Wednesday 26 November 2008
Using E-mail at Risk
Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.
Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.
Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.
Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.
Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.
Using E-mail at Risk
Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.
Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.
Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.
Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.
Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.
Using E-mail at Risk
Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.
Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.
Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.
Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.
Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.
Lenovo Thinkpad X300 is an ultraportable masterpiece
Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.
It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.
Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.
On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.
When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.
Additionally, the DVD burner powers off when not in use to conserve battery life.
For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.
Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.
Conclusion
Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.
Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive.
Ultraportable notebook
Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg
Lenovo Thinkpad X300 is an ultraportable masterpiece
Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.
It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.
Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.
On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.
When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.
Additionally, the DVD burner powers off when not in use to conserve battery life.
For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.
Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.
Conclusion
Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.
Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive.
Ultraportable notebook
Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg
Lenovo Thinkpad X300 is an ultraportable masterpiece
Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.
It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.
Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.
On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.
When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.
Additionally, the DVD burner powers off when not in use to conserve battery life.
For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.
Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.
Conclusion
Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.
Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive.
Ultraportable notebook
Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg
Monday 24 November 2008
WiMAX Roaming Check List
As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
Identify and contact roaming partners.
Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
Establish connectivity with roaming partner.
Test roaming service (Test Plan).
Begin service.
WiMAX Roaming Check List
As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
Identify and contact roaming partners.
Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
Establish connectivity with roaming partner.
Test roaming service (Test Plan).
Begin service.
WiMAX Roaming Check List
As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
Identify and contact roaming partners.
Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
Establish connectivity with roaming partner.
Test roaming service (Test Plan).
Begin service.
Introduction to Basic Router Definition
Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).
Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.
mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#
Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.
adios,
Introduction to Basic Router Definition
Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).
Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.
mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#
Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.
adios,
Introduction to Basic Router Definition
Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).
Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.
mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#
Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.
adios,
Wednesday 19 November 2008
Motorola vs Aruba - Patent infringement
I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.
1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys
Motorola vs Aruba - Patent infringement
I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.
1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys
Motorola vs Aruba - Patent infringement
I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.
1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys
Sunday 9 November 2008
Overview of Dynamic NAC Features
. Compliant PC’s act like “Neighborhood Watch”
. The existing normal PC’s become the infrastructure (enforcers) to quarantine rogues
. Enforcers manage ARP to control and limit a Rogue ability to send/receive traffic on the network
. Enforcers watch for new endpoints, using ARP redirection to protect the network and community
DNAC Strengths
. Zero network upgrades or changes (Low TCO)
. Scales cost effectively across multiple subnets
. Authentication agnostic (Windows Domain, 802.1x, other)
. Friendly fail-open design
. Extremely responsive quarantine and remediation mechanisms
Traditional Infrastructure based | Software based | |||
In-line NAC | Cisco NAC V1 V2 802.1x NAC | Host based NAC (CAF) | Dynamic NAC | |
Enforcement Type | Appliance in line | Switch based | Client Self enforcement | Other compliant PC’s |
Supports LAN Enforcement | Yes – but requires multiple appliances | YES | YES | YES |
Supports Remote Access VPN’s | YES | NO | YES | NO |
Network needs Re-architecting | YES | Extensive | None | None |
Detects Rogue Users \ Devices | NO | YES | NO | YES |
DNAC | DNAC + 802.1x authentication | Infrastructure NAC | |
Client Software | DNAC Client | DNAC Client + Supplicant | NAC client + |
Server Software | Policy server | RADIUS server + policy server | RADIUS server + |
Minimum switch requirements | - | 802.1x authentication | 802.1x authentication |
Ongoing port config | - | Config 802.1x ports | Config 802.1x ports |
Ongoing switch config | - | - | New VLAN and subnet, router ACL, DHCP, RADIUS |
One time network Reconfiguration | - | - | New VLANs and subnets, router ACL, DHCP, RADIUS, RADIUS VLAN assignment |