<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>More Reading</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/tools-tips-reviews/more-reading.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:48:18 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/tools-tips-reviews/more-reading.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>FREE WEBINAR: Microsoft Azure Certifications Explained - A Deep Dive for IT Professionals in 2020</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/webinar-understanding-azure-certifications.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/webinar-understanding-azure-certifications.html</guid>
			<description><![CDATA[<p style="text-align: justify;">It’s common knowledge, or at least should be, that certifications are the most effective way for IT professionals to climb the career ladder and it’s only getting more important in an increasingly competitive professional marketplace. Similarly, cloud-based technologies are experiencing unparalleled growth and the demand for IT professionals with qualifications in this sector are growing rapidly. Make 2020 your breakthrough year - check out this free upcoming FREE webinar hosted by<strong> two Microsoft cloud experts</strong> to plan your <strong>Azure certification strategy</strong> in <strong>2020</strong>.&nbsp;</p>
<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?308348" target="_blank" rel="nofollow noopener" title="Understanding Azure Certifications"><img src="https://www.firewall.cx/images/stories/other-articles/webinar-microsoft-azure-certifications/microsoft-azure-certifications-explained.jpg" alt="microsoft azure certifications explained" style="display: block; margin-left: auto; margin-right: auto;" title="Understanding Microsoft Azure Certifications" /></a></p>
<p style="text-align: justify;">The webinar features a full analysis of the <strong>Microsoft Azure certification landscape in 2020</strong>, giving you the knowledge to <strong>properly prepare for a future working with cloud-based workloads</strong>. Seasoned veterans <strong>Microsoft MVP Andy&nbsp;Syrewicze</strong>&nbsp;and <strong>Microsoft cloud expert Michael Bender</strong> will be hosting the event which includes <strong>Azure certification tracks</strong>, training and examination costs, learning materials, resources and labs for self-study, how to gain access to <strong>FREE Azure resources</strong>, and more.&nbsp;</p>
<p style="text-align: justify;">Altaro’s&nbsp;webinars are always well attended and one reason for this is the encouragement for attendee participation. Every single question asked is answered and no stone is left unturned by the presenters. They also present the event live twice to allow as many people as possible to have the chance of attending the event and asking their questions in person!&nbsp;</p>
<p style="text-align: left;">For IT professionals in 2020, and especially those with a Microsoft ecosystem focus, this event is a must-attend!&nbsp;</p>
<p style="text-align: justify;">The webinar will be held on<strong> Wednesday February 19</strong>, at <strong>3pm CET/6am PST/9am EST</strong> and at again <strong>7pm CET/10am PST/1pm EST</strong>. I’ll be attending so I’ll see you there! </p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?308348" target="_blank" rel="nofollow noopener" title="Free access to the Webinar event">While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.</a></p>]]></description>
			<category>More Reading</category>
			<pubDate>Sun, 16 Feb 2020 18:47:02 +1100</pubDate>
		</item>
		<item>
			<title>Free Webinar: Azure Security Center: How to Protect Your Datacenter with Next Generation Security</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/free-azure-webinar-datacenter-nextgen-security.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/free-azure-webinar-datacenter-nextgen-security.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><a href="https://clixtrac.com/goto/?280379" target="_blank" rel="nofollow noopener" title="Free Azure Security Center Webinar"><img src="https://www.firewall.cx/images/stories/other-articles/free-azure-security-center-webinar/azure-security-center-webinar-1.png" alt="azure security center webinar" style="margin: 7px; float: left;" title="azure security center webinar" /></a>Security</strong> is a major concern for IT admins and if you’re responsible for important workloads hosted in <strong>Azure</strong>, you need to know your security is as tight as possible. In this <strong>free webinar</strong>, presented by <strong>Thomas Maurer</strong>, <strong>Senior Cloud Advocate on the Microsoft Azure Engineering Team</strong>, and <strong>Microsoft MVP Andy Syrewicze</strong>, you will learn <strong>how to use Azure Security Center</strong> to ensure your <strong>cloud environment is fully protected</strong>.</p>
<p style="text-align: justify;">There are certain topics in the IT administration world which are optional but security is not one of them. Ensuring your <strong>security knowledge</strong> is ahead of the curve is an absolute necessity and becoming <strong>increasingly important</strong> as we are all becoming exposed to more and more <strong>online threats every day</strong>. If you are responsible for <strong>important workloads</strong> hosted in <strong>Azure</strong>, this webinar <strong>is a must!</strong></p>
<p>The webinar covers:</p>
<ul class="check">
<li><strong>Azure Security Center introductions</strong></li>
<li><strong>Deployment and first steps</strong></li>
<li><strong>Best practices</strong></li>
<li><strong>Integration with other tools</strong></li>
<li><strong>And much more!</strong></li>
</ul>
<p style="text-align: justify;">Being an <strong>Altaro-hosted webinar</strong>, expect this webinar to be <strong>packed full of actionable information</strong> presented via <strong>live demos</strong> so you can see the theory put into practice before your eyes. Also, <strong>Altaro</strong> put a heavy emphasis on interactivity, encouraging questions from attendees and using <strong>engaging polls</strong> to get <strong>instant feedback</strong> on the session. To ensure as many people as possible have this opportunity, Altaro present the webinar <strong>live twice</strong> so pick the best time for you and don’t be afraid to ask as many questions as you like!</p>
<p><strong>Webinar</strong>: <strong>Azure Security Center: How to Protect Your Datacenter with Next Generation Security</strong><br /><strong>Date</strong>: <strong>Tuesday, 30th July</strong><br /><strong>Time</strong>: Webinar presented live twice on the day.&nbsp;Choose your preferred time:</p>
<ul>
<li><strong>2pm CEST / 5am PDT / 8am EDT</strong></li>
<li><strong>7pm CEST / 10am PDT / 1pm EDT</strong></li>
</ul>
<p class="box-info"><a href="https://clixtrac.com/goto/?280379" target="_blank" rel="nofollow noopener" title="Free Azure Security Center Seminar"></a>&nbsp;<a href="https://clixtrac.com/goto/?280379" target="_blank" rel="nofollow noopener" title="Free access to the Webinar event">While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.</a> </p>
<p><a href="https://clixtrac.com/goto/?280379" target="_blank" rel="nofollow noopener" title="Free Azure Security Center Webinar"><img src="https://www.firewall.cx/images/stories/other-articles/free-azure-security-center-webinar/azure-security-center-webinar-2.png" alt="azure security center webinar" style="display: block; margin-left: auto; margin-right: auto;" title="azure security center webinar" /></a></p>]]></description>
			<category>More Reading</category>
			<pubDate>Wed, 17 Jul 2019 20:53:15 +1000</pubDate>
		</item>
		<item>
			<title>Major Cisco Certification Changes - New Cisco CCNA, CCNP Enterprise, Specialist, DevNet and more from Feb. 2020</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/major-cisco-certification-changes.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/major-cisco-certification-changes.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/other-articles/cisco-certification-changes-2020/new-cisco-certification-paths.png" alt="new cisco certification paths Feb 2020" width="187" height="68" style="margin: 7px; float: left;" title="new cisco certification paths Feb 2020" />Cisco announced a major update to their CCNA, CCNP and CCIE certification program at Cisco Live last week, with the changes happening on the <strong>24<sup>th</sup>&nbsp; February 2020</strong>.</p>
<h2><strong>CCNA &amp; CCENT Certification</strong></h2>
