What_is_virtualization

Virtualization is gaining popularity in many businesses.  What is virtualization and will the benefits help you streamline and protect your business?

The idea of a machine not being physical may sound like a bizarre idea.  Here is an easy breakdown of virtualization:

  • In simple terms, virtualization is a virtual representation of something that can be physical like a desktop, server, storage device or another physical resource.
  • Just like your desktop or laptop computer, a virtual machine will perform and behave just like a real physical one.
  • When a computer is virtualized, it is no longer running on hardware like your desktop or laptop computer.  Instead many computers can run on one system.
  • For virtualization to be possible, there needs to exist a physical machine, which is known as a host.
  • A host will hold a virtualized guest machine. For example, you can have a Windows computer that can host a virtual machine running Linux on it. Both systems can co-exist within the same machine running completely separate from each other.
  • The software or firmware used to manage the virtual machine is known as Virtual machine Manager or a hypervisor.

virtual_vs_physical_system

Virtualization can be classified into three categories.

  1. Full virtualization. Nearly all of hardware is simulated. It runs complete with its own guest OS, and it runs unchanged.
  2. Partial virtualization. Only a portion of the environment is virtualized and a little configuration needs to be applied to some of the guest programs in order for them to run.
  3. Paravirtualization. In this setup, only the guest programs are virtual and run within their own boundaries, as if running on a completely different system. The programs run by the “guest” need configuring in order to run in such an environment.

Where it all started

IBM_704_mainframe

It first existed during the 60s on, what was known as, mainframes, which were huge heavy duty machines, much like servers. These mainframes used virtualization to split up the machines resources to run various applications. From then on, virtualization has evolved to what it has become today.  Whole operating systems with applications can be virtualized allowing individual users to interact with an entire system for themselves.

Benefits of virtualization

Now that we have a better understanding about the whole virtualization concept, we can briefly look at some of the main benefits to virtualizing a system.

Space saving–  Think about how much space you’ll save in a computer equipment room by having one single machine running multiple virtual machines. For instance. these can run servers to fulfill an entire business. An example of a hardware reducing ratio, by VMWare, is 10:1. All this will considerably change your server architecture.

Maximizing server efficiency– Within each virtual server in the host, you can seamlessly run multiple applications as well as different operating systems.

Reduces costs– By having less physical machines to purchase and maintain, you save a considerable amount of electricity, whilst helping to maximize productivity on servers and allowing business operations to run smoothly.

Easy to mange applications and resources– Migrations can happen whilst on a live environment, servers can be cloned at the click of a button, easy to set up load balancing over virtual farm servers and it’s easy to scale.

Final Thoughts

There exists a handful of leading virtualization vendors who offer different solutions according to your business and infrastructure needs. Some of the big names include VMware, Citrix, Microsoft Hyper-V and the like.

Do you use a Virtualization platform? If so, let us know what you think and how you rate it.

To determine whether virtualization can help streamline your business’ productivity, contact your local IT professionals.

Read More


typingshortcuts

Keyboard shortcuts are an overlooked feature of the modern OS. Here are 28 shortcuts to keep your hands on the keyboard and to keep your productivity high.

Most of these actions can be easily done with keyboard shortcuts. The shortcuts have you press a combination of two keys at the same time to perform the action. Investing some time into learning these shortcuts and getting used to using them on a daily basis will significantly increase your work efficiency no matter what field you are in. Once you learn this way of navigating the UI there will be no going back! The following shortcuts are for computers running a Windows OS.

Action controller

  • CTRL+Y, Redo the last section
  • CTRL+Z, Undo the last action

For creating, opening, saving, and printing

  • CTRL+N, Creates new file or web browser window
  • CTRL+O, Open a file or document
  • CTRL+S, Saves a file or webpage
  • CTRL+P, Print all the selected areas

Format shortcuts

  • CTRL+B, Bold
  • CTRL+I, Italic
  • CTRL+U, Underline

Browsers

  • CTRL+T, Open a new tab in opened browser
  • CTRL+Shift+T, Reopen previously closed tabs
  • CTRL+H, Open browser history
  • CTRL+W, Close window
  • CTRL+F, Word search page

washington

Screen Capture

  • ALT+Print Screen, Capture screenshot of currently open window
  • CTRL+Print screen, Capture the entire screen

Function keys

  • F1: Open the Help Page
  • F2: Rename file
  • F3: Find or Search
  • F4: Shows the address bar in browser
  • F5: Refreshes the current browser page

Windows Shortcuts

  • CTRL+Alt+Delete,Open the Windows Task Manager
  • Alt+Tab, to move to the last working window
  • WIN+D, Show desktop
  • WIN+L, Lock desktop

97806723306984.20.9

  • CTRL+Shift+N, Create new folder
  • Shift+Delete, Permanently Delete file
  • Alt+Enter or Alt+Double click, Go to properties screen for file or folder

For more ways to increase your office productivity, contact your local IT professionals.

