lakkireddymadhu

July 25, 2014 (Last Friday Of July)
15th
 Annual
System Administrator Appreciation Day

sys admin

Image Source: miragestudio7

 

Acronym

Stands for

3DES Triple Data Encryption Standard
AAA Authentication, Authorization and Accounting
ACL Access Control List
AES Advanced Encryption Standard
AES 256 Advanced Encryption Standards, 256-bit
AH Authentication Header
ARP Address Resolution Protocol
AUP Acceptable Use Policy
BCP Business Continuity Planning
BIOS Basic Input/Output System
BOTS Network Robots
CA Certificate Authority
CCTV Closed-Circuit Television
CERT Computer Emergency Response Team
CHAP Challenge Handshake Authentication Protocol
CIRT Computer Incident Response Team
CRL Certification Revocation List
DAC Discretionary Access Control
DDOS Distributed Denial of Service
DEP Data Execution Prevention
DES Data Encryption Standard
DHCP Dynamic Host Configuration Protocol
DLL Dynamic Link Library
DLP Data Loss Prevention
DMZ Demilitarized Zone
DNS Domain Name Service
DOS Denial Of Service
DRP Disaster Recovery Plan
DSA Digital Signature Algorithm
EAP Extensible Authentication Protocol
ECC Elliptic Curve Cryptography
EFS Encrypted File System
EMI Electromagnetic Interference
ESP Encapsulated Security Payload
FTP File Transfer Protocol
GPU Graphic Processing Unit
GRE Generic Routing Encapsulation
HDD Hard Disk Drive
HIDS Host-Based Intrusion Detection System
HIPS Host-Based Intrusion Prevention System
HMAC Hashed Message Authentication Code
HSM Hardware Security Module
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol over SSL
HVAC Heating, Ventilation, Air Conditioning
IaaS Infrastructure as a Service
ICMP Internet Control Message Protocol
ID Identification
IKE Internet Key Exchange
IM Internet Messaging
IMAP4 Internet Message Access Protocol v4
IP Internet Protocol
IPSEC Internet Protocol Security
IRC Internet Relay Chat
ISP Internet Service Provider
KDC Key Distribution Center
L2TP Layer 2 Tunneling Protocol
LANMAN Local Area Network Manager
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
MAC Mandatory Access Control / Media Access Control
MAC Message Authentication Code
MBR Master Boot Record
MDS Message Digest 5
MSCHAP Microsoft Challenge Handshake Authentication Protocol
MTU Maximum Transmission Unit
NAC Network Access Control
NAT Network Address Translation
NIDS Network-Based Intrusion Detection System
NIPS Network-Based Intrusion Prevention System
NOS Network Operating System
NTFS New Technology File System
NTLM New Technology LANMAN
NTP Network Time Protocol
OS Operating System
OVAL Open Vulnerability Assessment Language
PAP Password Authentication Protocol
PAT Port Address Translation
PEAP Protected Extensible Authentication Protocol
PGP Pretty Good Privacy
PKI Public Key Infrastructure
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PSK Pre-Shared Key
RA Recovery Agent
RADIUS Remote Authentication Dial-in User Server
RAID Redundant Array of Inexpensive Disks
RAS Remote Access Server
RBAC Role Based Access Control
RSA Rivest, Shamir & Adleman
RTP Real-Time Transport Protocol
S/MIME Secure/Multipurpose Internet Mail Extension
SaaS Software as a Service
SCAP Security Content Automation Protocol
SCSi Small Computer System Interface
SDLC Software Development Life Cycle
SDLM Software Development Life Cycle Methodology
SHA Secure Hashing Algorithm
SHTTP Secure Hypertext Transfer Protocol
SIM Subscriber Identity Module
SLA Service Level Agreement
SLE Single Loss Expectancy
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SSH Secure Shell
SSL Secure Sockets Layer
SSO Single Sign-On
TACACS Terminal Access Controller Access Control System
TCP/IP Transmission Control Protocol/Internet Protocol
TLS Transport Layer Security
TPM Trusted Platform Module
UAT User Acceptance Testing
UPS Uninterrupted Power Supply
URL Universal Resource Locator
USB Universal Serial Bus
UTP Unshielded Twisted Pair
VLAN Virtual Local Area Network
VoIP Voice Over IP
VPN Virtual Private Network
VTC Video Teleconferencing
WAF Web Application Firewall
WAP Wireless Access Point
WEP Wired Equivalent Privacy
WIDS Wireless Intrusion detection System
WIPS Wireless Intrusion Prevention System
WPA Wireless Protected Access
XSRF Cross-Site request Forgery
XSS Cross-Site Scripting

Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers:

McAfee Agent cannot be removed while it is in managed mode”



Solution:

The computer must be removed from Managed Mode

  1. Steps:
    1-
    Open Command Prompt
    2- Go to the folder” C:\Program Files (x86)\McAfee\Common Framework” on X64 systems,” C:\Program Files\McAfee\Common Framework” on X86 systems
    3- Type “frminst.exe /forceuninstall” and press enter.
    command without quotes


 source: McAfee

If I had to live my life without you near me
The days would all be empty
The nights would seem so long
With you I see forever, oh, so clearly
I might have been in love before
But it never felt this strong

Our dreams are young and we both know
They’ll take us where we want to go
Hold me now, touch me now
I don’t want to live without you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for you

If the road ahead is not so easy
Our love will lead the way for us
Like a guiding star
I’ll be there for you if you should need me
You don’t have to change a thing
I love you just the way you are

So come with me and share the view
I’ll help you see forever too
Hold me now, touch me now
I don’t want to live without you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for
Nothing’s gonna change my love for you

SONGWRITERS:
MASSER, MICHAEL / GOFFIN, GERALD

WHAT WOULD YOU

DO IF YOU LOST

EVERYTHING?

 

Things to backup

There are many things that hold our data.

  • Computer
  • Laptop
  • Smartphone
  • IPod
  • Tablet
  • Other electronic devices
  • Photos and videos on social networks
  • And other online services.

 

How they can fail… and lose your data.

  • Theft
  • Hardware failure
  • Natural disaster
  • Alien invasion
  • Obsolete file formats
  • You forgot where you put it (really, it happens!)

 

World Backup Day checklist:

 

Here is a simple checklist to protect your data:

  • Find data that need to be backed up.
  • Identify data backup procedures.
  • Explore both hardware and software backup solutions.
  • Implement data backup procedures.
  • Save your backups in different physical locations.
  • Automate data backup workflow.
  • Backup procedures should be automatically working to archive your data continuously.
  • Check data restores to confirm they’re working properly!

Source: http://www.worldbackupday.com

 


How to permanently delete files from your computer:

 

Windows XP will end its 12-year successful run on April 8th and Microsoft wants the considerable number of users to shift over to more modern versions of its operating system. For full details regarding Windows XP support cycle,  please check my earlier blog article: It’s time to upgrade: Windows XP:

 

When you  delete any  file or folder  from your computer, it moves to the Windows Recycle Bin. This is easily  recoverable. If  you empty the Recycle Bin, the data still remain on your hard disk? In many cases, deleted files can be recovered with little effort because most computer operating systems will only delete links to the data so they no longer appear to you, but the actual data remains on the disk. Getting access to the deleted data is as simple as restoring the links.

032914_1155_Howtoperman1.png

 

When you delete files or folders, the data are not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is “deallocated.” After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.

 

SDelete:

To permanently erase files and prevent your confidential files from getting into the wrong hands, Microsoft offers a free command line utility – SDelete (Secure Delete) – that overwrites all the free space to prevent data recovery.
You can use SDelete both to securely delete existing files (replacement of delete), as well as to securely erase any file data that exists in the unallocated portions of a disk (including files that you have already deleted or encrypted).

032914_1155_Howtoperman2.png    SDelete implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. 

Step-by-Step: Using SDelete:

Download the Microsoft command-line tool SDelete. Here’s how to use this tool.

1. Click StartRun > ... , type cmd and press OK or Enter (Return). (Windows Vista and Windows 7 users can just click Start and type cmd in the Windows Search box.)
2. Navigate to where you have SDelete downloaded. For example, if it’s located at C:\cmdtools, type cd C:\cmdtools, and press Enter.
3. Now type sdelete <path to file or directory>, and press Enter, where <path to file or directory> is a standard Windows path. For example, to delete C:\mysecuredata.txt, you would type sdelete c:\mysecuredata.txt, and press Enter.
4. Once they’re deleted, you will receive confirmation that your files or folders have been permanently deleted, and you’re done!

032914_1155_Howtoperman3.jpg

CCleaner:

If you are already using CCleaner, you should know that it contains a Drive Wiper.

