InformationWeek Salary Survey shows that security is one of the hottest sectors of the IT job market. But discussions with IT security pros suggest that they are, for the most part, considered a necessary evil by the rest of their organizations.
Shared by Bookmark
Yes. Mobile devices are great for business. So what is the static you get back from IT personnel? iPads along with mobile devices are great for businesses. The mobile user who is in and out of business has to look at all of the operating systems and how to enforce policies and their policies have to be dynamic in order to meet the needs of any business using these devices. Apple has pdfs you can download to see exactly how to help secure these devices in your place of business. Here is a few things you need to take into consideration – bandwidth, the use of the device, remote wipe, compatible apps and user integration. Biggest challenge of having iPads in the workplace- convincing users they are for business and security is the most important concern.
As Apple products grow in popularity they’re increasingly attractive targets to the bad guys. Just check out the short history of Mac malware 1982-2011 to see what the hackers are up to.
Free Mac AntiVirus – Mac Security and Protection – Sophos. (Shared with sharing app on Sophos’ website)
Thanks toTech Paul for his link
Bookmarks4Techs is changing almost daily! Being one of the world’s largest resources of technical blogs and a blog in itself, Bookmarks4Techs is so much more.
- Bookmark4Techs – links to over 500 sites!
- Bookmark4Techs - Bookmark collections (grows daily!) to applications and software
- Bookmark4Techs - Storefront finds some of the best Amazon Deals available – Check out the lightening deals that you may be missing out on!
What is the significance behind this link vs. other blogs and links? Bookmark4Techs is a growing portal to these other sites, software, applications and daily deals. It provides a one stop resource that allows you to find answers, articles, whitepapers and a plethora of information. Go visit this site to find information you’ll need in this technologically driven world.
There are tons of ways to hack your router. It doesn’t always mean upgrading your firmware (although this is the best way).
DD-WRT has so many options as a free firmware for dozens of routers that you can do so much more than the average manufacturer’s firmware. You can increase your router’s power, EoIP, VPN, VOIP, manage it as a Firewall, use as a repeater/bridge/AP, install Radius and dozens of other features.
The Cisco E2500 along with several other Cisco routers allow you to put in a hidden webpage setting that opens up several settings you can tweak- Here’s a post Dawn put up that describes her problem router and what she found -
I recently bought a Linksys E2500 router and wanted to tweak my network settings but was unable to find the settings for things like Beacon Interval, RTS and Fragmentation Threshold. I was a little frustrated and I’ll replace it. Well, for those interested, there is a hidden management page! Open Internet Explorer (or the browser of your choice), type the IP Address of your router into the address bar and add this to the end: /Wireless_Advanced.asp
and tweak away!
Here’s a few more that may and may not be available on your router-/SysInfo.htm/SysInfo1.htm(either) /Site_Suvey.asp or /Site_Survey.asp/WL_ActiveTable.asp/Cysaja.asp
(Oh, don’t tweak if you don’t have the information on HOW to tweak!!)
Screenshot for the /Wireless_Advanced.asp
Linksys/Cisco WRT Routers – These routers are some of the most hackable routers on the market. Dawn found an excellent site that shows comparison charts, hacks and how-to’s on these home routers.
I recently flashed my WRT54GS with DD-WRT firmware. This firmware unlocks your router and allows you to tweak settings such as output power from 1mw to 251mw of power. It allows for site surveys and has hundreds of hidden tweaks. One of the most impressive screens is the site survey that shows the connections and their connection strength.
Tutorial page for DD-WRT firmware
Recently Jared L. wanted to extend his wireless from his home to his shop. He flashed his older WRT router and bridged it to his home router and now it goes over 360′ into the metal shop. Here’s what you do to bridge it. Thanks Jared.
Open source firmware can result in a ‘bricked’ router. You must read the instructions. Here’s a revival guidefor some linksys routers.
Ryan’s mod (DD-WRT) to keep his new E3000 cool.
Hey, on the way to work this morning i picked up a E3000 from Wal-mart. I flashed it with DD-WRT, and did some mods on it. I put a CPU fan on it, and also put some feet under neath to give it some more clearance for the air to flow, here are some picsDon’t forget you can manage your router with Router Commander.
Here’s an excellent article and breakdown of Linksys (now Cisco) routers.