<p style="text-align: justify;">The <strong>10 current CCNA tracks</strong> (<strong>CCNA Routing and Switching</strong>, <strong>CCNA Cloud</strong>, <strong>CCNA Collaboration</strong>, <strong>CCNA Cyber Ops</strong>, <strong>CCNA Data Center</strong>, <strong>CCNA Industrial</strong>, <strong>CCNA Security</strong>, <strong>CCNA Service Provider</strong>, <strong>CCNA Wireless</strong> and <strong>CCNA Design</strong>) are being <strong>retired</strong> and replaced with a <strong>single ‘CCNA’ certification</strong>. The new CCNA exam combines most of the information on the current <strong>CCNA Routing and Switching</strong> with additional wireless, security and network automation content.</p>
<p style="text-align: justify;">A new <strong>Cisco Certified DevNet Associate</strong> certification is also being released to satisfy the increasing demand in this area.</p>
<p style="text-align: justify;">The current <strong>CCENT</strong> certification is being <strong>retired</strong>. There hasn’t been an official announcement from Cisco yet but rumours are saying that we might be seeing new ‘<strong>Foundations</strong>’ certifications which will focus on content from the retiring CCNA tracks.</p>
<h2><strong>CCNP Certification</strong></h2>
<p style="text-align: justify;">Different technology tracks remain at the CCNP level. <strong>CCNP Routing and Switching</strong>, <strong>CCNP Design</strong> and <strong>CCNP Wireless</strong> are being consolidated into the <strong>new CCNP Enterprise</strong>, and <strong>CCNP Cloud</strong> is being <strong>retired</strong>. A new <strong>Cisco Certified DevNet Professional</strong> certification is also being released.</p>
<p style="text-align: justify;"><strong>Only two exams</strong> will be required to achieve <strong>each CCNP certification</strong> – a <strong>Core</strong> and a <strong>Concentration exam</strong>. Being <strong>CCNA certified</strong> will <strong>no longer be a prerequisite </strong>for the<strong> CCNP certification.</strong></p>
<p style="text-align: justify;">If you pass <strong>any CCNP level exams</strong> before <strong>February 24 2020</strong>, you’ll receive badging for corresponding new exams and credit toward the new CCNP certification.</p>
<p><a href="https://www.firewall.cx//images/stories/other-articles/cisco-certification-changes-2020/cisco-certification-roadmap-2020-large.png" class="jcepopup" title="New Cisco CCNA, CCNP &amp; DevNet Certification Roadmap 2020" data-mediabox="1" data-mediabox-title="New Cisco CCNA, CCNP &amp; DevNet Certification Roadmap 2020"><img src="https://www.firewall.cx/images/stories/other-articles/cisco-certification-changes-2020/cisco-certification-roadmap-2020.png" alt="new cisco certification roadmap 2020" title="new cisco certification roadmap 2020" /></a></p>
<p style="text-align: center;">Click to Enlarge</p>
<h2><strong>CCIE Certification</strong></h2>
<p style="text-align: justify;">The format of the <strong>CCIE</strong> remains largely the same, with a <strong>written</strong> and <strong>lab exam</strong> required to achieve the certification. The <strong>CCNP Core exam</strong> will be used as the <strong>CCIE Written exam</strong> though, there will <strong>no longer be a separate written exam at the CCIE level</strong>. <strong>Automation</strong> and <strong>Network Programmability</strong> are being added to the exams for every track.</p>
<p style="text-align: justify;"><strong>All certifications</strong> will be valid for <strong>3 years</strong> under the new program so you will no longer need to recertify CCIE every 2 years.</p>
<h2><strong>How the Changes Affect You</strong></h2>
<p style="text-align: justify;">If you’re currently studying for any Cisco certification the advice from Cisco is to keep going. If you pass before the cutover your certification will remain valid for<strong> 3 years</strong> from the date you certify. If you pass some but not all CCNP level exams before the change you can receive credit towards the new certifications.</p>
<p>We've added a few resources to which you can turn to an obtain additional information:</p>
<p><a href="https://www.flackbox.com/cisco-ccna-ccnp-ccie-certification-update-2020" target="_blank" rel="nofollow noopener" title="The Flackbox blog">The Flackbox blog has a comprehensive video and text post covering all the changes.</a></p>
<p><a href="https://www.cisco.com/c/en/us/training-events/training-certifications/certifications.html" target="_blank" rel="nofollow noopener" title="The official Cisco certification page">The official Cisco certification page is here.</a> </p>]]></description>
			<category>More Reading</category>
			<pubDate>Thu, 20 Jun 2019 22:43:51 +1000</pubDate>
		</item>
		<item>
			<title>Free Azure IaaS Webinar with Microsoft Azure Engineering Team</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/free-azure-iaas-webinar-with-microsoft-cloud-advocate.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/free-azure-iaas-webinar-with-microsoft-cloud-advocate.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><a href="https://clixtrac.com/goto/?308347" target="_blank" rel="nofollow noopener" title="Free IaaS Webinar with Microsoft Azune Engineering Team"><img src="https://www.firewall.cx/images/stories/other-articles/free-azure-iaas-webinar/free-azure-iaas-webinar-with-microsoft-intro.png" alt="free azure iaas webinar with microsoft azure engineering team" style="margin: 7px; float: left;" title="free azure iaas webinar with microsoft azure engineering team" /></a>Implementing Infrastructure as a Service</strong>&nbsp;(IaaS) is a great way of <strong>streamlining and optimizing your IT environment</strong> by utilizing virtualized resources from the cloud to complement your <strong>existing on-site infrastructure</strong>. It enables a flexible combination of the traditional on-premises data center alongside the benefits of cloud-based subscription services. If you’re not making use of this model, there’s no better opportunity to learn what it can do for you than in the upcoming webinar from Altaro: <strong><em>How to Supercharge your Infrastructure with Azure IaaS</em></strong>.</p>
<p style="text-align: justify;">The webinar will be presented by <strong>Thomas Maurer</strong>, who has recently been appointed <strong>Senior Cloud Advocate</strong>, on the <strong>Microsoft Azure Engineering Team</strong> alongside <strong>Altaro Technical Evangelist</strong> and <strong>Microsoft MVP</strong> <strong>Andy Syrewicze</strong>.</p>
<p style="text-align: justify;">The webinar will be primarily focused on showing <strong>how Azure IaaS solves real use cases</strong> by going through the scenarios <strong>live on air</strong>. Three use cases have been outlined already, however, the webinar format encourages those attending to suggest their own use cases when signing up and the two most popular suggestions will be added to the list for <strong>Thomas</strong> and <strong>Andy</strong> to tackle. <strong>To submit your own use case request</strong>, simply fill out the suggestion box in the sign up form when you register!</p>
<p style="text-align: justify;">Once again, this webinar is going to presented live twice on the day (<strong>Wednesday 13th February</strong>). So if you can’t make the earlier session (<strong>2pm CET</strong> / <strong>8am EST</strong> / <strong>5am PST</strong>), just sign up for the later one instead (<strong>7pm CET</strong> / <strong>1pm EST</strong> / <strong>10am PST</strong>) - or vice versa. Both sessions cover the same content but having two live sessions gives more people the opportunity to ask their questions live on air and get instant feedback from these Microsoft experts.</p>
<p style="text-align: center;"><a href="https://clixtrac.com/goto/?308347" target="_blank" rel="nofollow noopener" title="Save your seat for the webinar!">Save your seat for the webinar!</a></p>
<p><a href="https://clixtrac.com/goto/?308347" target="_blank" rel="nofollow noopener" title="Free Webinar with Microsoft Azure Engineering Team"><img src="https://www.firewall.cx/images/stories/other-articles/free-azure-iaas-webinar/free-azure-iaas-webinar-with-microsoft-cloud-advocate-1.jpg" alt="Free IaaS Webinar with Microsoft Azune Engineering Team" style="display: block; margin-left: auto; margin-right: auto;" title="Free IaaS Webinar with Microsoft Azune Engineering Team" /></a></p>
