- [2:50]
DEMO: Dynamics CRM
Thursday, September 24, 2015
So Much to Watch - So Little Time!
Tuesday, March 17, 2015
Live Virtual Event Coming Soon on Security & the Cloud
Thursday, July 10, 2014
Throwback Thursday: Sessions from TechEd Houston
- TWC: Hacker's Perspective on Your Windows Infrastructure: Mandatory Check List (DCIM-B366)
- Windows 8 Security Internals (WIN-B350)
- Real-World Windows 8.1 Deployment Note from the Field (WIN-B358)
- Providing SaaS Single Sign-on with Microsoft Azure Active Directory (PCIT-B326)
- Delivering Disaster Recovery Solutions Using Windows Server 2012 R2, Microsoft System Center 2012 R2 and Microsoft Azure (DCIM-B421)
- How IPv6 Impacts Private Cloud Deployments (DCIM-B373)
- Windows Server 2003 End of Life Migration Planning for Your Workloads (DCIM-B376)
- Upgrading Active Directory the Safe Way: Using Virtualization Technologies (PCIT-B341)
Tuesday, October 9, 2012
October is National Cyber Security Month
Visit the STOP. THINK. CONNECT. campaign or Microsoft's Cyber Security web page for tips on staying aware and secure online.
Check out my previous security posts for some of my thoughts on cyber security. What are your recommendations for friends and family when they ask you about online security?
Monday, April 30, 2012
Upcoming May Events - Password Stealing; Windows Deployment
Date/Time: Tuesday, May 8, 2012 - 6:30pm
Topic: Sam Bowne - CCSF Professor and CISSP will be presenting on Stealing Passwords Remotely & Malware Analysis. Join us to hear Sam talk about Stealing Passwords Remotely & Malware Analysis - it should be a great technical security discussion meeting where you can ask questions and hear some interesting things about Malware and password security.
Please remember to RSVP if you'll be attending.
Also a few upcoming events from Microsoft -
TechNet Webcast: Everything You Wanted to Know and Ask about Windows Deployment (Part 1)
Registration URL: http://go.microsoft.com/?linkid=9807963 or http://bit.ly/JLTQLM
Date/ Time: Tuesday, May 15, 2012 - 9-10am (Pacific)
Abstract: In this demonstration-rich, question and answer webcast, Windows Product Manager Stephen Rose moderates an open conversation with Microsoft Deployment Toolkit Product Manager Michael Niehaus and deployment guru Johan Arwidmark. They discuss the new Microsoft Deployment Toolkit 2012 release as well as tips and tricks from the experts about using the Windows Deployment Toolkit.
TechNet Webcast: Everything You Wanted to Know and Ask about Windows Deployment (Part 2)
Registration URL: http://go.microsoft.com/?linkid=9807964 or http://bit.ly/Kgny8y
Date/ Time: Thursday, May 17, 2012 - 9-10am (Pacific)
Abstract: In this demonstration-rich, question and answer webcast, Windows Product Manager Stephen Rose moderates an open conversation with Microsoft Deployment Toolkit Product Manager Michael Niehaus and deployment guru Johan Arwidmark. They discuss the new Microsoft Deployment Toolkit 2012 release as well as tips and tricks from the experts about using the Windows Deployment Toolkit.
Friday, July 29, 2011
The Country Code for Nigeria is 234
We all know about the long running Nigerian email scams, the ones where some "Prince" of some "Small Country" has cash he can't access and wants to give you a nice cut if you can front him a couple thousand dollars via Western Union. I guess people have finally caught onto that one, because now the new big Nigerian scam is renting you a place they don't own via Craigslist or some other source for rental listings.
A friend of mine has been looking for a reasonably priced rental in the Bay Area and sent off a few inquires to some nearly "too good to be true" listings. He recieved three practically identical emails in return, from three different "gentlemen", with only the property address, dollar amounts and contact phone numbers differing.
They weren't asking for cash with the first email, but required an odd rental application form to be returned for approval. The emails also had several other characteristics that smell of a farce. See for yourself.
Thanks for the email. My name is Thomas Hough the owner of the 1 Bedroom Apartment you are making inquiry of, I've had so many responses so far,however it is still available but I do have one person who is ahead of you. I'll rent it to whoever puts down the deposit .Rent includes water and garbage. My company sent me overseas and will probably be between Africa, India and the UK for another year or so. The last tenants I had just moved out and my family and friends all live on the east coast so I don't have anyone available to show the place but I can send you pictures of the inside but will have to ship you the keys and papers.