Read More


Why it's important to update Flash

Flash is common enough to be a prime target for malware.  A new Adobe Flash exploit has been found allowing criminals to run malicious code.

Flash is susceptible to tampered files used to display multimedia, videos and animations while you are browsing the internet. This mainly affects desktops; however, it’s not an issue with servers since servers are less likely to have users on them browsing the internet.

Understanding the new Adobe Flash vulnerability

  • Taking a closer look at the cause for infections spreading through Adobe Flash, the risk usually lies in binary browser vulnerability within the .SWF files, where it is dropped by an undisclosed iframe.
  • Iframe is an inline frame. Back in the 90s, Microsoft came up with the idea for basic webpages to point to another page. This allowed a website to combine the content of its page with another. An iframe allows you to embed one site into another one seamlessly, with two different webpages displaying as one. Sounds like a great idea at the time, right?
  • It initially worked very well for Internet Explorer. What wasn’t foreseen was malware authors exploiting these iframe features.
  • This exploit affects only Internet Explorer users, which is why we urge everyone to use a more secure browser such as Firefox or Chrome. 

What does this Malware vulnerability do?

  • The injected iframe may have something subtly embedded such as a single pixel within the SWF file.
  • It’s high risk to Internet Explorer Users, where the Iframe can identified by its negative absolute positioning and random number approach.
  • The usual behaviour from these types of files will eventually take you to a currently black-listed blank domain.
  • This, of course, could change at any time. It could pose as a spoof site, aiming to steal data or to install malware.

How to protect yourself

The solution is simple, stay on top of your Adobe Flash updates. This is very important, especially if you use your web browser to do online gaming, stream music, watch videos and animations, such as on YouTube, which nearly always uses Adobe Flash Player.  By keeping updated with the latest Adobe updates, you’ll help to close down those vulnerabilities discussed above, and more.

Update_Adobe_Flash_Message

It’s good news if your choice of browser is Google Chrome. Chrome automatically updates your browser to the latest version of Adobe Flash.

All Onsite PC Solution Managed Services clients are automatically protected during their monthly maintenance.

To learn how to update Adobe Flash, please see our article Here (https://www.ophtek.com/should-you-update-adobe-flash/)

 

Read More


Malware holding data ransom

Cryptowall, Cryptolocker and Cryptodefence; all malware looking to hold your computer ransom. Here’s what you need to know about these viruses.

Cryptowall is one of the worst malwares out there that can maliciously encrypt your network and system files, holding them ransom in exchange for a Bitcoin payment. Typical Bitcoin payments can vary between $500 to $1000. Since there’s many hacker groups in existence in the wilderness, Cryptowall  has evolved from Cryptolocker to practically do the same thing. And to confuse matters even more, there’s another variant like Cryptowall known as Cryptodefense.

Cryptowall Decrypt Message

The ransom message from a Cryptowall infection

Cryptowall in a nutshell

  • Cryptowall works by using encryption to change all of your network files, making them unreadable.
  • It affects Windows XP to Windows 8 Operating Systems.
  • It also cleverly deletes Shadow Volume Copies to stop any admins from restoring encrypted files.
  • Only the attacker holds the key to decrypt the files that makes them readable again.
  • The ransom increases after 7 days to nearly double the amount and is only payable with Bitcoin.

With this angle of attack, it’s no wonder why hackers are using this hostile method to forcibly siphon Bitcoin payment from their prey.

