This is the only link [the first one, below] or site that matters when it comes to the Equifax hack. There are many phishing websites disguising themselves, and reports are coming in that hoax or fake emails are popping into Inboxes. Use caution. ONLY go through Equifax, seeming as though they are the ones who caused the mess. As they likely already have your identity, and then lost it via a hack, you may as well follow the steps off the link below to get yourself courtesy identity theft protection for a few years [that is their penance].
I would even emphasize that you should not take my [or anyone’s] word for it, and double check on Equifax’s website yourself.
Cross reference with the FTC:
I agree with this guy – the Samsung line of Galaxy phones are the main game in town. I use a Galaxy S8+and it is a fantastic smart phone.
Samsung is playing on a different level, and now the iPhone is the only competition
“Samsung has a great way of keeping itself in the technology conversation by having dueling flagship phone releases: a Galaxy S around March, and a Galaxy Note around August. It has also had a knack for releasing really great phones over the past three years in particular. From the Galaxy S8 to the larger Galaxy S8+ and now Galaxy Note 8, Samsung has a product set at a range from roughly $650 to $950 in sizes that can appeal to a wide range of buyers.”
Interesting map of all Azure worldwide regions or locations. They are represented well in most regions of the world.
Fascinating technical materials from Microsoft on the latest SQL Server.
“SQL Server 2016 will deliver breakthrough, mission-critical capabilities with improved performance, security, scale, and operational analytics. The new and improved features in SQL Server 2016 will enable Microsoft IT and the ESBI team to create BI solutions that support advanced analytics directly within databases and help users gain deeper insights into their data. “
- In-Memory OLTP helps ESBI meet their users’ business requirements for increased agility.
- Columnstore Indexes reduce the amount of time it takes to run and render SRSS reporting data.
- Temporal data reduces the amount of support tickets received from the field due to inaccurate data.
- Row-Level Security provides a more reliable and standardized method to easily control which users can access data.
- Dynamic Data Masking helps limit exposure of sensitive data, preventing users who should not have access to the data from viewing it.
- Query Store provides better insight into the performance differences caused by changes in query plans.
- Active Query Statistics allows a view of active query execution plans and helps identify and fix blocking issues while queries are running.
- SQL Stretch Database helps improve performance to frequently used data while preserving access to archived data.
Read The Full Article
This is a wonderful overview of the “Darknet” and the Thor browser.
Darknet 101: Your guide to the badlands of the internet
“Hacked login details. Cybersecurity exploits for hire. Drugs, guns and ammo. If there’s something shady going on online, chances are it’s happening on the darknet.”
Read it Here
At first, I thought this was a new beer, ha ha. But it’s just a ‘light’ version of Twitter. It is designed for users tweeting off slower networks or small data plans. Great idea!
I really like this way of thinking outside the box! Some of the old, and current, concepts on password complexity, length, history etc. are being revised. There is some new thinking on the matter, based mainly on trends and analytics Microsoft has done via millions of hack attempts on Azure based resources.
New Microsoft recommendations:
- “Maintain an 8-character minimum length requirement (and longer is not necessarily better).
- Eliminate character-composition requirements.
- Eliminate mandatory periodic password resets for user accounts.
- Ban common passwords, to keep the most vulnerable passwords out of your system.
- Educate your users not to re-use their password for non-work-related purposes.
- Enforce registration for multi-factor authentication.
- Enable risk based multi-factor authentication challenges.”
Read it here
Thousands of Hacked Home Routers are Attacking WordPress Sites
Fascinating blog from WordFence, one of the best WordPress firewall out there. They uncovered attacks coming from various countries and regions. The target is home networks. There is a router vulnerability called “Misfortune Cookie” [really] that is being exploited. It appears many home routers are hacked with this vulnerability and they in turn launch attacks. The tricky part here is that the launched attacks are actually small per home router, so detection is difficult.
The really weird thing is that the IPS are coming from all over the place, but attacks from Algeria [!] are increasing dramatically.
Read the WordFence Blog here
Now that the Microsoft ‘LinkedIn’ purchase is completed, Microsoft is aggressively pursuing more relevant and very forward-thinking usage of all its applications in the SaaS [Office 365] world.
Nutshell: lots of resume / job searching /social profile types of integration between ‘LinkedIn’ and Office applications.
“With its $26 billion acquisition of LinkedIn getting the thumbs up from EU regulators, Microsoft is wasting no time in integrating the social platform with its productivity software.
The goal — as described by the tech giant’s CEO Satya Nadella — is to utilize LinkedIn’s networking and learning resources to help people “develop new skills online, find new jobs, and easily connect and collaborate.” “
Read it here
I had a chance to set up, install, and look around in/at Windows Server 2016 Datacenter Technical preview 5. Wow, it is exciting and seemingly sleek and fast so far.
See my page for more.
Yeah, I see no reason for people to stay with VMware. You get free virtualization with the latest Windows Server 2012 and [soon to be released] 2016, especially if you purchase the Datacenter version.
‘Microsoft offers free Windows Server 2016 licenses to VMware switchers’
Read it here
Yikes – Multi-vector and SPEED: ‘a DDoS attack against an unnamed European media organization that peaked at 363G bps (bits per second)’. That ‘G’ is not a typo.
‘Attackers launch multi-vector DDoS attacks that use DNSSEC amplification’
I actually thought they were already gone, but I guess there has been a bit of a resurgence [?]. Whatever it was, it is now mostly over. This is a great idea – pay phones are generally spread out pretty nicely.
‘Good riddance payphones: NYC’s free gigabit Wi-Fi kiosks go live’
I just finished a simple Exchange Shell page. Exchange 2010 / 2013 Management Shell type commands can be very useful and highly effective. If the task at hand can be done easily by the Console, then I usually just stick with that.
But sometimes it is best to go straight to the Shell!
There are hundreds and hundreds of these WordFence Firewall entries on Riguy.Com. I blocked some IPs here and there; that will work for a while. I wonder what these nice people from Ukraine would ever want with my most humble of web sites? Regardless, thanks WordFence [awesome security plugin]!