Best IT Blog

Did you know?

Posted in Security (1500) by Guest on the March 26th, 2009

Interesting tidbits of information:

E-mails, contracts, and PowerPoint files account for 80 percent of corporate information.

71% Use Email to Negotiate Contracts and Agreements

69% Use Email to Exchange Invoices, Statements, and Payment Information

93% Use Email to Communicate with Customers.

38% Use Email to Respond to Regulators

44% Use Email to File with Official Bodies

35% Use Separate Back-End System for Email Retention

23% Use Records Management System for Managing Email

34% Use Document Management System for Managing Email

40% Use Email Management and Archiving Software

There are currently over 10,000 U.S. federal, state, and local laws and regulations addressing what, how, when and why records must be created, stored, accessed, maintained, and retained over increasingly longer periods of time.

The Education sector accounted for the majority of data breaches with 30%, followed by Government (26%) and Healthcare (15%) – almost half of breaches (46%) were due to theft or loss with hacking only accounting for 16%.

Hacking resulted in 73% of identities being exposed

1:400 emails contain confidential information
1:50 network files are wrongly exposed
Breaches on the rise
2005:107 companies exposed 56M individual data records
2006: In 6 months, 40 companies and government agencies have exposed nearly 30M individual data records

IT Professionals need to address mission-critical administration concerns with in-depth, concise coverage. Some sample topics would be:

Defending the company’s sensitive information against security problems

Neutralizing the threat of computer viruses

Identifying potentially disastrous hardware conflicts

Unlocking the hidden usefulness of Windows NT utilities

Creating seamless Windows NT and Unix interoperability

Integrating emerging Internet technologies with your network

Comments Off on Did you know?

Application Security Testing Concerns / Advice

Posted in Application (380),Security (1500),Web Services (250) by Guest on the March 17th, 2009

Cross Site Scripting
Cross-site scripting allows hackers to:
1)      Execute malicious script in a client’s Web browser
2)      Embed <script>, <object>, <applet>, and <embed> tags
3)      Steal web session information
4)      Modify user’s screen
a.       Any Dynamic HTML code based on content that users submit is vulnerable 

SQL Injection
1)      Users control the criteria of SQL statements
2)      Hackers enter values that alter the original intention of the SQL statement
3)      Four common examples of SQL injection:
b.      Probing databases
c.       Bypassing authorization
d.      Executing multiple SQL statements
e.       Calling built-in stored procedures 

Cryptographic Hacking
1)      Hacker only needs
2)      3 of 4 cryptography components
3)      Text + CipherText + Algo > Deduce the key
4)      CipherText + Algo + Key > Deduce the Text
a.       Algorithms … Do not remain a secret for long
b.      Key … As strong as technique used to create it 

COM Safe for Script Issues
1)      Is your control really Safe
2)      COM controls can be repurposed
3)      Warnings are optional 

Best Practice Medicine:
1)      Implement Security as a Design Feature
2)      Do Not Store un-encrypted Secret Information
a.       Use Crypto
3)      Sign your controls with digital signatures
4)      Consider binding the control to your site
5)      Use managed code 

Denial of Service Attacks
1)      Application or operating system failure
2)      CPU starvation
3)      Memory starvation
4)      Resource starvation
5)      Network starvation  

Best Practice Medicine:
1)      Security as a Design Feature
2)      Do Not Trust User Input
3)      Fail Intelligently
4)      Test Security 

Application Blocks
1)      Caching App. Block
2)      Offline App. Block 

1)      Instead of roundtrip to server
2)      Read-only reference data
3)      Data destined for remote
4)      servers while consolidating 

1)      Avoid volatile cached data
2)      Avoid sensitive cached data 

1)      Rely on System Garbage Collectors (resourcing)
2)      Avoid custom GC logic 

Use background thread for
1)      Lengthy initialization
2)      Remote service calls
3)      I/O Processing 

Foreground Thread
1)      Default when using Thread()
2)      Prevent process from terminating
3)      Background Thread
4)      Thread.IsBackground()


Comments Off on Application Security Testing Concerns / Advice

Are you the next target

Posted in Business (600),Security (1500) by Guest on the March 12th, 2009

They’re after you, who are they?

  1. Competitors
  2. Disgruntled employees
  3. Upset customers
  4. Hackers out for a lark
  5.  Hactivists
  6. Cartels that can buy the latest gadgets and best brainpower
  7. Hostile foreign governments / nations

Your organization may not be a specific target, just on that had a few vulnerabilities as it was probed. Make you not want to sleep at night if you’re worried about protected your networks.

Remain ever vigilant. For-warned is forearmed
Unlimited and constant Internet connection for all employees invites trouble. New Malicious code is

Unlimited and constant Internet connection for all employees invites trouble. New Malicious code is introduced daily into the Internet. This constant connection, give intruders more time to find vulnerabilities and gain access.

