Posts

Showing posts from February, 2020

Ransomware removal guide

Follow the ransomware removal steps below to recover from a ransomware attack. Step 1: Disconnect from the internet First up, disconnect from the internet to stop the ransomware spreading to other devices. Step 2: Run a scan using internet security software Use the internet security software you have installed to run a scan. This will help to identify any threats. If it detects any risky files, they can be removed or quarantined. Step 3: Use ransomware decryption tool If your computer gets infected with encryption ransomware, you will need to use a ransomware decryptor to decrypt your files and data so that you can access them again. At Kaspersky, we continually research the latest forms of ransomware so that we can create ransomware decryptors to counter each new threat. Step 4: Restore files from backup If you have backed up your data externally or on cloud storage, restore a clean backup of all your files on your computer. This allows you to revert to a version of the

How to Access Windows Boot Manager

On occasion, you may find yourself in a situation where you need your computer to start up in a different way than it usually does. Whether you're troubleshooting to find the source of an issue with your computer or upgrading your computer's operating system to the latest version, you'll sometimes need to load data directly from a CD, a flash drive, secondary hard drive or even a second operating system installed on your computer. Luckily, you don't have to be a tech professional to do this: you can easily accomplish this task by using the Windows Boot Manager, accessed through your computer's startup sequence or through a menu option inside your Windows operating system's settings. What Is Windows Boot Manager? The Windows Boot Manager is a small piece of utility software installed to your boot volume – the small amount of space reserved on your hard drive that controls the way your computer starts up. Usually, Boot Manager works in the background when you

nformation Security Governance and Risk Management

The security management practices domain is the foundation for a security professional's work. This domain identifies key security concepts, controls, and definitions4. It also concentrates on many of the nontechnical aspects of information security while also addressing an analysis of technical risks, including: Security governance and policy Information classification/ownership Contractual agreements and procurement processes Risk management concepts [risk analysis] Personnel security Security education, training, and awareness Certification and accreditation Governance provides the framework that guides and directs the information security program. It helps shape standards, policies, procedures, responsibilities, and measures for monitoring the program to support an organization's business objectives. Within healthcare, governance can be separated into two additional components: Information Governance (IG) and Data Governance (DG). Information Governance (IG)

The Advantages of Authentication

There are numerous advantages of authentication systems which are used to identify the user of a home, ATM or a security clearance computer system. The main purpose of these systems is to validate the user's right to access the system and information, and protect against identity theft and fraud. While there are still drawbacks with some systems, as the business world and the electronic marketplace become more complex, the advantages of authentication are ever more obvious. Password Based Authentication The use of a password and username is the most common form of authentication used and is generally considered the cheapest and most convenient method. This requires the user to provide and remember a key containing a specified amount of alpha and numeric characters in relation to a username or e-mail address which must be correct at each login. Passwords saved on a network can be encrypted to prevent theft by employee or programs designed by hackers. find more :  authenticatio

LanManager Hash

This class implements the LanManager Hash (aka LanMan or LM hash). It was used by early versions of Microsoft Windows to store user passwords, until it was supplanted (though not entirely replaced) by the nthash algorithm in Windows NT. It continues to crop up in production due to its integral role in the legacy NTLM authentication protocol. This class can be used directly as follows: >>> from passlib.hash import lmhash >>> # hash password >>> h = lmhash.hash("password") >>> h 'e52cac67419a9a224a3b108f3fa6cb6d' >>> # verify correct password >>> lmhash.verify("password", h) True >>> # verify incorrect password >>> lmhash.verify("secret", h) False This class implements the Lan Manager Password hash, and follows the PasswordHash API. It has no salt and a single fixed round. know more :  lm hash generator

How to Delete Windows Workgroup

A nice feature of the Windows operating system is the ability to network computers together. The default network for the Windows operating system is called "Workgroup." Often a user will set up a new network of computers, name it something else and then have difficulty deleting the original default Workgroup. Step 1 Go to the Windows desktop and click on the "Start" button. Step 2 Select "Control Panel," then "System." Step 3 Select the tab labeled "Computer Name," and then take note of the name that is next to the word Workgroup. Step 4 Close this window, go back to the Windows desktop and click "Start" again. Select "My Network Places." Step 5 The icons showing the workgroups will appear, one of them being the new one you created. Go back to the Control Panel and click on "System" and "Computer Name" again. Step 6 Click on "Change" and then change the Workgroup name