Here is the address:[property address removed]...Ready for immediate move-in!You can drive down there to take a look at it...i will be willing to rent my home out for the maximum of 5 years and below.I personally had wanted to sell the Apartment earlier on.But after long time deliberation between me and my wife Sarah we finally agreed on renting out the Home, because it was initially to be sold. But I really want you to take good care of the Apartment, as if it were your own home.I would want to know how soon you would want to move in, as I will be taking a 1 or 2 month upfront payment which mean the first and last months you will be staying in the Apartment including some utilities (Water, Internet and Garbage). I am asking for $670 1 month upfront payment and if you can pay $1340 for 2months you will be getting a 1 month rent free. I believe we should be able to help ourselves. including utilities because I want you to take a very good care of the Apartment while I am away.
i will like you to go ahead and fill out the rent application form so that will can proceed further and discuss on how to get the the keys and papers sent to you via Dhl or ups e.t.c, also are you ready to rent it now or when?.So here is the Rent Application Form Below..
========= RENT APPLICATION FORM ============
PRIVATE & CONFIDENTIAL
Also,Pls answer these questions below:
1)Your Full Name______________________________________
2)Present Address(where you reside now) & PhoneNumber______________________________
3)How old are you _____________________________
4)Are you married ______________________________ _____
5)How many people will be living in the Home___________________________
6)Do you have a pet _________________________________________
7)Do you have a car __________________________________________
8)Occupation _________________________________________________
9)How long are you willing to stay _________________________________________
10)When do you intend to move in _________________________________________
11)1 month Or 2 month deposit needed______________________________________
12) Pictures of all the Occupant that will stay in my Home______________________________________
Pet allowed.
I will use the information above to prepare the rental agreement , rent receipts and other documents. Make sure the correct information is type.Do reply with your both cell & Apartment number i am going to call you if your application form has been accepted or call me after filling the rental application form. A package containing the housing documents, property address with full description. Including the direction to the place and keys will be ship to you once you both agreed with the term and condition. Call me once you fill out the application form.Here is my contact number: +234-708-289-7758 or 011234-708-289-7758 i will be expecting your call to know how serious you are in renting my Home
Thanks & God Bless
Here are my redflags:
- Weird use of capitalization and puctuation, like with "1 Bedroom Apartment" and no spacing after commas, etc.
- Claiming to live overseas and having no one to show the place - Really? You've owned a home and don't even know a neighbor? Haven't heard of a property management company?
- "I believe we should be able to help ourselves." - Huh? Writing generally has strange phrasing not uncommon to someone who's not great of writing or speaking English.
- Weird text-based "rental application" - Most legit landlords will send a PDF version of a standard application, with questions geared so they can run a proper background or credit check. How old are you? Are you married? Do you have a car? How long are you willing to stay? Pictures of all the Occupants? - I don't even know where to begin.
- Nigerian contact phone number - Um, yeah. That's a big one.
- Property Address (which I removed for this post) - A quick internet search of the property address shows that this place is listed on the MLS for sale. It includes several photographs, including the exterior shot that the scammer sent with this email.
This only happens because it's worth it to scammer. Enough people list out their pet names, attach a family photo and don't give a thought about how odd it is that they are potentially renting a place based on a couple photos and some guy who claims he wants you to "take care of the Apartment like it were your own Home." Clearly, it's lucrative enough to keep doing and that's a real shame.
Stay safe out there and if you come across listings like this be sure to report them to the host of rental listing site so they can be removed.
Friday, February 18, 2011
Check out the Malware Response Guide
I think the structure is well thought out and very logical. One can easily switch to the course of action that fits the needs of the user and the organization, as well as follow the instructions for preparing an offline scanning kit. I also appreciate the recommendations for additional reading so that I can go more in depth for the products I'm using.
While this guide likely won't change my organizations use of a third-party solution at this time, it greatly complements it by providing other tools from Microsoft that can support my existing tools, or give me an alternate set of tools if my vendor isn't as quick to produce a particular solution for new malware.
I think this guide shows that Microsoft is willing to support systems in all types of scenarios and the information is not written to exclude organizations who aren't committed to only Microsoft software. It provides great processes and talking points to bring any organization closer to having a more cohesive malware response plan. Take a moment to download it and check it out.
Monday, December 13, 2010
Upcoming Tech Events in 2011
- TechNet Events Presents: Virtualization 101 - Microsoft Evangelists will talk about the creation of the hypervisor and demonstrate usage scenaros ranging from the home user up to multinational corporations. Discussions will also include how virtualization has given rise to "the Cloud". The event is free and will be in San Francisco on 2/2/11, but check the list for dates in Los Angeles, Irvine, Denver, Portland and others locations on the west coast.
- Data Connectors Tech-Security Conferences - Just like the one-day event I attended a few weeks ago, Data Connectors will be all over the west coast in early 2011. In particular, find it in San Jose, CA on 2/10/11.
- She's Geeky unConference - For all those women who embrace their geekiness, save the date for "She's Geeky Bay Area #4" running January 28-30th.
