the admin should have rights to these files.
Install service packs.
Make sure that your antivirus is up to date with the latest signatures.
Run a Spy-Ware utility.
You can also run an online vulnerability checker such as Shields Up by Gibson Research.
Get automated patch software.
Remember that security is not something that can be finished. Keep up to date.
Benjamin Hargis CEO & MCP
Phuture Networks
Visit us on the web! http://www.phuturenetworks.com
Article Source: http://EzineArticles.com/
Thursday, November 03, 2005
Free Micorsoft Security Toolkit
Wednesday, November 02, 2005
A great article on Spyware definitions
Spyware definitions released by ZDNet's Suzi Turner -- The Anti-Spyware Coalition (ASC) released their definitions of spyware today, available at the website. The document includes a table of technologies that could be classified as spyware, depending on factors including control, notice and consent. Another document (PDF) is available, with a summary of the nearly 400 public comments and the ASC's response. The coalition also outlined their [...]
I liked this article and thought it provided good information.
Google Base
Google Base: What might Google be up to? by ZDNet's Garett Rogers -- Google is smart, they know what they want, and more importantly they know what people want. The answer to both is "information" and "money". Looking at both of these "wants", they must decide how they can do this and stick to their "do no evil" guns.
Google has alot of information this is a good thing but also a concern about privacy. I like Google, they have great technology and I cant wait to see whats going to happen know that they are partnered with one of my favoite companies Sun Microsystems.
Monday, October 24, 2005
Open Source Firewall Scripts
Service Pack 2 For Micorosft Exchange Server Released
Friday, October 21, 2005
Microsoft Security
Ezine Directory
Wednesday, October 19, 2005
LISA '05
Tuesday, October 18, 2005
Website Development
Thursday, October 13, 2005
Microsoft releases new security product.
Wednesday, October 12, 2005
Phuture News
Its a UNIX operating system based on the BSD Berkely System Development kernel.It works on Pentium x86 and RISC based processors also Alpha Chips.Unix was designed by Dennis Ritchie and Ken Thompson. I've been working on my website and analyzing good keywords for more traffic. I own a computer security consulting business. It's called Phuture Networks. We can also perform search engine optimization and do consulting on hardware and software. Currently reading alot of psychology and talking to my friend about affiliates.
Friday, September 30, 2005
My company website
Ive been real busy lately studying books for MBA, learning all I can about marketing prospecting, search engine optimization.Its awesome. I got my IPOD Nano, I love it it is well designed and simplistic the way hardware and software should be. My time and life is consunmed with devouring material on finances, real estate, technology and girlfriend. I love educating myself college taught me to learn and I can cover more material on my own rather than class. I will be enrolling back into college to pursue degrees.
Wednesday, September 14, 2005
Organic Search Engine Results
Saturday, September 10, 2005
Real Estate Technology Analyst
Skills in Search Engine Optimization, Page Rank, Link Popularity, SEO, PPC, drip systems.
Familiar with Multiple Listing Services, and paid directories.
Website optimization for search engines: HTML, site structure, and page layout issues.
Identify and implement strategies for increasing traffic through organic search listings without creating the risk of sites being blacklisted.
Tracking and Reporting
Continually monitor organic search rankings to maximize traffic and sales
Keyword research including cataloging and indexing target keyword phrases
Keyword research using Word Tracker, Overture, Google and internal tools
Plans, organizes, and implements sales programs for the region. Coordinate directly with outside sales reps. Responsible for marketing and booking appointments for outside sales reps.
Provide realtors with product and service information to assist them in determining appropriate website, e-marketing and hosting solutions
Tuesday, September 06, 2005
Basic Astronomy