How to Update Network Adapter Drivers

The network adapter is a card or built-in port on your computer’s motherboard that allows you to connect your computer to a network with a network cable. Like other hardware devices in your computer, the network adapter may require you to install updated drivers for better performance. You can download these drivers from the network adapter’s manufacturer website. Depending on the format of the driver, you may be able to automatically install the update or you may need to update through your computer’s device manager. Step 1 Click the “Start” button from your computer’s desktop. Step 2 Right-click “Computer” and choose “Properties” from the menu. Step 3 Open the “Hardware” tab if you are using Windows XP and click “Device Manager.” Windows Vista and 7 users can click “Device Manager” from the menu in the left panel. Step 4 Click on the arrow next to “Network Adapters.” Your device information, such as model number and make, will appear below the entry. You will need this i

Workstations vs. Servers vs. PC

o buy a personal computer, we know that there are desktops, business books, game books, but occasionally have seen workstations. If you are working in the enterprise also know that there are servers. What are the differences of workstations, servers and PC? In essence, whether it is a desktop or a notebook, a game book, a workstation or a server, it can be collectively referred to as a computer. And in the hardware configuration, it is also composed of the chassis, power supply, motherboard, processor, graphics card, memory, hard disk, etc. From the operating system, currently mainly Windows 10, Linux and so on. Therefore, we first understand the difference between these two types of computers from both hardware and software. The other is the demand, that is, the use. You can not buy a server for browsing the web, watching videos. If you are a professional e-sports player, it is impossible to buy a thin business book for playing games. It should be noted that the servers, work

How to Test LAN Speed

It's often useful to test the speed of your local area network to ensure you're getting the amount of bandwidth that you need for various tasks. A LAN speed test can be useful in conjunction with an internet throughput test measuring how fast you can upload and download content from the internet at large or on its own to see how fast you can transfer files and data on your local network. You can find a variety of free apps to test the speed on your LAN. Internet and LAN Speed Test A local area network is a set of computers and other devices like smart phones and printers connected within a relatively small space, such as an office, a university or a home. A LAN can include devices connected wirelessly, ones connected by wired connections or a mix of the two. Today, many LANs are also connected to the internet, and some are primarily set up simply to send local traffic to the world at large. But it's often also useful to send data between computers on a LAN, whether yo

Domains of Cybersecurity

Let’s start by defining defense in depth. To understand defense in depth, picture a castle from medieval times. Think of all the security measures they put in place. First, you had the moat and only a single retractable bridge across it. If you somehow made it across the moat, you had to deal with the wall. So, you made it across the moat and scaled the wall? Now the castle is at the top of the hill, you’re wearing 100 pounds of armor and weaponry, walking uphill, sometimes several miles. Some castles even had interior walls that forced you to take a certain, often very narrow, path. But you have to do all of that while archers are shooting at you, they’re rolling huge boulders down the hill at you, they’ve probably dumped something on the ground to make it slick, the list goes on and on and on. And then, when you finally breach the castle, you have to climb a whole host of stairs, usually fighting (fully rested) enemy soldiers as you go. For this reason, many would-be attackers dec

Networking Basics: What is IPv4 Subnetting?

During the early stages of the internet, organizations assigned IP addresses like crazy until we nearly ran out. Luckily, the designers of IP addressing came up with a way to end this wasteful practice: Dividing networks using subnetting. The process of taking an extensive network and splitting into smaller networks is known as subnetting — and it’s freeing up more public IPv4 addresses. There are two parts to an IP address: The network portion and the host portion. It’s like the address for a house. The network portion is like the city, state, and zip code. The host portion is like the house and street number. A subnet defines the number of bits, out of 32, used for the “network portion” of the address. Subnet masks can also be defined in a more common ‘slash’ representation, known as CIDR notation. In the following table, the red digits represent the bits used for the network. The black digits will be used for device IP addresses. Note that the 255.0.0.0 mask can also be rep

