Saturday, February 14, 2015

Tabula Rosa Systems - Featured Product Of The Day - Gigamon OS In A White Box

======================================


GigaVUE-OS on a White Box

Features and Benefits

Powered by GigaVUE-OS: Implement a uniform operating system software for visibility from edge to core of the visibility infrastructure
                 
Cluster Capable: Extend traffic intelligence from GigaSMART® capable nodes to white box ports

Managed by GigaVUE-FM: Provides a single pane-of-glass view for the entire visibility infrastructure

Compatible with Open Network Install Environment (ONIE) Boot Loader: Allows organizations to use a common white box hardware platform for multiple operating systems, each specialized in different functions such as switching, visibility and more

Applications

Reduce threat envelope of security and identify emerging threats using pervasive monitoring
Eliminate blind spots due to new encapsulations such as VXLAN or encrypted traffic such as SSL
Accelerate SDN adoption by bridging the visibility gap between virtual networks and physical networks
In combination with GigaVUE-VM, provide increased visibility into distributed applications and virtualized infrastructure
                 

Product Description

Infrastructure blind spots created by encapsulated and encrypted traffic are creating increasingly complex and seemingly undetectable security threats. Combined with the desire to embrace SDN technology, data center operators are increasingly acknowledging the value and criticality of pervasive and end-to-end visibility to deliver essential infrastructure monitoring. With a significant amount of traffic between different tiers of distributed applications happening below the spine switch in a data center, it is critical to have a scalable monitoring approach that provides the scale, intelligence, economics and richness of visibility to every rack in a large data center using an approach that is called by some operators as “TAP all”.

GigaVUE-OS is Gigamon’s market-leading visibility software that powers the intelligent core nodes (GigaVUE H Series) and the edge nodes (GigaVUE TA Series). The modular operating system software, GigaVUE-OS, has now been extended to GigaVUE-TA1 equivalent white box hardware by abstracting software from the underlying hardware.

=========================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Tech Term Of The Day - Adaptive content


Adaptive Content from techterms.com
Adaptive content is digital content that is optimized for multiple devices. It may include text, images, video, and other types of multimedia. The content may simply adapt to your screen size or may appear differently depending on the device on which it is accessed.
The most popular way to display adaptive content on the web is through responsive web design. By using CSS media queries and fluid layouts, web developers can create websites that adjust to the size of your browser window. When you load a responsive webpage, a media query detects your window size and your browser displays the corresponding layout. Media queries are often used in combination with fluid layouts, which define sections of a page in percentages rather than fixed pixels. This allows the content to fill different screen sizes more evenly.
Another way to display adaptive web content is to detect what device a person is using. For example, when you access a website on your mobile phone, it may direct you to a separate mobile site that is designed specifically for smartphones. The layout may include larger text, more simple navigation, and larger buttons to make it easily accessible with a touchscreen. Mobile sites often use unique URLs, such as m.example.com.
While websites are the most common example of adaptive content, they are not the only kind. Software, for instance, can be adapted to multiple devices and screen sizes. Many productivity programs, such as Microsoft Office and Apple's iWork applications are now developed as mobile apps alongside the traditional desktop versions. Many games that used to only run on desktop computers are now available for mobile devices as well. Some programs now come in three different versions – for desktops, tablets, and smartphones.
Adaptive content extends other mediums as well. For example, a smart home thermostat may have a digital interface that displays temperature and humidity information as well as outside weather data downloaded from the Internet. You might be able to access this data by logging into your account thorough the web or an app. Similarly, the information displayed on your automobile's LCD panel might also be accessible through the web or a mobile app interface. In each case, developers must create adaptive content that displays the information correctly on each device.
=========================================
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

A Special Valentine's Quotation For 2/14/15 From Tabula Rosa Systems

 "Love is the poetry of the senses."
- Honore de Balzac
=================================================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

Friday, February 13, 2015

Tabula Rosa Systems Technical Term Of The Day - Fileless Infection (Fileless Malware)


=========================================


Fileless infection (fileless malware)


A fileless infection (fileless malware) is malicious coding that exists only in memory rather than installed to the target computer's hard drive. 

Fileless malware is written directly to RAM. The code is injected into some running process, such as iexplore.exe or javaw.exe, which is then used for the exploit. Users typically contract fileless malware by visiting a malicious website, which they may be redirected to after clicking the attacker's ad (malvertisement). Because the malware doesn't exist as a file, it can often elude intrusion prevention systems and antivirus programs.
The infection cannot persist through a reboot because RAM, as volatile memory, only holds its data while the system is powered up. However, while the infection is live, the attackers may be able to steal data or download more persistent malware.
===================================
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Security Alert For Chrome Via US-CERT

02/10/2015 05:54 PM EST

Original release date: February 10, 2015
Google has released Chrome OS 40.0.2214.114 for Chrome devices to address multiple vulnerabilities. Exploitation of one these vulnerabilities could allow a remote attacker to take control of an affected system.
Users and administrators are encouraged to review the Google Chrome blog entry and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Wednesday, February 11, 2015

Tabula Rosa Special Feature - Celerbrate Safer Internet Day!