<p class="box-info"><a href="https://clixtrac.com/goto/?308347" target="_blank" rel="nofollow noopener" title="Free access to the Webinar event">While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.</a></p>]]></description>
			<category>More Reading</category>
			<pubDate>Sun, 10 Feb 2019 13:32:56 +1100</pubDate>
		</item>
		<item>
			<title>Altaro VM Backup v8 (VMware &amp; Hyper-V) with WAN-Optimized Replication dramatically reduces Recovery Time Objective (RTO)</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/hyper-v-vmware-backup-free.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/hyper-v-vmware-backup-free.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Altaro, a global leader in virtual machine data protection and recovery, has introduced <strong>WAN-Optimized Replication</strong> in its latest version, <strong>v8</strong>, allowing businesses to be back up and running in minimal time should disaster strike. Replication permits a business to make an ongoing copy of its virtual machines (VMs) and to access that copy with immediacy should anything go wrong with the live VMs. This dramatically reduces the <strong>recovery time objective</strong> (<strong>RTO</strong>).</p>
<p><a href="https://go.altaro.com/?LP=FWCX-avm-replication-v8&amp;Cat=LC&amp;utm_campaign=avm-replication-v8&amp;utm_medium=referrer&amp;utm_source=FWCX" target="_blank" rel="nofollow noopener" title="Vm Backup Download"><img src="https://www.firewall.cx/images/stories/other-articles/altaro-v8-annoucement/vm-backup.png" alt="VMware and Hyper-V Backup" style="display: block; margin-left: auto; margin-right: auto;" title="VMware and Hyper-V Backup" /></a></p>
<p style="text-align: justify;">Optimized for WANs, Altaro's <strong>WAN-Optimized Replication</strong> enables system administrators to replicate ongoing changes to their virtual machines (VMs) to a remote site and to seamlessly continue working from the replicated VMs should something go wrong with the live VMs, such as damage due to severe weather conditions, flooding, ransomware, viruses, server crashes and so on.</p>
<h2 style="text-align: justify;">Drastically Reducing RTO</h2>
<p style="text-align: justify;">"WAN-Optimized Replication allows businesses to continue accessing and working in the case of damage to their on-premise servers. If their office building is hit by a hurricane and experiences flooding, for instance, they can continue working from their VMs that have been replicated to an offsite location," explained David Vella, CEO and co-founder of Altaro Software.</p>
<p style="text-align: justify;">"As these are continually updated with changes, businesses using Altaro VM Backup can continue working without a glitch, with minimal to no data loss, and with an excellent recovery time objective, or RTO."</p>
<p class="box-download" style="text-align: justify;"><a href="https://clixtrac.com/goto/?210273" target="_blank" rel="nofollow noopener" title="Free Virtual Machine Backup for VMware and Hyper-V">Click here to download your free copy now of Altaro VMware Backup<strong>free copy</strong>Click here to download your free copy now of Altaro VMware Backup</a></p>
<h3 style="text-align: justify;">Centralised, Multi-tenant View For MSPs</h3>
<p style="text-align: justify;"><strong>Managed Service Providers</strong> (<strong>MSPs</strong>) can now add <strong>replication services</strong> to their offering, with the ability to replicate customer data to the MSP's infrastructure. This way, if a customer site goes down, that customer can immediately access its VMs through the MSP's infrastructure and continue working.</p>
<p style="text-align: justify;">With <strong>Altaro VM Backup for MSPs</strong>, MSPs can manage their customer accounts through a multi-tenant online console for greater ease, speed and efficiency, enabling them to provide their customers with a better, faster service.</p>
<h3 style="text-align: justify;">How To Upgrade</h3>
<p style="text-align: justify;">WAN-Optimized Replication is currently available exclusively for customers who have the Unlimited Plus edition of Altaro VM Backup. It is automatically included in Altaro VM Backup for MSPs.</p>
<p style="text-align: justify;">Upgrading to Altaro VM Backup v8 is free for Unlimited Plus customers who have a valid Software Maintenance Agreement (SMA). The latest build can be downloaded from&nbsp;<a href="https://clixtrac.com/goto/?210273" target="_blank" rel="nofollow noopener" title="update your Altaro VM Backup">this page</a>. If customers are not under active SMA, they should contact their Altaro Partner for information about how to upgrade.</p>
<p>New users can benefit from a fully-functional&nbsp;<a href="https://clixtrac.com/goto/?210273" target="_blank" rel="nofollow noopener" title="30-day trial of Altaro VM Backup Unlimited Plus">30-day trial of Altaro VM Backup Unlimited Plus</a>. </p>]]></description>
			<category>More Reading</category>
			<pubDate>Mon, 03 Dec 2018 08:00:13 +1100</pubDate>
		</item>
		<item>
			<title>Free Live Demo Webinar: Windows Server 2019 in Action</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/windows-server-2019-in-action-free-webinar.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/windows-server-2019-in-action-free-webinar.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/other-articles/windows-server-2019-in-action-webinar/windows-server-2019-webinar.jpg" alt="windows server 2019 webinar" style="margin: 7px; float: left;" title="windows server 2019 webinar" />So you’ve heard all about <strong>Windows Server 2019</strong> - now you can <strong>see it in action in a live demo webinar</strong> on <strong>November 8th</strong>! The last <strong>WS2019</strong> webinar by <strong>Altaro</strong> was hugely popular with <strong>over 4,500 IT pros registering for the event</strong>. Feedback from gathered with that webinar and the most popular features will now be tested live by <strong>Microsoft MVP Andy Syrewicze</strong>. And you’re invited!</p>
<p>This deep-dive webinar will focus on:</p>
<ul class="check">
<li><strong>Windows Admin Center</strong></li>
<li><strong>Containers on Windows Server</strong></li>
<li><strong>Storage Migration Service</strong></li>
<li><strong>Windows Subsystem for Linux</strong></li>
<li><strong>And more!</strong></li>
</ul>
<p style="text-align: justify;">Demo webinars are a really great way to see a product in action before you decide to take the plunge yourself. It enables you to see the strengths and weaknesses first-hand and also ask questions that might relate specifically to your own environment. With the demand so high, the webinar is presented <strong>live twice</strong> on <strong>November 8th</strong> to help as many people benefit as possible.</p>
<p><a href="https://goo.gl/2RKrSe" target="_blank" rel="nofollow noopener" title="Free Windows Server 2019 Webinar"><img src="https://www.firewall.cx/images/stories/other-articles/windows-server-2019-in-action-webinar/altaro-windows-server-2019-in-action-webinar.jpg" alt="altaro windows server 2019 in action webinar" style="display: block; margin-left: auto; margin-right: auto;" title="altaro windows server 2019 in action webinar" /></a></p>
<p style="text-align: justify;">The <strong>first session is at 2pm CET/8am EST/5am PST</strong> and the <strong>second is at 7pm CET/1pm EST/10am PST</strong>. With the record number of attendees for the last webinar, some people were unable to attend the sessions which were maxed out. It is advised you save your seat early for this webinar to keep informed and ensure you don’t miss the live event.</p>
<p>Save your seat: <a href="https://goo.gl/2RKrSe" target="_blank" rel="nofollow noopener" title="Free Windows Server 2019 Webinar Training">https://goo.gl/2RKrSe</a></p>
<p class="box-hint"><a href="https://goo.gl/2RKrSe" target="_blank" rel="nofollow noopener" title="Free access to the Webinar event">While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.</a> &nbsp;</p>]]></description>
			<category>More Reading</category>
			<pubDate>Thu, 01 Nov 2018 20:35:17 +1100</pubDate>
		</item>
		<item>
			<title>Windows Server 2019 Free Webinar</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/windows-server-2019-free-webinar.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/windows-server-2019-free-webinar.html</guid>