Hipparchus came up with magnitude
The moon is 240,000 miles away.
Ptolemy is one of the most famous astronomers.
Nova means new in Latin.
Kepler's three laws of planetary motion.
1. Planets move ecliptically (egg shaped)
2. Planets do not move at constant speeds but speed up when closer to the sun.
3. A closer planet moves faster than one that is farther than the sun.
Hans Lippershy built first telescope.
Newton- gravitation, nature of light, color, calculus.
Sunday, September 04, 2005
Labor Day Weekend
Friday, September 02, 2005
Python
Python is an interpreted, interactive, object-oriented programming language. It is often compared to Tcl, Perl, Scheme or Java.
Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing. There are interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac, MFC). New built-in modules are easily written in C or C++. Python is also usable as an extension language for applications that need a programmable interface.
The Python implementation is portable: it runs on many brands of UNIX, on Windows, OS/2, Mac, Amiga, and many other platforms. If your favorite system isn't listed here, it may still be supported, if there's a C compiler for it. Ask around on news:comp.lang.python -- or just try compiling Python yourself.
Many of Google's engineers code in Python.
Friday Before Labor Day.
Wednesday, August 31, 2005
Open Source Security
Tuesday, August 30, 2005
Blog Testing
FreeWebSubmission.com
Sunday, August 28, 2005
Things I did over the weekend.
I reviewed some Python source code for a program that you can craft packets to contain a source port and destination port of your liking as well as put in the payload of your choice. More research on buffer overflows and how memory is arranged.
Zen- To really live in the moment and focus, concentrate extensively on that second or what your doing. I have been playing Xbox quite a bit this weekend as well. Planning to set up a *nix server.
Saturday, August 20, 2005
Current Books

I started reading many books today after visiting my local library, they include Secrets of Executive Success, which has 56 chapters on business tactics and strategies, enjoyable reading so far.
The Radio Amateurs handbook. So far I've learned that Marconi invented radio. Nuclear fission is splitting atoms. Batteries produce DC current and all dry cells produce 1.5 v. Although Lithium batteries produce 3 volts and have a 10 year shelf life.
Zen Mind a book about Zen meditation and practice. This book has really got me thinking about my way of thinking :)
Power and influence (Mastering the art of persuasion) I got this book to learn how to get more sales and business appointments. I quote my sister as she told me "it's just common sense, i dont understand why your read those books."
Beside that it is Saturday night, and Im reading and anxious to set up my Linux box in the living room tommorow.
Thursday, August 18, 2005
What's New

It seems that there are new worms floating around the net. Rbot and zotob.d it seems they are bots. Virus writers are having wars with each other right now. These exploit plug and pray vulnerability. Here is a technical description http://www.f-secure.com/weblog/#00000553
The new issue of Insecure magazine is out. This magazine is awesome: http://www.insecuremag.com/.
The article I found particularly intriguing was how easily a PDA could create a backdoor into your network. IT should be more stringent with PDA access inside the corporation.
I received the new catalog from http://www.tektronix.com tools from measurements good for signal analysis.
Wednesday, August 17, 2005
Motorola V330

Overall Im pretty impressed with this phone, I enjoy the capability to take pictures and record video. I like the fact it uses Java. I want to see the source code on my phone. The picture is sharp and clear on the screen. The animations even look good.
On a different note, I purchased a used XBOX, with Tom Clancys Splinter Cell, Im still getting used to the controls, but am moving right along.
Monday, August 15, 2005
Technology addiction
Wednesday, August 10, 2005
Another day gone.

I dont know if it is that Im getting older, but the things I used to consider cool or important are not. The only thing that seems to matter now are 1)God 2)Family 3)My Lady 4)Friends 5)books. All I want to do is learn and be a good son, boyfriend and friend. I had a good day today. Work was the same as usual. I cant wait to get a Motorola V330, XBOX and IPOD these are the toys I want currently. Im such a technology geek, its an expensive habit, but at least its not drugs :)
Tuesday, August 09, 2005
Open SSH

This is a free version of Secure Shell, you should use this to encrypt all traffic going over your network. For instance I can create a VPN from my workstation to my server at home without having to worry that my information is going out plain text i.e. Telnet. You can securley issue commands, transfer files and monitor your servers.
Open BSD