 
Yesterday was Safer Internet Day. Also this post is late, the message it carries is not Please read the article below. There are some good thoughts here. As the Internet expands its reach and capabilities, it is, and will continue to be, more difficult to maintain your desired level of privacy!
=============================================


3 questions you should be asking on Safer Internet Day

by Paul Ducklin on February 10, 2015 

What's in a word? 
Sometimes, quite a lot
.
That's how we feel about the fact that today is Safer Internet Day.
In fact, we're happier about helping you learn to be safer than telling you how to be safe.
That's because internet safety isn't absolute, not least because the internet's threats, as well as its benefits, keep changing.
Even Facebook, which many youngsters already consider a social network for old-timers, only arrived in 2004.
We couldn't have advised you on how to behave on Twitter until 2006, briefed you on WhatsApp until 2009, given you tips for Instagram until 2010, or explained what was wrong with Snapchat's promises until 2011.
In other words, keeping safe online is a journey, not a destination.
So, instead of trying to be prescriptive, and giving you a list of tips and tweaks, such as configuration options to turn on, we'll be descriptive instead.
Instead of telling you what to do, we're going to give you three questions you can ask yourself whenever you want to try something new online.
Better yet, they're questions you can ask out loud, and even encourage your children to ask out loud, without ever sounding ignorant or out of touch.
Whatever you do online, whether it's agreeing to an app's terms and conditions, clicking through to a website, uploading a photo, or merely looking at an email, go through this checklist:
1.    Who am I talking to?
2.    What am I telling them?
3.    Could anyone else be affected?

We're not being judgmental here.
We're not saying, "Don't turn on location services because you should always keep your location confidential."
We're not insisting, "It's dangerous to give details about your interests and hobbies to online forums."
We're not instructing you, "Never, ever upload photos taken in public to avoid publishing the pictures of other people in the photo."
But all of these are excellent examples of online behaviours that many people enter into without going through our question checklist above.
So, let's look at what can go wrong in the examples above.
Location services
Many operating systems, mobile devices and online services have Location Services turned on by default.
Learn how to control how and when you share your location, and don't feel compelled to enable Location Services because an app or your operating system promises you cooler results if you do.
You may be letting the whole world track your every move.
Go through our checklist, and make your own mind up for each app's use of location data: if in doubt, don't give it out.
Interests and hobbies
Sharing information about your lifestyle and your hobbies is fun, and if you aren't giving away any intimate details, then it doesn't feel any riskier than simply going about living your lifestyle.
After all, if you like mountain biking, then all your cycling friends probably already know what bike you've got, which trails you like to ride, and where you had your last prang.
But beware of giving too many details to the whole world that would usually only be known to someone you actually meet up with regularly and trust.
Otherwise it may be possible for a crook to learn enough about you to guess your passwords; to answer your security questions at websites or banks; or to trick other people into thinking that he knows you well and is a trusted insider in your circle.
Go through our checklist, and make your own mind up for information you are about to share: if in doubt, don't give it out.
Group photo uploads
Remember that you may very well be "on the internet" even if you've never opened a browser or gone online in your life.
That's because other people who have taken photos in which you appear, and who might not have the same sense of privacy that you do, could have uploaded them without asking, or even thinking about you.
So, when one of your friends or family whips the camera out, don't be afraid to ask if you can duck out of the photo if you don't want to be in it, or to ask them what they plan to do with it.
And return the favour by asking them up front when it's your turn to take the pictures.
By the way, also be mindful of what's in the background: don't do a "Prince William", who was photographed in an RAF office - with a username and password clearly visible on the noticeboard behind.
Go through our checklist, and make your own mind up for upload: if in doubt, don't give it out.
Safer Internet Day
Never feel compelled to give away more data about yourself than you need.
As we've said several times above: if in doubt, don't give it out.
===================================

**Important note** - contact our company for very powerful solutions for asset protection, data leakage, log, IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Security Alert Of The Day - Microsoft Vulnerabilities From US-CERT


======================================

National Cyber Awareness System:
02/10/2015 09:22 PM EST

Original release date: February 10, 2015
Microsoft has released updates to address vulnerabilities in Windows as part of the Microsoft Security Bulletin Summary for February 2015. Some of these vulnerabilities could allow remote code execution, security feature bypass, elevation of privilege, or disclosure of information.
US-CERT encourages users and administrators to review Microsoft Security Bulletin Summary MS15-FEB and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.
===================================

**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tuesday, February 10, 2015

Tabula Rosa Systems Critical Security Alert Form US-CERT





 National Cyber Awareness System:
02/10/2015 12:53 PM EST

Original release date: February 10, 2015

Microsoft has released Security Bulletin MS15-011 to address a critical vulnerability in Windows. Exploitation of this vulnerability could allow a remote attacker to take complete control of an affected system.

This security update contains a new policy feature (UNC Hardened Access) which is not enabled by default. To enable this feature, a system administrator must deploy the update, then apply the Group Policy settings described in the bulletin. For complete protection against this vulnerability, system reboots are required. Other than the update and configuration instructions contained in the Security Bulletin, there are no known workarounds or mitigations for this vulnerability. Updates are not available for Windows XP, Windows Server 2003, or Windows 2000.
     
US-CERT strongly recommends administrators prioritize the application of the patch, and concurrently review and test the necessary configuration changes discussed in the associated Knowledge Base article (KB3000483).
===================================

**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================