Examples of attacks

Durham Police

Durham Police Department hit with Cryptowall

  • One prime example that has gained recent media coverage is Durham town police in New Hampshire. As a typical response from any law enforcement agency, the police refused to pay the ransom to cooperate with the cyber criminals.
  • It had impacted 1500 of their own computers, with most of their police e-mail system, spreadsheets and word processing functions being affected. It had bypassed their spam and AV filters, and was masked as an attachment in an email.
  • The danger lies in that the police receive plenty of emails with attachments to notify them of complaints such as potholes from residents, which of course, aren’t to be ignored. For this very reason an infected email attachment was opened, executed and it ran through the system.
  • Fortunately for them, they were able to stop the attack from spreading to other company functions and police networks in other towns by isolating their network and recouping their system from offline back-ups.

Business Decisions

Another example of an attack came from a client of Stu Sjourwerman’s security training firm knowB4.  The attack happened after an administrator opened an infected file, which ran through onto their 7 mapped server drives, encrypting all 75 GB of data held there.

There were many negative factors against them:

  • Firstly, they had unverified backups, which would take time to see whether they worked or not, a risk which would be costly to the time in terms of extended downtime with no guarantee of a successful restore.
  • Secondly, setting up a Bitcoin account involves a lengthy process to set up with society checks that can take days to complete.
  • In desperation with shortening their downtime, they decided to pay the ransom. It was a business decision, meaning either losing out $500  in Bitcoin or thousands for operation downtime.
  • The problem was, they didn’t have the Bitcoin to pay the ransom.

The turning point:

Bitcoin

  • Luckily, they had sought Stu Sjourwerman’s help, where he had Bitcoins at hand, ready for such an event like this one.
  • This company’s IT admins had, prior to this event, taken a security awareness course lead by ex- hacker Kevin Mitnick and with Stu Sjourwerman.
  • Contrary to the police case, this company had taken the advice from the course, and with Stu Sjourwerman’s Bitcoins, they managed to pay the ransom to avoid further downtime.
  • In the end they did recover their files; however there was corruption to one of their databases, which all in all took another painstaking 18 hours to return to normal.

Not all cases end well and not all ransoms release the files as promised. It’s really at the discretion the criminal cyber gangs controlling the attack.

For more ways to strengthen your office security and IT policy enforcement, contact your local IT professionals.

Read More


Limitations of a Gigabit Network

You’ve upgraded to a gigabit network and you already notice a big speed boost.  Here are the limitation of a gigabit network you should know about.

What is a Gigabit Network?

Wired Gigabit networks have far superseded the days when Ethernet or its successor, Fast Ethernet, were employed to deliver 10 Mbps to 100 Mbps over a network. However, the next best thing, which has been around for over a decade now, is Gigabit, running at 1000 Mbps or 1 Gigabit over many networks.

Bearing this in mind, what would be the first thing you’d think of when you hear of a “Gigabit network”?  You may associate Gigabit networks with large corporate companies who can afford to implement this “expensive” technology in order to gain faster connections, along with all the “complex” equipment needed to support such requirements.  The truth is, it was expensive when it was first introduced into the market, however the price has eventually dropped so that small businesses and home users alike can benefit from it.

Gigabit_Router_Speed_Comparison

In a previous article, we explained the benefits of upgrading to a gigabit network at your home or office.  Here are some points you should keep in mind.

Limitations of a Gigabit Network

It doesn’t help to speed up internet connection

Gigabit networks are designed to help speed up the transfer rate of data between one device, desktop or server, to another, within an internal network. Whoever your broadband provider is, they’d be the ones who’ll determine and set your Internet connection speed. This is why a Gigabit network will leave this area unaffected until services like Google Fiber are widely available. Just think of the Internet as connecting to an external source from your desktop, phone or device.

Your gigabit networks will not run at 1000 Mbps for everything

Since resources are shared, there are many things running on your network that will be utilizing pieces of that 1000 Mbps gigabit speed. Speedier performances will however be very noticeable compared to a 100 Mbps network.  Also, note that many wireless devices still haven’t reached gigabit speeds, although we are getting there.

Is all of your equipment gigabit capable?

Have you confirmed that all of the equipment on your network is capable or running at your new gigabit speed? Having a gigabit router and the correct Cat 6 cabling is enough to get you up to gigabit speeds only for devices that support Gigabit.  It won’t break the bank to get them up to speed though.  For instance you can buy $15 switches, $20 routers with Wi-Fi, $0.50 cables, and even PCI gigabit network cards to install on old computers for around $10-25, making the possibility of running a Gigabit network an affordable reality!

For more advice on setting up a gigabit network in your office or home, contact your local IT professionals.

Read More

1 5 6 7 8 9 13