			<description><![CDATA[<p style="text-align: justify;">With <strong>Microsoft Ignite</strong> just around the corner, <strong>Windows Server 2019</strong> is set to get its <strong>full release</strong> and the signs look good. Very good. Unless you’re part of the <strong>Windows Server insider program</strong> - which grants you access to the latest <strong>Windows Server Preview builds</strong> - you probably haven’t had a <strong>hands-on experience</strong> yet with <strong>Windows Server 2019</strong> but the guys over at <strong>Altaro</strong> have and are preparing to host a webinar on the <strong>3rd of October</strong> to tell you all about it.</p>
<p style="text-align: justify;"><a href="https://goo.gl/V9tYYb" target="_blank" rel="nofollow noopener" title="Free Windows Server 2019 Webinar"><img src="https://www.firewall.cx/images/stories/other-articles/windows-server-2019-webinar/altaro-windows-server-2019-webinar.jpg" alt="altaro windows server 2019 webinar" style="display: block; margin-left: auto; margin-right: auto;" title="altaro windows server 2019 webinar" /></a></p>
<p style="text-align: justify;">The webinar will be held <strong>a week after Microsoft Ignite</strong> so it will cover the <strong>complete feature set included</strong> in the <strong>full release</strong> as well as a more in-depth look at the most important features in <strong>Windows Server 2019</strong>. Whenever a <strong>new version of Windows Server</strong> gets released there’s always a lot of attention and media coverage so it’s nice to have an hour long session where you can sit back and let a panel of <strong>Microsoft experts</strong> cut through the noise and give you all the information you need.</p>
<p style="text-align: justify;">It’s also a great chance to <strong>ask your questions</strong> direct to those with the inside knowledge and <strong>receive answers live on air</strong>. <strong>Over 2000 people have now registered</strong> for this webinar and we’re going to be joining too. It’s <strong>free to register</strong> - what are you waiting for?</p>
<p>Save your seat: <a href="https://goo.gl/V9tYYb" target="_blank" rel="nofollow noopener" title="Free Windows Server 2019 Webinar">https://goo.gl/V9tYYb</a></p>
<p class="box-hint">Note: While this event has passed, its still available to view and download all related/presented material. Click on the above link to access the event recording.</p>]]></description>
			<category>More Reading</category>
			<pubDate>Tue, 18 Sep 2018 20:47:51 +1000</pubDate>
		</item>
		<item>
			<title>Download HP Service Pack (SPP) for ProLiant Servers for Free (Firmware &amp; Drivers .ISO)–  Directly from HP! </title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/hp-service-pack-for-proliant-spp-free-download.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/hp-service-pack-for-proliant-spp-free-download.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/hp-service-pack-for-proliant-spp-free-download-1a.jpg" alt="hp-service-pack-for-proliant-spp-free-download-1a" style="margin: 7px; float: left;" title="Free HP Proliant SPP ISO Firmware and Driver Download" />Downloading</strong> all necessary <strong>drivers</strong> and <strong>firmware upgrades</strong> for your <strong>HP Proliant server</strong> is very important, especially if <strong>hardware compatibility</strong> is critical for new operating system <strong>installations</strong> or <strong>virtualized environments</strong> (<strong>VMware</strong> – <strong>HyperV</strong>). Til recently, HP customers could <strong>download</strong> the <strong>HP Service Pack</strong> (<strong>SPP</strong>) for <strong>Proliant servers free of charge</strong>, but that’s no longer the story as HP is forcing customers to pay up in order to get access to its popular <strong>SPP package</strong>.</p>
<p style="text-align: justify;">For those who are unaware, the HP SPP is a <strong>single ISO image</strong> that contains all the latest firmware software and drivers for HP’s Proliant servers, supporting older and newer operating systems including Virtualization platforms such as VMware and HyperV.</p>
<p style="text-align: justify;">From HP’s prospective, you can either search and download for free each individual driver you think is needed for your server, or you buy a support contract and get everything in one neat ISO with all the necessary additional tools to make life easy – sounds attractive right? Well, it depends which way you look at it… not everyone is happy to pay for firmware and driver updates considering they are usually provided free of charge.</p>
<p style="text-align: justify;">A quick search for <strong>HP Proliant firmware</strong> or <strong>drivers</strong> on any search engine will bring up <strong>HP’s Enterprise Support Center</strong> where the impression is given that we are one step away from downloading our much wanted SPP:</p>
<p><img src="https://www.firewall.cx/images/stories/hp-service-pack-for-proliant-spp-free-download-1.png" alt="HP Proliant SPP Driver and Firmware Free Download" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="HP Proliant SPP Driver and Firmware Free Download" /></p>
<p style="text-align: center;" align="center">Figure 1. Attempting to download the HP Service Pack for ProLiant (SPP) ISO</p>
<p style="text-align: justify;">When clicking on the ‘<strong>Obtain Software</strong>’ link, users receive the bad news:</p>
<p><img src="https://www.firewall.cx/images/stories/hp-service-pack-for-proliant-spp-free-download-2.png" alt="hp-service-pack-for-proliant-spp-free-download-2" width="450" height="189" style="display: block; margin-left: auto; margin-right: auto;" title="HP Proliant SPP Driver and Firmware Download" /></p>
<p style="text-align: center;" align="center">Figure 2. Sorry, you need to pay up to download the HP Service Pack ISO image!</p>
<p style="text-align: justify;">Well, this is not the case – at least for now.</p>
<p style="text-align: justify;">Apparently HP has set up this new policy to ensure customers pay for their server driver upgrades, however, they’ve forgotten (thankfully) one very important detail – securing the location of the HP Service Pack for ProLiant (SPP) ISO :)</p>
<p style="text-align: justify;">To directly access the latest version of HP’s SPP ISO image simply <strong>click</strong> on the following URL or <strong>copy-paste</strong> it to your web browser:</p>
<p class="box-info" style="text-align: justify;"><strong><a href="ftp://ftp.hp.com/pub/softlib2/software1/cd-generic/p67859018/v113584/" target="_blank" rel="nofollow noopener" title="HP Service Pack for ProLiant Servers - SPP ISO Image - Free Download">ftp://ftp.hp.com/pub/softlib2/software1/cd-generic/p67859018/v113584/</a></strong></p>
<p style="text-align: justify;">HP’s FTP server is apparently wide-open allowing anonymous users to access and download not only the latest SPP ISO image, but pretty much browse the whole SPP repository and download any SSP version they want:</p>
<p><img src="https://www.firewall.cx/images/stories/hp-service-pack-for-proliant-spp-free-download-3.png" alt="The latest (free) HP SPP ISO is just a click away!" style="display: block; margin-left: auto; margin-right: auto;" title="The latest (free) HP SPP ISO is just a click away!" /></p>
<p style="text-align: center;" align="center">Figure 3. The latest (free) HP SPP ISO is just a click away!</p>
<p style="text-align: justify;">Simply <strong>click</strong> the “<strong>Up to higher level directory</strong>” link to move up and get access to all other versions of the SPP repository!</p>
<p style="text-align: justify;">It’s great to see HP real cares about its customers and allows them to <strong>freely download</strong> the <strong>HP Service Pack</strong> (<strong>SPP</strong>) for <strong>Proliant servers</strong>. It’s not every day you get a vendor being so generous to its customers so if you’ve got a <strong>HP Proliant server</strong>, make sure you update its drivers and firmware while you still can!</p>
<p style="text-align: justify;">Note: The above URL might not still be active - in this case you can <strong>download it from here</strong>:</p>
<p class="box-download" style="text-align: justify;"><strong><a href="https://www.systrade.de/download/SPP/" target="_blank" rel="nofollow noopener" title="HP Service Pack (SPP) Download">https://www.systrade.de/download/SPP/</a></strong></p>]]></description>
			<category>More Reading</category>
			<pubDate>Thu, 31 Mar 2016 22:58:32 +1100</pubDate>
		</item>
		<item>