- Register by 1/21 and snag a free Expo Only pass to the SPTechCon (The SharePoint Technology Conference) in San Francisco February 7-9th. The full event doesn't fall into the "low cost" category, but if SharePoint is your thing, you might want consider more than just the expo.
- RSA 2011 - Another one of my favorites, the "Expo Plus" pass at RSA gets you into the expo hall, the keynotes and one conference session of your choice. RSA will be at the Moscone Center in San Francisco, February 14-18th.
Monday, December 6, 2010
Take Aways from the Data Connectors Tech-Security Conference
Here are some of the stats and tidbits I left with. As some of the themes overlapped throughout the presentations, so I'm not going to attribute each bullet point to a specific presenter. However the presentations were sponsored by the following companies: WatchGuard, Axway, Sourcefire, Top Layer Security, JCS & Associates, Kaspersky Lab, Cyber-Ark, FaceTime and Arora / McAfee. You can learn more about the presentations specifics and download some of the slide decks here on the event agenda page.
End Users
- End users in the workplace expect to have access to the web and popular web applications, however 25% of companies need to update their policies related to web use. Instead of addressing the policy issues, companies simply block access to web applications entirely.
- End users need more education about threats like email scams, pop-ups offering anti-virus solutions, links sent via social media sites, tiny URLs, etc. End users are your biggest threat - often due to error or accidents.
- The average employee spends 3 hours a day doing non-work items on their computer.
- Consider reviewing and improving on your file transfer management practices. How do people share data within your organization and externally? Is it secure and managed?
- Most companies feel secure, but aren't really. Check out http://www.idtheftcenter.org/ for a list of companies that have experienced data breaches. Many companies simply rely on their vendors to declare that they are secure and protected.
- Consider using different vendors to protect your data at different levels. Different vendors use different mechanisms to detect and deter threats.
- As an administrator, you have to review logs on computers, firewalls, servers, etc. This way you are familiar with what is "normal" and can easily recognize potential breaches.
- Consider data encryption as means to enable your company to meet regulation compliance. Encryption technology has evolved and it doesn't have to be as painful as it has been in the past.
- You should patch all your computer regularly - don't forget that your printers, routers and switchers are computers too.
- The top Internet search terms that are likely to lead you to site with malware on it are "screensavers" (51.9% chance of an exploit), "lyrics" (26.3%) and "free" (21.3%).
- In 2009, the Firefox browser had the greatest number of patches and overall, vulnerabilities in applications exceeded operating system vulnerabilities.
- The web browser is the #1 used application, but the patch cycle for browser add-ins is slower than for other applications and operating systems.
- Drive-by downloads are still the #1 way to exploit computers.
Thursday, December 2, 2010
All I Want For Christmas is my Credit Card
Wednesday, October 20, 2010
Blog Highlights for October
Tuesday, October 12, 2010
October is National Cyber Security Month
First, Microsoft has a whole site dedicated to online safety, don't miss out on some tips for creating more secure passwords and using public computers. There are even some great brochures and sheets you can print out and share at the office or with clients.
Also, check out this post by Microsoft's Worldwide Chief Security Officer, Robert Halbheer, on "Is the online world more dangerous?" He provides a link to another great handout that addresses some myths regarding online safety.
Finally, one of the most common ways that people are exposed to online security risks is by clicking on spam. Check out a short post on managing spam by another sysadmin that works in the trenches, The UberGeekGirl.
When it comes down to it, managing your security and safety online is not all that different from managing it everywhere else. You already keep track of your keys and your wallet, you lock your car and your house when you leave, and you don't leave your credit information around for people to grab. Just do the same online - keep track of your passwords, don't stay logged onto web services on public computers, don't click on links that look suspicious in emails or on social networking sites and look to do business with online companies that use secure websites for transactions.
Keep safe everyone, no matter where you are.
Monday, June 14, 2010
Phishing on your Phone
I feel like I should be sending out some kind of chain email, telling you to pass this on to everyone you care about because it’s true. But it is.
Over the weekend, someone pretty close to me received a phone call very early in the morning, claiming to be “Visa” and reporting that his Visa debit card had been deactivated due to fraud and that he needed to provide some information to reactivate it. In the blur of being woken early with a phone call and the confusion about potential fraud, he provided his card number, expiration date and PIN to the automated system.
Clearly this type of thing can happen to anyone, especially when the call comes during the early morning hours, before you might be thinking there are criminals out to get your credit card information. Just remember, your bank will never ask you for your PIN number -they will verify your identity using other information.
Since that early morning, successful phishing attempt, he made a second call to his bank and had the card canceled. Because of the quick action, no misuse of the card number or PIN had occurred.
