Saturday, February 9, 2019

Netiquette IQ Blog For 2/9/2019 command-and-control server (C&C server)


+++++++++++++++++++++++++++++++++++++



February is Black History Month And Pantone Color Month(Coral in 2019)








Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















command-and-control server (C&C server)
from whatis.com
A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. C&C servers can be used to create powerful networks of infected devices capable of carrying out distributed denial-of-service (DDoS) attacks, stealing data, deleting data or encrypting data in order to carry out an extortion scheme. In the past, a C&C server was often under an attacker's physical control and could remain active for several years. Today, C&C servers generally have a short shelf life; they often reside in legitimate cloud services and use automated domain generation algorithms (DGAs) to make it more difficult for law enforcement and white hat malware hunters to locate them.
A malicious network under a C&C server's control is called a botnet and the network nodes that belong to the botnet are sometimes referred to as zombies. In a traditional botnet, the bots are infected with a Trojan horse and use Internet Relay Chat (IRC) to communicate with a central C&C server. These botnets were often used to distribute spam or malware and gather misappropriated information, such as credit card numbers.
Popular botnet topologies include:
  • Star topology - the bots are organized around a central server.
  • Multi-server topology - there are multiple C&C servers for redundancy.
  • Hierarchical topology - multiple C&C servers are organized into tiered groups.
  • Random topology - co-opted computers communicate as a peer-to-peer botnet (P2P botnet).
Since IRC communication was typically used to command botnets, it is often guarded against. This has motivated the drive for more covert ways for C&C servers to issue commands. Alternative channels used for botnet command include JPG images, Microsoft Word files and posts from LinkedIn or Twitter dummy accounts. 
                                        

Thursday, February 7, 2019

Tabula Rosa Systems Blog For 2/16/2019 -3-tier application architecture - From whatis.com









Happy Chinese New Year - 2019 Is The Year Of The Pig


The New Year greeting in Chinese is “xin nian kuai le”

+++++++++++++++++++++++++++++++++++++



February is Black History Month And Pantone Color Month(Coral in 2019)







Buy the books at

 www.amazon.com/author/paulbabicki
====================================================
















Buy the books at

 www.amazon.com/author/paulbabicki
====================================================













VPN (virtual private network)
A virtual private network (VPN) is programming that creates a safe and encrypted connection over a less secure network, such as the internet. VPNs were originally developed to provide branch office employees with safe access to corporate applications and data. Today, VPNs are often used by remote workers and business travelers who require access to sites that are geographically restricted. The two most common types of VPNs are remote access VPNs and site-to-site VPNs.
Remote access VPN

Remote access VPN clients connect to a VPN gateway on the organization's network. The gateway requires the device to authenticate its identity before granting access to internal network resources such as file servers, printers and intranets.
This type of VPN usually relies on either IP Security (IPsec) or Secure Sockets Layer (SSL) to secure the connection, although SSL VPNs are often focused on supplying secure access to a single application rather than to the entire internal network. Some VPNs provide Layer 2 access to the target network; these require a tunneling protocol like the Point-to-Point Tunneling Protocol or the Layer 2 Tunneling Protocol running across the base IPsec connection. In addition to IPsec and SSL, other protocols used to secure VPN connectivity and encrypt data are Transport Layer Security and OpenVPN.
Site-to-site VPN
In contrast, a site-to-site VPN uses a gateway device to connect an entire network in one location to a network in another location. End-node devices in the remote location do not need VPN clients because the gateway handles the connection.
Most site-to-site VPNs connecting over the internet use IPsec. It is also common for them to use carrier MPLS clouds rather than the public internet as the transport for site-to-site VPNs. Here, too, it is possible to have either Layer 3 connectivity (MPLS IP VPN) or Layer 2 (virtual private LAN service) running across the base transport.

 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.


Monday, February 4, 2019

Happy Chinese New Year - “xin nian kuai le”





Happy Chinese New Year - 2019 Is The Year Of The Pig


The New Year greeting in Chinese is “xin nian kuai le”
+++++++++++++++++++++++++++++++++++++

  Ground Hog's Day - An Early Spring!




February is Black History Month And Pantone Color Month(Coral in 2019)







Buy the books at

 www.amazon.com/author/paulbabicki
====================================================
















Buy the books at

 www.amazon.com/author/paulbabicki
====================================================
















The following list is a core composite for internal job seekers:
1.       Maintain Netiquette consistency the same way you normally do.
2.     Do not make any assumptions.
3.       Ensure you are qualified for the position you are seeking to transfer to.
4.       Advise your supervisors of your intent to move between positions prior to submitting your application.
5.       Do not disparage any of your fellow applicants.
6.       If you do not receive the offer, be gracious and congratulate the person awarded the job.
7.       Should you receive the position, send thank-you emails to all the people who assisted you.
8.       Send an email to your new manager highlighting your new roles and responsibilities.

9.       Notify any recruiters or managers within or outside of the company that you have a new position, and supply appropriate thank-you messages.

Change your social-media information and email signature appropriately.
===============================
   Good Netiquette And A Green Internet To All! 
 We can be contacted at:sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
Happy Chinese New Year - “xin nian kuai le”
 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.