			<title>Colasoft Announces Release of Capsa Network Analyzer v8.2</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/colasoft-capsa-new-version-8.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/colasoft-capsa-new-version-8.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left"><img src="https://www.firewall.cx/images/stories/collaborations/colasoft-category-logo.gif" alt="colasoft-category-logo" style="margin: 7px; float: left;" title="Colasoft Capsa Network Analyzer" /><strong>February 23, 2016 – Colasoft LLC</strong>, a leading provider of innovative and affordable <strong>network analysis solutions</strong>, today announced the availability of <strong>Colasoft Capsa Network Analyzer v8.2</strong>, a <strong>real-time portable network analyzer</strong> for <strong>wired</strong> and <strong>wireless network monitoring</strong>, <strong>bandwidth analysis</strong>, and <strong>intrusion detection</strong>. The data flow display and protocols recognition are optimized in Capsa Network Analyzer 8.2.</p>
<p style="text-align: justify;" align="left"><strong>Capsa v8.2</strong> is capable of analyzing the traffic of <a href="https://www.firewall.cx/cisco/cisco-wireless.html" target="_blank" title="wireless AP">wireless AP</a> with 2 channels. Users can choose up to 2 wireless channels to analyze the total traffic which greatly enhances the accuracy of wireless traffic analysis. Hex display of decoded data is added in Data Flow sub-view in <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP/UDP">TCP/UDP</a> Conversation view. Users can switch the display format between hex and text in Capsa v8.2.</p>
<p style="text-align: justify;" align="left">Besides the optimizations of Data Flow sub-view in&nbsp;<a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP/UDP">TCP/UDP</a> Conversation view, with the continuous improvement of CSTRE (Colasoft Traffic Recognition Engine), Capsa 8.2 is capable of recognizing up to 1546 protocols and sub-protocols, which covers most of the mainstream protocols.<img src="https://www.firewall.cx/images/stories/colasoft-network-analyzer-v82.jpg" alt="colasoft-network-analyzer-v82" style="margin: 7px auto; display: block;" title="Colasoft Network Analyzer Free Download" /></p>
<p style="text-align: justify;" align="left">“We have also enhanced the interface of Capsa which improves user experience”, said Brian K. Smith, Vice President at Colasoft LLC, “the release of Capsa v8.2 provides a more comprehensive network analyze result to our customers.”</p>]]></description>
			<category>More Reading</category>
			<pubDate>Sat, 27 Feb 2016 15:09:21 +1100</pubDate>
		</item>
		<item>
			<title>Safety in Numbers - Cisco &amp; Microsoft</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/member-contributions-cisco-microsoft.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/member-contributions-cisco-microsoft.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">By Campbell Taylor</p>
<p style="text-align: justify;">Recently I attended a presentation by Lynx Technology in London . The presentation was about the complimentary use of Cisco and Microsoft technology for network security. The title of the presentation was “End-to-end SecurityBriefing” and it set out to show the need for security within the network as well as at the perimeter. This document is an overview of that presentation but focuses on some key areas rather than covering the entire presentation verbatim. The slides for the original presentation can be found at http://www.lynxtec.com/presentations/.</p>
<p style="text-align: justify;">The presentation opened with a discussion about firewalls and recommended a dual firewall arrangement as being the most effective in many situations. Their dual firewall recommendation was a hardware firewall at the closest point to the Internet. For this they recommended Cisco's PIX firewall. The recommendation for the second firewall was an application firewall. such as Microsoft's Internet Security and Acceleration server (ISA) 2004 or Checkpoint's NG products.</p>
<p style="text-align: justify;">The key point made here is that the hardware firewall will typically filter traffic from OSI levels 1 – 4 thus easing the workload on the 2nd firewall which will filter OSI levels 1 – 7.</p>
<p style="text-align: justify;">To elaborate, the first firewall can check that packets are of the right type but cannot look at the payload that may be malicious, malformed HTTP requests, viruses, restricted content etc.</p>
<p style="text-align: justify;">This level of inspection is possible with ISA.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/articles-members-contributions-sincm-1.gif" alt="articles-members-contributions-sincm-1" width="553" height="193" style="display: block; margin-left: auto; margin-right: auto;" /><em>Figure 1. Dual firewall configuration </em><br />Provides improved performance and filtering for traffic from OSI levels 1 – 7.</p>
<p style="text-align: justify;">&nbsp;You may also wish to consider terminating any VPN traffic at the firewall so that the traffic can be inspected prior to being passed through to the LAN. End to end encryption is creating security issues, as some firewalls are not able to inspect the encrypted traffic. This provides a tunnel for malicious users through the network firewall.<br /><br />Content attacks were seen as an area of vulnerability, which highlights the need to scan the payload of packets. The presentation particularly made mention of attacks via SMTP and Outlook Web Access (OWA)<br /><br />Network vendors are moving towards providing a security checklist that is applied when a machine connects to the network. Cisco's version is called Network Access Control (NAC) and Microsoft's is called Network Access Quarantine Control (NAQC) although another technology called Network Access Protection (NAP) is to be implemented in the future. <br /><br />Previously NAP was to be a part of Server 2003 R2 (R2 due for release end of 2005). Microsoft and Cisco have agreed to develop their network access technologies in a complementary fashion so that they will integrate. Therefore clients connecting to the Cisco network will be checked for appropriate access policies based on Microsoft's Active Directory and Group Policy configuration.<br /><br />The following is taken directly from the Microsoft website: http://www.microsoft.com/windowsserver2003/techinfo/overview/quarantine.mspx<br /><br />Note: Network Access Quarantine Control is not the same as Network Access Protection, which is a new policy enforcement platform that is being considered for inclusion in Windows Server "Longhorn," the next version of the Windows Server operating system. <br /><br />Network Access Quarantine Control only provides added protection for remote access connections. Network Access Protection provides added protection for virtual private network (VPN) connections, Dynamic Host Configuration Protocol (DHCP) configuration, and Internet Protocol security (IPsec)-based communication.<span style="color: #cafa88;"><br /></span></p>
<h2>&nbsp;ISA Server &amp; Cisco Technologies</h2>
<p style="text-align: justify;">ISA 2004 sits in front of the server OS that hosts the application firewall and filters traffic as it enters the server from the NIC. Therefore intercepting it before it is passed up OSI levels.</p>
<p style="text-align: justify;">This means that ISA can still offer a secure external facing application firewall even when the underlying OS may be unpatched and vulnerable. Lynx advised that ISA 2000 with a throughput of 282 Mbps beat the next closest rival that was Checkpoint. ISA 2004 offers an even higher throughput of 1.59 Gbps (Network Computing Magazine March 2003)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/articles-members-contributions-sincm-2.jpg" alt="articles-members-contributions-sincm-2" width="526" height="395" /></p>
<p align="center">&nbsp;</p>
<p style="text-align: justify;">Cisco's NAC can be used to manage user nodes (desktops and laptops) connecting to your LAN. A part of Cisco's NAC is the Cisco Trust Agent which is a component that runs on the user node and talks to the AV server and RADIUS server. NAC targets the “branch office connecting to head office” scenario and supports AV vendor products from McAfee, Symantec and Trend. Phase 2 of Cisco's NAC will provide compliance checking and enforcement with Microsoft patching.</p>
<p style="text-align: justify;">ISA can be utilized in these scenarios with any new connections being moved to a stub network. Checks are then run to make sure the user node meets the corporate requirements for AV, patching, authorisation etc. Compliance is enforced by NAC and NAQC/NAP. Once a connecting user node passes this security audit and any remedial actions are completed the user node is moved from the stub network into the LAN proper.</p>
