Author Archive

Worst Virus in Computer World

By |

ILOVEYOU 0r love letter Virus

Its started as E-mail ,subject content will be a love-letter-for-you.txt but its actually a vbs script, when the receiver start click this script, the script will start execute and give huge damage to the system it was peak during the year 2000 and this virus  scripted  from Philippines  . once the pc got effected by this virus its flood same Love mail to all the contact in outlook, so all the contact list person will get this e-mail.

Code Red  virus

This virus attack the machine running on windows 2000 or windows NT machines, its actually create buffer over flow ,this warm ware attacked during the year 2001.

Crypto locker

its a ransomware Trojan virus ,it spread through e-mail the effected machine will start encrypt the file, if you want to decrypt you need to pay for it. it attacked in the year of 2013

The Melissa Virus

its another type of virus , it utilized the security side of word 97 and word 2000 ,it spread as e-mail documents and it will select random 50 mail from the contact list and will send same affected documents to the fifty users.

from the above virus list , we can understand e-mail is one of the easiest way to attack the Pc’s. Care should be taken before opening any e-mail.

 

 

Read more »

Software Defined Network (SDN) – Network on Virtualization

By |

If all the devices are virtualized, how about the Networking will be done in an virtualized environment. Present Networking technology mainly focused on Physical devices, so there is a need for network configuration in virtualized environment is there always, SDN i.e. Software Defined network is an a open source networking where programmed Networking is possible.

Our traditional network physical devices are mostly Hardawar based, growing computer change leads to a driving network change, Even cisco a major network giant in industries had came virtualization network with its own technology . So Now let us lookup how the concept is implemented .

Infrastructure layer or Data Plane : its a non -intelligence end layer  ,where network switches and routers where the data forward to need layer.

Control layer 0r Control plane : it’s the intelligence layer, its the place determine how the traffic should be forwarded.

Application layer or Application Plane : services, application utilities with control level available in Application layer

Read more »

Social Media – End-to-End Encryption

By |

All the famous social media become end-to-end encrypted now a day’s, It was started used by telegram first and all other social media messaging software started following it. WhatsApp, Viber, Facebook messenger are started using end-to-end encryption for securing data’s.

End-to-end Encryption concept is very simple, its a secure communication between both the end devices as the encryption known between this two devices only, means no other person can able see the message, even the providing server are cannot have this encrypted personal data.

As technical perspective its good move, what about law enforcement since social media is communicating through the region of the world, common question arising all over the world are if this encryption is used by fraud or illegal activities? on going debate is countries need to have a backdoor access to encryption so they can monitor the data communication between the users, but the social media’s providers point of view if security is opened, there might be chance to lose of customer.

Let’s wait what kind of changes will come be there for encryption technology.

 

 

Read more »

Most Needed Certification in 2017

By |

IT industries had went a lot  changes for the past ten years, traditional data center had moved to clouding, data storage is changed, entry of mobile application, resulted in BYOD services and great demand of Big data, had leads to different requirement in IT industries, old traditional vendor based certification are started losing its popularity and new neutral based certification started hitting in the marked and it has a huge demand, let us look what at certification had a huge demand in 2017.

Amazon Web Service(AWS) developer

It’s one of the Most valuable certificate in IT industries , its one the useful certificate in cloud industries.

Certified in Risk and Information System Control (CRISC)  

Its security based certification in IT industries, Mainly useful for the IT professional, Project Managers and those who are related  in  IT Based Risk Filed.

Certified information Security Manager(CISM)

Its one of the certificate focused on managers, it gives a high over view on security polices and procedure.

Certified information system security professional (CISSP) 

its also related to security, its covers overall security started from securing data, hardware, software, program. it’s focused mainly on security.

Certified information System Auditor(CISA)

this certificate is mainly focus on auditing and controlling ,Monitoring of   IT assets .

VMWARE certified professional

its one of the peak growing certificate in IT industries, its mainly concentrate on virtualization and its tool for change over to cloud technology and its most needed certificate too.

 

Read more »

Yahoo! – Fallen history

By |


Yahoo.. One of the legend in internet Era during 1990’s and 2000’s . It was globally well known to the world by its E-mail, Yahoo Finance and yahoo messenger, map, groups and its Add. they had a huge traffic to their side and had huge income during that period. later when google and Facebook and lot of social medias came in to exist yahoo lost it popularity and visitors traffics also  begin to lost.

yahoo Mail is failed with google Mail, yahoo answer lost with Quora, and flickr to Instagram. Even though it have huge traffic and lot visitors the main draw back is its failed to movie with technology advance and failed to make correct decision and exact time. Mainly on search google had a huge growth. In recent year Yahoo security breach also leads to the lose confidentiality to their mail users.

Most of the yahoo services like yahoo 360, yahoo personal had stopped now.   yahoo teach us a lesson what are all the mistake we should not do else we will fall . Failed to adopt new technology and raise in  social media is also the cause, if changes are going we need to adopt changes if we stick on the think which we believe blindly we will fall .