This is a Secure Unix operating system, it is constanly being audited. There are about twelve developers who go over the source continiously to search for more holes. It is secure by default with most services disabled to begin with. Personally I would run this OS if I had a ISP or hosting ccompany.
NMAP- Open source scanner
My Public PGP key
-----BEGIN PGP PUBLIC KEY BLOCK-----Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com/>
mQGiBELe6ZQRBADDy9X6cILqN8Pea6CNhq7ShbR4Xqy7YvqWyRGf0w8G/RCHkEB+ejEccXy
ThyFJvFKpTgkayY6i/Aomnj6g5a4iIwy4C7fTqrPcXsFxtT5GxzktYwFmGfDDjaoDFqju5FpB1b7w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i
utapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33TGSGSfgMg71l6RfUodNQ+
PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBhznzJZv8V+bv9kV7HAarTW56NoKVyOt
Qa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy
4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsC
RtMIPWakXUGfnHy9iUsiGSa6q6Jew1XrPdYXAAICD/9IBbk/+K6TpPOWE44u5ftJ6q+EUXqf
p8ei/8uyxD908pemOmavxHpBdHq0e2Y9eD0eNYvNuLiBLQsr9TPlCtI+SRHj950cbp9sNIFxt
UeygiB6VJzt7SoWnxaTB3e9P94/WSfY1gId/Ug7HvMHRVbHf08L1SdPkguubV8SQcvc/KarFtk
Buu9g7OdvDZFrALhciX27o3FW+dZ6/tTq9yxnY97bRBLhyD4wzXnoaY08Yd0CM4dfTN390uN
2Z5rcfWhpKWsJ8ry/TQ7TdcJluE6CCbRaQRupeh6SAaSpHL+y6iBOL8i+YXa6tLjCuxHfM2am
i7L5H0o1Mr1NiQl2yZCcV7DB4uPDPF6og6TNQVy5M2WmOYB9aSBBtJXb2H8WRjUEjCChQO
EnkMdLnDEhpGzpdlfX+pI3t463H/jtdgZzRMUyy36pEVlnRdOLhyV0nnQXu1PiZJWkePWWS0
DdfSX84QVqbnCsmMYFIGHseQwf5vfZHVUnI5TMpfq1gjAVzqkBzadHH54GxXVBC2oLN7J8+
DlyrESqgySOpzqumZrw1++oYJqEyefC3PrVviu0gRKgkl0kkDTwq6qpOVSC0vpIju7B0xjuT+47
0nw/OKHPv8lwUBOGNmyQQ5KZre7Tu40HiggSbQOnXLyUKoO7MbEINsgspOUdSr1w+74oQ
53ybYkARgQYEQIABgUCQt7plAAKCRBAwsuN8euVp+bGAKDE+7yTowV6VMh/L1UEae3qkL
JCXgCfdrKSJbD7llBeladW6eikcgaFko0==JnsO-----END PGP PUBLIC KEY BLOCK-----
Monday, August 08, 2005
A good weekend.
Friday, August 05, 2005
Open Source Solutions

Companies could save up to 90% on their database TCO by using MySQL, instead of Microsoft products. It is the fastest growing database in the industry. Its reliable and fast to deploy and fully customizable. Check it out here http://www.mysql.com.
Thursday, August 04, 2005
Links
http://www.freqofnature.com/
http://www.radioreference.com/
http://www.cityfreq.com/ca/orange/
Computer:
http://undeadly.org/
http://sagewire.sage.org/
http://www.f-secure.com/weblog/#00000553
http://www.procata.com/blog/archives/2005/05/10/expert-programmers/
http://technet.microsoft.com/default.aspx
http://www.sun.com/
http://slashdot.org/
http://www.newsforge.com/
http://www.unixreview.com/
http://www.43folders.com/