Uncategorized

Uncategorized

Everything you need to know about firewalls

by: Nick Roche

Did you know that when your computer is connected to the internet, it has over 131,000 ‘ports’ that a hacker could connect to? These ports are like doors in a building and if they aren’t protected properly, then someone could sneak in without you noticing. If the hacker is not installing a virus, they can still do some serious damage without alerting your security software, including transmitting your personal information. So how do you watch all of these doorways to your information? You need a firewall!

In construction terms, a firewall is a fire-resistant wall that subdivides a building to stop the spread of fire from one area to another. In computer terms, we need to stop communications between your computer and others on the internet. A total block of all internet communication would be useless though, so you need a way of selecting which type of communications you want to receive. For this, computer firewalls have rules and filters much like construction firewalls have access doors.

Where do I put this firewall?

Firewalls can be on a hardware box (a separate unit or part of your internet modem or router) or can be software installed on your computer. Most popular security software packages also include a firewall. A hardware firewall is great for providing a barrier before your computer is even reached and will also mean that your computer doesn’t have to spend its precious resources on running the firewall software. It also reduces the risk of the firewall itself being compromised, as some viruses can try and disable security software features that are running on your computer. The downside is that a hardware-based firewall can be more expensive and not as easy to configure and maintain if you are unsure of how to use them.

If Microsoft gives me a firewall, do I need another one?

The Windows Firewall (on Windows XP Service Pack 2 and Vista) only examines inbound communications coming into your computer from the internet. If your computer becomes infected (e.g. if you install some free software that turns out to have a hidden nasty) then your outbound communication to other computers on the internet won’t be examined or filtered. This can turn your computer into a source of infection, impacting your security and internet connection. It’s also not recommended that you run more than one software firewall as this uses more processing power and can cause conflicts, so if your security software includes a firewall, turn off the Windows Firewall.

If I have a secure wireless connection do l need a firewall?

A wireless connection is another way to get onto the internet and wireless security controls who can use that connection. This is similar to allowing who can plug into your phone line. Once you are connected, your 131,000 ports are still open to hackers, so you still need a firewall. A firewall may be included on your wireless router but it pays to check.

Why does it keep on giving me messages?

If you are doing something specific (like installing new software or troubleshooting a connection problem) you may need to temporarily disable your firewall. Software firewalls may alert you that a connection has been attempted and blocked and may ask if you wish to allow that kind of connection in the future. In general, if you are doing something new which would probably involve a connection to the internet, you can allow the connection – either ‘this time only’ or for all future connection attempts. If in doubt, block it, as you can always allow it later if you find that it is needed.

Firewalls provide an enhanced level of security that has now become the minimum standard to protect your computer. They do require a certain level of knowledge or a great computer support person, so talk to your local Computer Troubleshooter to ensure that you are protected.

Uncategorized

FCoE vs. iSCSI – Making the Choice

A well written article by Stephen Foskett describing the decreasing disparity between Fibre Channel and iSCSI due to the increases in LAN speeds and decreases in cost.

“The notion that Fibre Channel is for data centers and iSCSI is for SMB’s and workgroups is outdated. Increases in LAN speeds and the coming of lossless Ethernet position iSCSI as a good fit for the data center. Whether your organization adopts FC or iSCSI depends on many factors like current product set, future application demands, organizational skill-set and budget. In this session we will discuss the different conditions where FC or IsCSI are the right fit, why you should use one and when to kick either to the curb.”

FCoE vs. iSCSI – Making the Choice

Uncategorized

Cloud Computing Comparison

by: SINGER.
Cloud computing can be defined as a data service, software and storage service, where the end user is not aware of the physical location and system configuration that delivers the services. Comparison to this concept can be made with electricity power grid where the consumer is mostly ignorant of the component devices that are needed to give this service.
Cloud computing has evolved from virtualization, autonomic utility computing as well as service oriented architecture.
Here are some clouds computing comparison, which have similar characteristics but should not be confused with the following:
1.Autonomic computing-This is can be defined as a self-capable management computer system.
2.Grid computing-This is a form of parallel computing that is distributed and connected to a main super computer. This super and virtual computer is networked to a cluster of loosely interconnected couple of computers working in unison to perform large tasks.
3.Client-server model-This kind of server computing is a general term that refers to any application that is distributed and is able to differentiate between service requesters (clients) and service providers (server).
4.Mainframe computer-These are very powerful computers that are found mostly in large organizations that work with important applications, usually bulky data processing like census, statistics of both consumers and industry, financial transactions and resource planning.
5.Utility computing-This can be defined as packaging of computing resources that involves computation and storage. A good example is the metered service that draws similarities to public utility like electricity.
6.Peer to peer-here the distribution architecture is devoid or doesn’t require central coordination, having the participants acting as both the suppliers and consumers of the resources unlike the client server model.
7.Service oriented computing-it models around computing techniques that revolve on software service. Cloud on the other hand relies on services that have a relation with computing.
One of the notable characteristic of cloud computing is that the processing and data is dynamic meaning that it is not found in a static place. The model is totally different from the ones in which the processes take place in known specified servers and “not in the cloud” like cloud computing. In other words all the other concepts act as complementary or supplementary to this concept.
The cloud computing comparisons don’t end there. The system software architecture that is involved in delivery of cloud computing involves the following: Multiple cloud components that inter-communicate over interfaces application programming. This is achieved through web services on the 3 tier architecture. The principle follows that of UNIX where multiple programs work concurrently over universal interfaces.
Front end and back end are the two most significant components of cloud computing architecture. The computer user is able to see the front end which is the computer as well as the applications that are used to access the cloud on web browser and other interfaces. The back end, on the other end of the cloud architecture is the ‘cloud’ that comprises of data storage devices, servers and various computers.
Those are some of the cloud computing comparisons.

Uncategorized

Operating System Deployment with MS Deployment Toolkit

I just deployed an 8GB image to four HP/Compaq 6510b laptops.
Amazingly, the image write over the LAN to all four machines took under 8 minutes!!! This was significantly faster than 20 minutes with earlier attempts. The specs of the setup are as follows:
Hardware:

  1. 1 Cisco Catalyst 3560G 24 port gigabit network switch
  2. 1 HP / Compaq 8000 Elite Ultra-Lite workstation
    • Intel Core 2 Duo @ 3.00 GHZ
    • 3.46 GB RAM
    • 1GB onboard NIC
    • Hitachi Travelstar Hard Drive (HTS725025a98a364) 2.5″ SFF SATA Hard Drive, 250GB, 7200RPM, 16MB Buffer
  3. 4 HP / Compaq 6510b laptops

Software:

  1. Windows XP Service Pack 3 (x86)
  2. Microsoft Deployment Workbench Version 5.1.1642.01
  3. Windows Automated Installation Kit 6.1.7600.16385
  4. 8GB Windows XP SP3 Image, originally ported from a Ghost capture.

Nonetheless, I think the major speed improvement came from using the enterprise-grade Cisco Catalyst 3560G switch.
I used WinPE and the WAIK to convert the orginal Ghost Image to ImageX and easily added the image file to the Operating Systems node of the Deployment Workbench. I configured the Task Sequence with the defaults of deploying an operating system, but excluded the state capture, windows Update (Pre/Post-Application Installation) as well as Capture Image. Placing the boot media on a USB proved nothing but efficient.
Being very pleased with these results, I will investigate more complicated deployments, as well as scripting unattended post-sysprep operations.