<p style="text-align: justify;">Moving inside the private network, the “Defence in depth” mantra was reiterated. A key point was to break up a flat network. For example clients should have little need to talk directly to each other, instead it should be more of a star topology with the servers in the centre and clients talking to the servers. This is where Virtual Local Area Networks (VLANs) would be suitable and this type of configuration makes it more difficult for network worms to spread.</p>
<h2 style="text-align: left;" align="right">Patch Management, Wireless &amp; Security Tools</h2>
<p><strong>Patch Management</strong></p>
<p>Patch management will ensure that known Microsoft vulnerabilities can be addressed (generally) by applying the relevant hot fix or service pack. Although not much detail was given Hot Fox Network Checker (Hfnetchk) was highlighted as an appropriate tool along with Microsoft Baseline Security Analyser (MBSA).</p>
<p><strong>Restrict Software</strong></p>
<p>Active Directory is also a key tool for administrators that manage user nodes running WXP and Windows 2000. With Group Policies for Active Directory you can prevent specified software from running on a Windows XP user node.</p>
<p>To do this use the “Software Restriction Policy”. You can then blacklist specific software based on any of the following:</p>
<ul>
<li>A hash value of the software</li>
<li>A digital certificate for the software</li>
<li>The path for to the executable</li>
<li>Internet Zone rules</li>
</ul>
<p><strong>File, Folder and Share access</strong></p>
<p>On the server all user access to files, folders and shares should be locked down via NTFS (requires Windows NT or higher). Use the concept of minimal necessary privilege.</p>
<p><strong>User Node Connectivity</strong></p>
<p>The firewall in Service Pack 2 for Windows XP (released 25 August 2004) can be used to limit what ports are open to incoming connections on the Windows XP user node.</p>
<p><strong>Wireless</strong></p>
<p style="text-align: justify;">As wireless becomes more widely deployed and integrated more deeply in day-to-day operations we need to manage security and reliability. It is estimated Lynx that wireless installations can provide up to a 40% reduction in installation costs over standard fixed line installations. But wireless and the ubiquity of the web means that the network perimeter is now on the user node's desktop.</p>
<p style="text-align: justify;">NAC and NAP, introduced earlier, will work with Extensible Authentication Protocol-Transport Level Security (EAP-TLS). EAP-TLS is used as a wireless authentication protocol. This means the wireless user node can still be managed for patching, AV and security compliance on the same basis as fixed line (e.g. Ethernet) connected user nodes.</p>
<p style="text-align: justify;">EAP-TLS is scalable but requires Windows 2000 and Active Directory with Group Policy. To encrypt wireless traffic, 802.1x is recommended and if you wanted to investigate single sign on for your users across the domain then you could look at Public Key Infrastructure (PKI).</p>
<p style="text-align: justify;">As part of your network and security auditing you will want to check the wireless aspect and the netstumbler tool will run on a wireless client and report on any wireless networks that have sufficient strength to be picked up.</p>
<p style="text-align: justify;">As a part of your physical security for wireless networking you should consider placing Wireless Access Points (WAPs) in locations that provide restricted user access, for example in the ceiling cavity. Of course you will need to ensure that ypu achieve the right balance of physical security and usability, making sure that the signal is still strong enough to be used.</p>
<p><strong>Layer 8 of the OSI model</strong></p>
<p style="text-align: justify;">The user was jokingly referred to as being the eighth layer in the OSI model and it is here that social engineering and other non-technical reconnaissance and attack methods can be attempted. Kevin Mitnick has written “The Art Of Deception: Controlling The Human Element Of Security” which is highly regarded in the IT security environment.</p>
<p style="text-align: justify;">One counter measure to employ for social engineering is ensuring that all physical material is disposed of securely. This includes internal phone lists, hard copy documents, software user manuals etc. User education is one of the most important actions so you could consider user friendly training with workshops and reminders (posters, email memo's, briefings) to create a security conscious work place.</p>
<p><strong>Free Microsoft Security Tools</strong></p>
<p style="text-align: justify;">MBSA, mentioned earlier, helps audit the security configuration of a user/server node. Other free Microsoft tools are the <strong>Exchange Best Practice Analyser</strong>, <strong>SQL Best Practice Analyser </strong>and the <strong>Microsoft Audit Collection System</strong>.</p>
<p style="text-align: justify;">For conducting event log analysis you could use the Windows Server 2003 Resource Kit tool called EventcombMT. User education can be enhanced with visual reminders like a login message or posters promoting password security.</p>
<p style="text-align: justify;">For developing operational guidelines the IT Infrastructure Library (ITIL) provides a comprehensive and customisable solution. ITIL was developed by the UK government and is now used internationally. Microsoft's own framework, Microsoft Operations Framework draws from ITIL. There is also assistance in designing and maintaining a secure network provided free by Microsoft called “Security Operations Guide”</p>
<h2 style="text-align: left;" align="right">Summary</h2>
<p style="text-align: justify;">Overall then, the aim is to provide layers of defence. For this you could use a Cisco PIX as your hardware firewall (first firewall) with a Microsoft ISA 2004 as your application layer firewall (second firewall). You may also use additional ISA 2004's for internal firewalls to screen branch to Head Office traffic.</p>
<p style="text-align: justify;">The user node will authenticate to the domain. Cisco NAC and Microsoft NAQC/NAP will provide a security audit, authentication and enforcement on these user nodes connecting to the LAN that gain authorisation. If any action is required to make the user node meet the specified corporate security policies this will be carried out by moving the user node to a restricted part of the network.</p>
<p style="text-align: justify;">Once the user node is authenticated, authorised and compliant with the corporate security policy then it will be allowed to connect to its full, allowed rights as part of the Private network. If using wireless the EAP-TLS may be used for the authentication and 802.1x for the encryption of the wireless traffic.</p>
<p style="text-align: justify;">To help strengthen the LAN if the outer perimeter is defeated you need to look at segmenting the network. This will help minimise or delay malicious and undesirable activity from spreading throughout your private network. VLANs will assist with creating workgroups based on job function, allowing you to restrict the scope of network access a user may have.</p>
<p style="text-align: justify;">For example rather than any user being able to browse to the Payroll server you can use VLANs to restrict access to that server to only the HR department. Routers can help to minimise the spread of network worms and undesirable traffic by introducing Access Control Lists (ACLs).</p>
<p style="text-align: justify;">To minimise the chance of “island hopping” where a compromised machine is used to target another machine, you should ensure that the OS of all clients and Servers are hardened as much as possible – remove unnecessary services, patch, remove default admin shares if not used and enforce complex passwords.</p>
<p style="text-align: justify;">Also stop clients from having easy access to another client machine unless it is necessary. Instead build more secure client to server access. The server will typically have better security because it is part of a smaller group of machines, thus more manageable and its is also a more high profile machine.</p>