Features of a LAN Network

A LAN (Local Area Network) is the most basic form of infrastructure that allows communication between two or more computers. A LAN can be constructed with or without servers and is typically restricted, through the limits of network equipments, by physical location. Any system that allows communication between multiple LAN is called a WAN (Wide Area Network), of which the biggest existing one is the World Wide Web, also known as the Internet. Networking Hardware Networking hardware is a switch that allows a computer to communicate to more than one other computer simultaneously. It can be physically wired through network cables or otherwise (e.g. Wi-Fi). A computer participating in the LAN similarly requires the correct equipment such as network adapters installed. Wired network provides better speed and security compared with wireless. A LAN can also consist of both. Depending on the number of clients in the LAN, functionality and complexity, multiple switches, routers and servers

How to Disable Wake Up on LAN

"Wake on LAN" is a powerful and convenient feature that enables users to remotely power up their computer over a network, saving energy while also allowing remote access to the computer when needed. However, Wake on LAN, like many features that offer additional convenience, can also create a security risk by enabling power up capability on a computer which should only be powered up locally. Disabling the Wake on LAN feature is a simple process. Step 1 Click the "Start" button. Right-click "My Computer" (on Windows XP) or right-click "Computer" (on Windows 7 or Vista). Click "Manage" in the drop-down menu that appears. Step 2 Click "Device Manager" in the next window that appears. Click the "Network Adapters" header from the list of devices displayed in the right pane of the "Computer Management" window. Step 3 Right-click the network adapter that is currently connected to the network and then clic

How to Change Your Local Host Name

The default name of the local computer address is called "localhost." Therefore, the localhost is the address of the computer that an application is running on in a network. It is also known as the loopback address because it is the same address as the loopback network interface. The IP address of the localhost is "127.0.0.1." To change the localhost name, you have to edit the "Hosts" file in Windows. Step 1 Click "Start," then type "C:\WINDOWS\System32\drivers\etc" in the search bar, then press "Enter." The System 32\drivers\etc folder will open. Step 2 Click "Tools" on the main menu, then select "Folder options" from the drop-down list. Click the "View" tab, then click the check box next to "Show hidden files, folders, and drives" under "Hidden files and folders." Click the "Apply to Folders" button. The "Hosts" file will appear in the System 32\dri

Design a Secure Network Now

Imagine a scenario in which one of your employees is sitting at their desk, diligently working on a document when they receive an urgent call. From the “IT Department.” They’re told that their system has been compromised, and they need to take immediate corrective action to save their company (and their job) from ruin. So the employee dutifully handles over highly confidential information like IP addresses and passwords, for how could they not trust the IT Department in an emergency? This results in a malicious and devastating cyberattack on the company’s core assets. Think of this as examining the two great physical assets most organizations possess: their systems and their people. Examine systems (on-site or off) to document what assets you manage. Many IT managers are shocked at what they find (e.g., applications that are not currently in use; servers that are extremely under allocated). As the MSP or IT provider, you need this information, and it will likely enlighten your cli

what are ASA security levels ?

ASA uses a security level associated with each interface. It is a number between 0 to 100 that defines the trustworthiness of the network that the interface is connected to; the bigger the number, the more trust you have in the network. For example, the most secure network, such as the inside LAN, should have the security level of 100. The outside network connected to an untrusted network (such as the Internet) should have the level of 0. The interface connected to the DMZ should have the security level set to somewhere between 1 and 99 (usually 50). Security levels are used to define how traffic initiated from one interface is allowed to return from another interface. By default, the higher level security interfaces can initiate traffic to a lower level. The stateful inspection determines whether the reply traffic is allowed to make it back through. The following picture illustrates the concept: level 100 for the inside network level 50 for the DMZ network level 0 for the out

Best Wireless Analyzer Tools in 2019

A lot has changed with wireless networks this past decade. Smart devices with built-in wireless network capabilities are all around. This makes Wi-Fi quality and availability a critical resource at home and at work. But troubleshooting is an often overlooked area. Knowing how to check for interference between channels or what your Wi-Fi coverage looks like is handy. We rounded up some of the best wireless analyzer tools for 2019 that allow you to do all of this and more. Some of these tools are free, while others require a license or subscription. Let’s take a look. Wireshark: Packet Analysis Wireshark is an impressive packet-sniffing tool for general network analysis and troubleshooting. It is equally great when you need to deep-dive into wireless networking issues as well. Wireshark allows you to search through all of the traffic on your wireless network and sift through packets and headers to see what is happening. Wireshark is used primarily by professionals that know what th