Need a powerful access point to cover your entire house or business? The Ubiquiti picostation2 is an excellent choice for wide coverage at a very affordable price. With three models that cover between 700,000 square feet to 8,000,000 square feet (under $100 for each model), the picostations also offer open source software that accept OpenWRT or DD-WRT. Each of the picostations can be configured as an access point, repeater or bridge to connect buildings. What makes these access points so powerful? 100mw to 1000mw output.
Processor Specs Atheros MIPS 4KC
180MHzMemory Information 32MB SDRAM, 8MB Flash
Networking Interface 1 x 10/100 BASE-TX (Cat. 5, RJ-45) Ethernet Interface
Antenna RP-SMA omni antenna
Power Supply12V, 1A DC, Supply and injector
Passive Power over Ethernet (pairs 4,5+; 7,8 return)
Operating Temperature -4F to +158F Weight 3.5 oz
Opensource is not always the solution. Many opensource software is dropped or no longer support. Most people who get involved with opensource drop from a project or a project they support after they become busy or during some life changing event.
It is not always the case with all forms of opensource software. Some software has been well documented, continues to grow and has very well received by business and industry.
When Computerworld interviewed us on lean IT and education; we confessed to using a lot of open source software in order to meet the demands of technological growth on a limited budget.
Here’s a recent example of where opensource software can be used to save money and breath life into older devices. While we have focused on DD-WRT in the last week, we were facing upgrading 12 smaller training rooms with $150-$400 wireless devices. Our current older technology in these rooms were Linksys WAP54Gs.
Before we flashed the WAP54Gs, it often took 5-45 seconds to get an IP address and the device would sometimes drop the wireless connection. The wireless signal was not consistent with the older firmware. When monitoring the wireless signal we would see -90db to -30db (Amplitude) . Once we upgraded the access point, obtaining an ip address is almost instantaneous and the signal is clean and much stronger.
DD-WRT has grown and the software has became very stable along with performance that is excellent.
While DD-WRT is designed for routers, someone has taken the time to make the software work with many wireless access points.
When flashing the WAP54G, I took the access point off of the local network and hooked it up to a laptop with a small CAT5 cable. Here’s the steps for an access point.
- Reset the Access Point using the reset button
- Disable the wireless card on your laptop
- Enable the LAN card
- Set a static ip address of 192.168.1.20
- Open IE and enter 192.168.1.245 (The default ip for WAP54Gs)
- Enter the username and password (default for the access point)
- Click on Administration
- Click on upgrade firmware
- Browse to the micro bin firmware you downloaded from DD-WRT
- Click on upgrade (If you get an error, which I did on 4 access points simply perform the upgrade again)
- Once it says complete, close your browser
- Wait two or three minutes
- Unplug the Access Point
- Wait 1 minute
- Plug the Access Point
- Wait two minutes
- Open IE and browse to 192.168.1.1
- Enter a new username and password
- Click on Setup
- Enter the new password and username if necessary
- Disable DHCP
- Enter your new IP address for your Access Point
- Apply the settings (Save and Apply)
- Close your browser
- Enter a new static ip address (LAN card) on the same network as your Access Point
- Open your browser and enter the new ip address of the Access Point
- Enter your username and password
- Click on Wireless
- Select a Channel for your wireless (it is good to use inSSIDer before doing this to find an open channel)
- Apply the changes
- Click on Wireless Security and enter a WPA or WPA2 passphrase (complex passphrase) – Save your settings
- Disconnect your wireless access point and plug it into your network
- Remove the static ip address from your LAN card
- Enable your wireless
WARNING - DD-WRT was not originally intended to be loaded on a WAP unit. It was found that it will run but it is a tricky unit to load and have function correctly. Below are a compilation of methods/instructions to assist you with creating a DD-WRT-loaded WAP unit.
Hard reset does not work on this device so it is not possible to clear the NVRAM using the reset button. This can be problematic if you need to reset the device in order to access it. If this happens you can reinstall the linksys firmware using the tftp method and then reset it.LOAD AT YOUR OWN RISK.
RTS, DTIM and other settings that can further tweak your router.
Over 10 million credit card accounts were compromised at the end of March. This number may grow as credit card vendors look into the breach. Regardless if you bought something on line or not, you should do the follow:
- Go to Annual Credit Report (free) and obtain your credit report – look for odd information
- Visit your Credit Card Company’s website and look for messages in regards to the breach
- Watch for small unauthorized transactions in the event someone did get your number - thieves usually start with small transactions and challenge the cc company with larger purchases over time.
- Don’t fall prey to emails or phone calls from ‘unknown’ people contacting you about the breach
- Visit the Identity Theft Resource Center