 

 

Read more »

Positive thought’s

By |


Positive thought’s will always make emotionally and mentally strong, will have positive result in your life. Starting from childhood to Office environment we are surrounded with stress and Emotion, if we are positive we can over. Positive thinking is not a lecturer, it’s a follows.

 

A Positive person will always think positively even in worst situation and make things positive and he will make his dependent also happily the way of positive thinking. If you look at the life of positive thinkers even in the critical situation the stood strong with their attitude and succeeded even they created history in the world. You all know the great Thomas Alva Edison inventor of Electrical light, Motion picture and phonograph, but how many of us knows he has mental deficiencies on his school days, how he overcome it, it’s because of his mother positive attitude who teach everything. His school dismissed him, but mother lied to Edison that the school is not capable to handle his knowledge after his mother death he came to know from the school letters that he is dismissed because of his mental deficiencies.  See how the positive words change the mental deficiencies person into a greatest inventor of the century.

Lot more peoples we can say American President Abraham Lincoln had a list of failure throughout his life but his attitude made him a Great president of America, KFC founder Colonel and lot more people are in the world.

So don’t stop at your failure be positive and you will be succeeded on day. Still there are lot of empty pages are there in world history and who knows may be you will one to fill the pages in history.

 

Read more »

Does Cloud Computing is really changing IT Industries ?

By |

Cloud Computing is one of the  era in I.T industries, it’s replaced industries traditional  Server room structure as most of the services are moved to cloud also, lets look what the giant companies are doing in cloud computing services.

Microsoft Azure
Microsoft came along with Microsoft Azure, even though they entered late to cloud technology, Microsoft skype, yammer ,office 365 and one drive had made huge impact in clouding services, its one of the major changes, Exchange into 365 is reduced lot System administration task.
Google Clouding
Google is doing a lot in the cloud , it’s google doc engine where developer can configure their own app using java and python program, same as Microsoft google had its own google drive, google for corporate e-mail account also.
Amazon
yes , its popular one and its leading in cloud computing , its interesting to know amazon starts its services by selling book online. People with different mindset will win the race is an a perfect example for amazon.

Read more »

Apple Two Factor Authentication

By |


Apple is concentrating more on its security section, its latest update came along with two factor authentication for apple id. additional with username and password account ,apple send temporary code to the trusted or registered phone number. you will receive code either by text message or by voice call once you entered code  additional to password credential  your apple account is accessible, for detail about apple two-factor authentication view Apple site

 

 

 

Read more »

Freelance – Security Network

By |


Evaluation of virtualization ,raising of cloud ,IOT and success of E-commerce had made everything online and same time lot of Hacking, viral infection, compromising of network  and malware were leads to the requirement for highly secure infrastructure, if you guys strong enough in Security you will  be handle lot of security related freelance project, you should know what are all the requirement from the customer end and you should able to provide a best solution.

Development of mobile apps and e-mail related malware had brought a new security requirements in the IT world.  how the solution should be provided this is the main things we need to consider while doing freelance. let us look on the some of the critical requirements and its solution on it.

  • How can we handle e-mail related security issue – it can be handled by sandbox technology.
  • Content filtering and Apps based restriction – Can solved by restricting with Application layer firewall.
  • Cloud access security issue – Can solved by restricting next generation i.e forth generation firewall.
  • Outside attack to Internal Network – Applying access list and isolate new attack by sandbox solutions.

Lot of successful vendors based firewall devices are available in the market, and we can look glance on few devices, but you should have a deep  technical knowledge to recommend based on the customer requirement.

Paloalto Security Devices :

Its a next generation firewall  and also it have a virtualization next generation firewall for vmware,amazon and Microsoft clouding  and its support Sandbox technology also,it has test drive option where u can gather good knowledge for paloalto devices , visit their site and have look on it click for Paloalto

Fortigate devices :

They are one of the leading security services providers, its mainly based on next generation firewall and also its supporting cloud security also, because of its cost most of the mid-level industries are started using this vendor devices, click the link for Fortigate

Cisco Firepower :

Its a latest release from Cisco, Cisco firepower is next generation firewall from Cisco, visit their official site for more details   Cisco.

Lot more security devices are available concept and function or more are less same only, have a look on each devices and have a strong knowledge on it.

 

 

 

Read more »

Raise of Sandbox Technology

By |

Its a new concept raising in Security area, Sandbox is a type of restricted Area where untested or unverified programs or malicious code will be executed and checked . Traditional issue in security field is one the malicious code is attacked to the network then only patch or security of the code will be released. Sandbox is the solution provider even if the e-mail contained  unverified program, any malicious code it will go sandbox virtualized area first and the code will be tested. after the code is executed there is no issue found in Sandbox virtualization environment the software or program will allowed in to the internal network.

If sandbox found  a hacking or virus program , it will block the software and it will added as a virus batch thus it not allowing to enter our network, so we will have full secure environment.

 

Read more »

Skip to toolbar