 Open CCleaner and go to Tools > Drive Wiper. You can wipe only free space or the entire drive, and you can choose up to 35 passes, meaning data will be overwritten with random strings of binary code 35 times. This very complex overwrite should make it impossible for anyone to restore the data originally saved in this space. When you’re happy with your settings, click >  Wipe and wait patiently.

 

032914_1155_Howtoperman4.png

 

 

Eraser:

 Eraser is a freeware and open source security tool to completely remove data from your hard drive. It can overwrite data several times using randomized patterns of binary code. It essentially is a file shredder.

Eraser is more convenient than CCleaner’s Drive Wiper because it can delete and shred single files, rather than just wiping all free space on a drive, and it is integrated with Windows Explorer (right-click menu). Moreover, Eraser provides you with a host of advanced settings, for example, different file and space erasure methods, the option to replace erased files with other files to allow plausible ‘deniability’, and schedule erasure of files, folders, recycle bin, or unused disk space.

 032914_1155_Howtoperman5.jpg

Whenever you want to securely erase your data, follow these steps.

  1.  Navigate to the files or folders that you want to securely erase.
  2.  Right-click on the files and/or folders and an Eraser menu will appear.
  3.  Highlight and click Erase in the Eraser menu.

 

Active@Kill Disk – Hard Drive Eraser:

 Active@ Kill Disk – Hard Drive Eraser is a free utility for securely erasing a hard drive. More importantly, this utility adheres to the United States Department of Defense standards (DoD 5220.22M) for hard disk data removal.

Active@killdisk

DBAN (Darik’s Boot And Nuke):

 DBAN, as it is shortened, is a nice little application that lets you completely erase your data.

Download the ISO for your system and burn it to a disk.  Next, pop the disk into your hard drive and boot from it.  This may require you to press F12 at the BIOS screen (the first screen you see when your computer boots up) and choose to boot from your CD/DVD drive.  

Press Enter to run DBAN in interactive mode.

1. Use up and down arrow keys to highlight the drive to wipe.
2. Press the space bar to select the drive.
3. Press M to select the wiping method.
4. Press F10 to begin the wipe process.

Note: if DBAN is unable to recognize your SATA hard disks, configure your system BIOS to use IDE mode rather than AHCI mode.

 Now that you have the right tools for the job, you can feel confident in knowing that your data has actually been removed from your hard disk and will no longer be recovered by anyone (not even by you).

Happy computing!! :-)

 

Source: labnol, makeuseof, mini tool-drive wipe, Gizmodo, PC world,

 

Love, Relationships & Technology: 

A study by McAfee shows a number of adults sharing private details about their lives, including those of an intimate nature, such as nude photos and sexts—all of this on unsecured digital devices. In a McAfee survey, which asked more than 9,000 adults worldwide, between the ages of 18-54, about their private data sharing habits and online behavior when it comes to matters of the heart.

27% still don’t secure their mobile devices with a basic personal identification number (PIN) or passcode. And 38% have shared PIN or passcode with others. This puts you at risk for cyber stalking, identity theft and leakage of their intimate data.

Love, Relationships & Technology

Love, Relationships & Technology

Bad technology habits are on the rise worldwide, but people are still not taking the steps to protect their information from prying eyes and angry exes.

Think twice before sharing private data, including intimate texts, passwords, photos and more. If you‘re not careful about what you share, it could land in the wrong hands.

Keep Your Personal Info Safe by Following These Simple Tips:

Lock Your Lips. Do not share passwords with anyone.

Lock Your Devices. Use password protection on your phone and other mobile devices.

Love the Delete Button. Take the time to delete personal or intimate text messages, emails and photos on your phone.

Share the Love, Not the Info. Once you share private information with those you love, that data is out of your hands, and out of your control.

Men are more likely to protect their devices than women.

Avoid bad buzz and keep your private life private.

LRT2014_Infographic-Global-FNL

The Futures Company and MSI conducted surveys in the US, UK, Australia, 
Canada, Germany, France, Spain, Italy, The Netherlands, Japan, Mexico, 
China, India, Singapore and Brazil among 9,337 men and women, 
ages 18 to 54. The survey was conducted in December 2013 – January 2014.

 Source: McAfee

Categories

Blog Stats

  • 89,456 hits

Calendar

July 2014
M T W T F S S
« Jun    
 123456
78910111213
14151617181920
21222324252627
28293031  

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 278 other followers

Follow

Get every new post delivered to your Inbox.

Join 278 other followers