  1. Hire subject matter experts
  2. Buy business continuity insurance
  3. Reassign and train internal personnel
  4. Contract for specific services, retraining central IT to control specialized resources internally

Information Operations; When used in concert, their sum is far more powerful than the individual components, creating a powerful (deterrent) means towards attaining and maintaining a competitive advantage.

Comments Off on Are you the next target

Securing the confidentiality of PHI

PHI (Protected Health Information) requires passwords but….

a) Easy-to-guess passwords are one of the top ten threats to network security

b) When passwords change often to improve security, users write them down, increasing the risk of a breach

In addition, employers must block terminated staff from continued access to systems that have PHI.

However, it is difficult to revoke access to multiple systems quickly.

“Centralized Password Management”. Centralized Password Management lets organizations easily enforce an unlimited number of strong password rules, such as minimums on length, unique characters, letters and numbers required, etc, to maintain security.

Centralized password management allows for, strong, complex password enforcement in addition it allows for:

  1. Password synchronization 
  2. Integration of multiple passwords 
  3. Simplified password resets 
  4. Correction of forgotten passwords
  5. Password administrative revocation
  6. Password change privileges instantly and automatically on multiple systems
  7. Saving administrative Time and $Money
  8. Increases Corporate and Stockholder value
Comments Off on Securing the confidentiality of PHI

From DOS, Windows, Windows 9x / XP Windows NT, and OS/2

Posted in O S (375) by Guest on the March 1st, 2009

You can use the following procedure to identify your video card.

From a command prompt type the “debug” command and hit enter. You will leave the C:> prompt and be put in the debug’s “-” dash prompt.


At the dash prompt type “d C000:0010” and hit enter.


-d  C000:0010

You will be given some out put in text in to the far right hand side of the output. In this text output you will see the name, though possibly broken up, of your video card.

Here is an example of the debug procedure done on a 9FX Motion 771 with the S3-968 chipset and the 2.05.15 bios revision:

C000:0010  00 00 00 00 00 00 00 00-10 02 00 00 00 00 49 42   …………..IB
C000:0020  4D 20 56 47 41 20 43 6F-6D 70 61 74 69 62 6C 65   M VGA Compatible
C000:0030  20 42 49 4F 53 2E 20 00-BB 66 F0 01 A3 01 F0 09    BIOS. ..f……
C000:0040  09 FF 00 02 4E 75 6D 62-65 72 20 4E 69 6E 65 20  ….Number Nine
C000:0050  56 69 73 75 61 6C 20 54-65 63 68 6E 6F 6C 6F 67   Visual Technolog

C000:0060  79 20 20 20 20 20 20 20-20 20 20 39 46 58 20 4D   y       9FX M
C000:0070  6F 74 69 6F 6E 20 37 37-31 20 20 20 20 20 20 20   otion 771
C000:0080  20 20 20 0E 20 4C 65 74-20 69 74 20 62 65 20 36     . Let it be 6

By hitting “d” and enter again at the dash prompt you will see a continuation of the above output which will identify the chipset (in this case 968) and bios version (shown here as 2.05.15).


C000:0090  38 2E 2E 2E 00 28 63 29-31 39 39 35 20 4E 75 6D   8….(c)1995 Num
C000:00A0  62 65 72 20 4E 69 6E 65-20 56 69 73 75 61 6C 20   ber Nine Visual
C000:00B0  54 65 63 68 6E 6F 6C 6F-67 79 20 43 6F 72 70 2E   Technology Corp.

C000:00C0  0D 0A 41 6C 6C 20 52 69-67 68 74 73 20 52 65 73   ..All Rights Res

C000:00D0  65 72 76 65 64 0D 0A 00-23 39 2D 39 36 38 20 42   erved…#9-968 B

C000:00E0  49 4F 53 20 56 65 72 73-69 6F 6E 20 32 2E 30 35    IOS Version 2.05
C000:00F0  2E 31 35 0D 0A 00 28 63-29 31 39 39 35 20 53 33    .15…(c)1999 S3
C000:0100  20 49 6E 63 20 56 65 72-73 69 6F 6E 20 32 2E 30   Inc Version 3.0


By hitting the “q” key ( for quit ) and then enter, you will exit the debug session and return to the “C:>” command prompt.

Note: From Windows 3.1x or Windows 95 you can also do the following:

Check STATUS in HawkEye control panel. Click on STATUS, make note of information listed for Product Name, and Processor Type.

Compare the information gathered from either HawkEye or DEBUG to the chart below, this will indicate which Number Nine Product is installed in the system.

Card Name
Chip/Processor Name
S3 928
GXE 64
S3 864
S3 964
Vision 330
S3 764 (TRIO)
S3 764 (TRIO)
Motion 331
S3 765 (TRIO V+)
Motion 531
S3 868
Motion 771
S3 968
Motion 772
S3 988 (ViRGE VX)
Reality 332
S3 325 (ViRGE)
Imagine 128
Imagine 128 Series II
Imagine II
Imagine 128 Series II e
Imagine II
Comments Off on From DOS, Windows, Windows 9x / XP Windows NT, and OS/2