<p style="text-align: justify;">Applications should be patched and counter measures put in place for known vulnerabilities. This includes Microsoft Exchange, SQL and IIS, which are high on a malicious hackers attack list. The data on the servers can then be secured using NTFS permissions to only permit those who are authorised to access the data in the manner you specify.</p>
<p style="text-align: justify;" align="right"><em>Overall the presentation showed me that a more integrated approach was being taken by vendors to Network security. Interoperability is going to be important to ensure the longevity of your solution but it is refreshing to see two large players in the IT industry like Cisco and Microsoft working together.</em></p>]]></description>
			<category>More Reading</category>
			<pubDate>Mon, 18 Jul 2011 07:50:06 +1000</pubDate>
		</item>
		<item>
			<title>A Day In The Antivirus World</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/member-contributions-antivirus.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/member-contributions-antivirus.html</guid>
			<description><![CDATA[<p>This article written by <strong>Campbell Taylor - 'Global'</strong>, is a review of the information learnt from a one day visit to McAfee and includes personal observations or further information that he felt were useful to the overall article. He refers to malicious activity as a term to cover the range of activity that includes worms, viruses, backdoors, Trojans, and exploits. <em>Italics </em>indicate a personal observation or comment.</p>
<p>In December 2004 I was invited to a one day workshop at McAfee's offices and AVERT lab at Aylesbury in England . As you are probably aware McAfee is an anti-virus (AV) vendor and AVERT ( Anti-Virus Emergency Response Team) is McAfee's AV research lab. <br /><br />This visit is the basis for the information in this document and is split into 4 parts:<br /><br />1) THREAT TRENDS <br /><br />2) SECURITY TRENDS <br /><br />3) SOME OF TODAY'S SECURITY RESPONSES <br /><br />4) AVERT LAB VISIT</p>
<h2>Threat Trends</h2>
<p style="text-align: justify;"><strong>Infection by Browsing</strong></p>
<p style="text-align: justify;">Browsing looks set to become a bigger method of infection by a virus in the near future but there was also concern about the potential for a ‘media independent propagation by a virus', that I found very interesting.</p>
<p style="text-align: justify;"><strong>&nbsp;</strong></p>
<p style="text-align: justify;"><strong>Media Independent propagation</strong></p>
<p style="text-align: justify;">By media independent I mean that the virus is not constrained to travelling over any specific media like Ethernet or via other physical infrastructure installations. McAfee's research showed a security risk with wireless network deployment which is discussed in the Security Trends section of this document.</p>
<p style="text-align: justify;">So what happens if a virus or worm were able to infect a desktop via any common method and that desktop was part of a wired and wireless network? Instead of just searching the fixed wire LAN for targets, the virus/worm looks for wireless networks that are of sufficient strength to allow it to jump into that network.</p>
<p style="text-align: justify;"><em>You can draw up any number of implications from this but my personal observation is that this means you have to consider the wireless attack vector as seriously as the fixed wire attack vector. This reinforces the concept that the network perimeter is no longer based on the Internet/Corporate LAN perimeter and instead it now sits wherever interaction between the host machine and foreign material exists. This could be the USB memory key from home, files accessed on a compromised server or the web browser accessing a website.</em></p>
<p>An interesting observation from the McAfee researcher was that this would mean a virus/worm distribution starting to follow a more biological distribution. In other words you would see concentrations of the virus in metropolitan areas and along key meeting places like cyber cafes or hotspots.</p>
<p style="text-align: justify;"><strong>Distributed Denial of Service (DDos)</strong></p>
<p style="text-align: justify;">DDoS attacks are seen as continuing threat because of the involvement of criminals in the malicious hacker/cracker world. Using DDoS for extortion provides criminals with a remote control method of raising capital.</p>
<p style="text-align: justify;">Virus writers are starting to instruct their bot armies to coordinate their time keeping by accessing Internet based time servers. This means that all bots are using a consistent time reference. In turn this makes any DDos that much more effective than relying on independent sources of time reference.</p>
<p style="text-align: justify;"><em>As a personal note, Network administrators and IT security people might consider who needs access to Internet based Time servers. You may think about applying an access control list (ACL) that only permits NTP from one specified server in your network and denying all other NTP traffic. The objective is to reduce the chances of any of your machines being used as part of a bot army for DDos attacks.</em></p>
<p style="text-align: justify;"><strong>Identity Theft</strong></p>
<p style="text-align: justify;">This was highlighted as a significant likely trend in the near future and is part of the increase in Phishing attacks that have been intercepted by MessageLabs.</p>
<p style="text-align: justify;"><strong>SOCKS used in sophisticated identify theft</strong></p>
<p>McAfee did not go into a lot of detail about this but they pointed out that SOCKS is being used by malicious hackers to bypass corporate firewalls because SOCKS is a proxy service. I don't know much about SOCKS so this is more of a heads up about technologies being used maliciously in the connected world.</p>
<p><strong>Privacy versus security</strong></p>
<p style="text-align: justify;">One of the speakers raised the challenge of privacy versus security. Here the challenge is promoting the use of encrypted traffic to provide protection for data whilst in transit but then the encrypted traffic is more difficult to scan with AV products. In some UK government networks no encrypted traffic is allowed so that all traffic can be scanned.</p>
<p style="text-align: justify;"><em>In my opinion this is going to become more of an issue as consumers and corporates create a demand for the perceived security of HTTPS, for example.</em></p>
<p style="text-align: justify;"><strong>Flexibility versus security</strong></p>
<p style="text-align: justify;">In the McAfee speaker's words this is about “ease of use versus ease of abuse”. If security makes IT too difficult to use effectively then end users will circumvent security.</p>
<p style="text-align: justify;"><em>Sticky notes with passwords on the monitor anyone? </em></p>
<h2><br />Security Trends</h2>
<p style="text-align: justify;"><strong>Wireless Security</strong></p>
<p style="text-align: justify;">Research by McAfee showed that, on average, 60% of all wireless networks were deployed insecurely (many without even the use of WEP keys)</p>
<p style="text-align: justify;">The research was conducted by war driving with a laptop running net stumbler in London and Reading (United Kingdom) and Amsterdam (Netherlands). The research also found that in many locations in major metropolitan areas there was often an overlap of several wireless networks of sufficient strength to attempt a connection.</p>
<p><strong>AV product developments </strong></p>
<p style="text-align: justify;">AV companies are developing and distributing AV products for Personal Digital Assistants (PDAs) and smart phones. For example, F-secure, a Finnish AV firm, is providing AV software for Nokia (which, not surprisingly is based in Finland).</p>
<p style="text-align: justify;">We were told that standard desktop AV products are limited to being reactive in many instances, as they cannot detect a virus until it is written to hard disk. Therefore in a Windows environment - Instant Messaging, Outlook Express and web surfing with Internet Explorer, the user is exposed, as web content is not necessarily written to hard disk.</p>
<p style="text-align: justify;">This is where the concept of desktop firewalls or buffer overflow protection is important. McAfee's newest desktop product, VirusScan 8.0i, offers access protection that is designed to prevent undesired remote connections; it also offers buffer overflow protection. However it is also suggested that a firewall would be useful to stop network worms.</p>