Also, when in doubt about a call not initiated by you regarding your credit cards, inform the caller that you will call back and ask which department you should be contacting. Then hang up and call the customer service number on the back of your card.
This has been a public service announcement. Stay safe and keep an eye on your wallet.
Thursday, May 27, 2010
Making Copies!
Of course, whenever security is at stake there is a chance to make a little cash with the resolution. Our copier vendor is no exception. I'm not sure if these options have been around for a while or are recent additions, but if you have copiers or the popular network attached copier/printer/scanners, you may want to see if your vendor has similar offerings. These are for Ricoh brand machines and for our leasing plan, these options come with a monthly fee.
DataOverwriteSecurity System (DOSS) Option - To provide enhanced security for our MFPs and printers, Ricoh offers the DataOverwriteSecurity System (DOSS) for its MFP and printer products. DOSS verwrites the sector of the hard drive used for data processing after the completion of each job. During the overwrite process, the data is destroyed to prevent recovery. Additionally, DOSS also offers the option of overwriting the entire hard drive up to nine times. This feature may be used at the end of the lease or if the MFP or printer is moved to another department, and may be added before or after the initial sale.
Hard Drive Encryption Option - The Hard Drive Encryption Option meets international standard “AES 256 CBC” and provides security for information that needs to be stored on the MFP or printer and reused again. Examples of information that may need to be stored for reuse include administrator and user passwords and address books. The Hard Drive Encryption Option differs from DOSS in that the information encrypted is not destroyed, but locked up so only authorized users may access the information.
DOSS destroys data so it cannot be reused. The Hard Drive Encryption Option and DOSS may be used in conjunction and will not interfere with MFP or printer operation. In addtion, Ricoh offers a wide range of network security features such as user authentication, network communication encryption and the ability to close unused network ports.
Go forth and copy.
Wednesday, May 12, 2010
QuickBooks and Software Firewalls
First off, if you are using a third-party product for anti-virus/security/firewall, make sure to disable the Windows firewall. I expected Windows 7 to recognize that a firewall product was installed, but it didn't, thus the OS firewall was conflicting with the settings from the Trend Micro.
Once that hurdle had been crossed, it was time to configure the Trend Micro firewall to let QuickBooks through. I started out creating an exception for the main executiable application, but that didn't do the trick. A little research brought me to this knowledge base article from Intuit that lists out over a dozen file exceptions that need to be made. It was a little tedious to set up, but the multi-user mode of the application worked as expected once they were added.
Much safer than the work around the staff was using before - disabling the firewall whenever they wanted to work on the company finances!
Monday, April 12, 2010
Data Aggregation – Don’t Panic, Just Be Aware
I received a warning from a family member via text message a few days ago, as well as saw several posts on Facebook alerting others to a new website that “has all your personal data” – www.spokeo.com.
The advice was to go to their privacy section, enter my email address and request to be removed from the listing. According to what this family member told me about the removal process, you simply provided your email address, but only two listings could be removed with any single email address. My ears perked up a bit. Really? Interesting.
So I checked out the website with a little more of a critical eye. The site is a data aggregator, pulling data from various already public data sources – the white pages, home purchase records and the like, as well as your own public postings on Facebook, MySpace and Twitter.
The site requires payment to get the detailed results, but the teaser items include address and phone number, an estimate of your age, marital status, race, education level, possibly a few photos, lifestyle interests and median home values/income in your neighborhood.
While somewhat creepy, none of this is a big shocker. My name, address and phone number are in the white pages. The median home value and income in my neighborhood are easily searchable on www.zillow.com. As for the more personal goodies, the site indicates that it gets a good portion of its information from public profiles on Facebook and MySpace.
The hype behind all the warnings and knee-jerk reactions to “remove your listing from the site” lead me to look around for other data aggregators and compare. If you are going to remove your name from one, don’t forget several others like:
- www.switchboard.com (aka www.whitepages.com)
- www.411.com
- www.intelius.com
- www.peekyou.com
- www.zabasearch.com
All has some similar data, though they don’t all hit the social media space as hard as Spokeo does. All have an option to pay for more detailed information and many (especially when searching for people who are known to NOT be using social media) have incorrect data.
Ultimately, data is out there and aggregation sites will take advantage, however you really have to go to the source of the data to change what it available – rushing to knocking your name off one search site isn’t going to keep it from appearing on a new site next week. And personally, I’m not excited about providing my email address for “verification” so that can be collected up for some other unknown reason.
Like I’ve said before, it’s important to control and monitor what you put online. Google yourself. Check out some of the data available on these aggregation sites. Be critical of what you click and what you share. The Internet isn’t the safest place, but most places that are interesting have some level of risk.
Finally, don’t forget it’s also important to check your credit and lock your doors, because it’s not just the folks at www.pleaserobme.com who have the ability to figure out where you aren’t.