<p style="text-align: justify;">An interesting program that the speaker mentioned (obviously out of earshot of the sales department) was the Proxomitron. The way it was explained to me was that Proxomitron is a local web proxy. It means that web content is written to the hard disk and then the web browser retrieves the web content from the proxy. Because the web content has been written to hard disk your standard desktop AV product can scan for malicious content.</p>
<p style="text-align: justify;">I should clarify at this point that core enterprise/server AV solutions like firewall/web filtering and email AV products are designed to scan in memory as well as the hard disk.</p>
<p style="text-align: justify;"><em>I guess it is to minimise the footprint and performance impact that the desktop AV doesn't scan memory. No doubt marketing is another factor – why kill off your corporate market when it generates substantial income?</em></p>
<p>AV vendors forming partnerships with Network infrastructure vendors</p>
<p><strong>Daily AV definition file releases </strong></p>
<p>McAfee is moving daily definition releases in an attempt to minimise the window of opportunity for infection.</p>
<p><strong>Malicious activity naming </strong></p>
<p style="text-align: justify;">A consistent naming convention that is vendor independent is run by CVE (Common Vulnerabilities and Exposures). McAfee will be including the CVE reference to malicious activity that is ranked by McAfee as being of medium threat or higher.</p>
<p style="text-align: justify;"><em>O</em><em>ther vendors may use a different approach but I feel the use of a common reference method will help people in the IT industry to correlate information data about malicious activity form different sources rather than the often painful (for me at least) hunting exercise we engage in to get material from different vendors or sources about malicious activity.</em></p>
<p style="text-align: justify;"><strong>AV products moving from reactive detection to proactive blocking of suspect behaviour</strong></p>
<p style="text-align: justify;">New AV products from McAfee (for example VirusScan 8.0i) are including suspect behaviour detection and blocking as well as virus signature detection. This acknowledges that virus detection by a virus signature is a reactive action. So by blocking suspicious behaviour you can prevent potential virus activity before a virus signature has been developed. For example port blocking can be used to stop a mydoom style virus from opening ports for backdoor access.</p>
<p style="text-align: justify;"><em>A personal observation is that Windows XP Service Pack 2 does offer a Firewall but this is a limited firewall as it provides port blocking only for traffic attempting to connect to the host. Therefore it would not stop a network worm searching for vulnerable targets.</em></p>
<h2 style="text-align: justify;">Some of Today's Security Responses</h2>
<p style="text-align: justify;"><strong>Detecting potential malicious activity - Network</strong></p>
<p style="text-align: justify;">Understand your network's traffic patterns and develop a baseline of network traffic. If you see a significant unexpected change in your network traffic you may be seeing the symptoms of malicious activity.</p>
<p style="text-align: justify;"><strong>Detecting potential malicious activity - Client workstation</strong></p>
<p style="text-align: justify;">On a Windows workstation if you run “ <strong>netstat –a </strong>” from the command line you can see the ports that the workstation has open and to whom it's trying to connect. If you see ports open that are unexpected, especially ones outside of the well known range (1 – 1024) or connections to unexpected IP addresses, then further investigation may be worthwhile.</p>
<p style="text-align: justify;"><strong>Tightening Corporate Email security</strong></p>
<p style="text-align: justify;">With the prevalence of mass mailing worms and viruses McAfee offered a couple of no/low cost steps that help to tighten your email security.</p>
<ol style="text-align: justify;">
<li>Prevent all SMTP traffic in/outwards that is not for your SMTP server</li>
<li>Prevent MX record look up</li>
<li>Create a honeypot email address in your corporate email address book so that any mass mail infections will send an email to this honeypot account and alert you to the infection. It was suggested that the email account be inconspicuous e.g. not containing any admin, net, help, strings in the address. Something like '<strong>#_#@your domain</strong>' would probably work.</li>
</ol>
<h2>AVERT LAB VISIT</h2>
<p>We were taken to the AVERT labs where we were shown the path from the submission of a suspected malicious sample through to the testing of the suspect sample and then to the development of the removal tools and definition files, their testing and deployment.</p>
<p style="text-align: justify;">Samples are collected by submission via email, removable media via mail (e.g. CD or floppy disk) or captured via AVERT's honeypots in the wild.</p>
<p style="text-align: justify;">Once a sample is received a copy is run on a goat rig. A goat rig is a test/sacrificial machine. The phrase “goat rig” comes from the practice in the past of tethering a goat in a clearing to attract animals the hunter wanted to capture. In this case the goat rig was a powerful workstation running several virtual machines courtesy of VMware software that were in a simulated LAN. The simulation went so far as to include a simulated access point to the Internet and Internet based DNS server.</p>
<p style="text-align: justify;">The sample is run on the goat rig for observational tests. Observational tests are the first tests conducted after the sample has been scanned for known malicious signature files. Naturally malicious activity is not often visible to the common end user, so observable activity means executing the sample and looking for files or registry keys created by the sample, new ports opened and unexpected suspicious network traffic from the test machine.</p>
<p style="text-align: justify;">As a demonstration the lab technicians ran a sample of the mydoom virus and the observable behaviour at this point was the opening of port 3127 on the test host, unexpected network traffic from the test host and newly created registry keys. The lab technician pointed out that a firewall on the host, blocking unused ports, would have very easily prevented mydoom from spreading.</p>
<p style="text-align: justify;">Following observational tests the sample will be submitted for reverse engineering if it's considered complex enough or it warrants further investigation.</p>
<p style="text-align: justify;"><em>AVERT engineers that carry out reverse engineering are located throughout the world and I found it interesting that these reverse engineers and Top AV researchers maintain contact with their peers in the other main AV vendors. This collaboration is not maintained by the AV vendors but by the AV engineers so that it is based on a trust relationship. This means that the knowledge about a sample that has been successfully identified and reverse engineered to identify payload, characteristics etc is passed to others in the AV trust group.</em></p>
<p style="text-align: justify;">From the test lab we went through to the AV definition testing lab. After the detection rules and a new AV definition have been written the definition is submitted to this lab. The lab runs an automated test that applies the updated AV definition on most known Operating System platforms and against a wide reference store of known applications.</p>
<p style="text-align: justify;">The intention is to prevent the updated AV definition from giving false positives on known safe applications.</p>
<p style="text-align: justify;"><em>Imagine the grief if an updated AV definition provided a false positive on Microsoft's Notepad! </em></p>
<p style="text-align: justify;">One poor soul was in a corner busy surfing the web and downloading all available material to add to their reference store of applications for testing future AV definitions.</p>
<p style="text-align: justify;">After passing the reference store test an email is sent to all subscribers of the McAfee DAT notification service and the updated AV definition is made available on the McAfee website for download.</p>
<p style="text-align: justify;">In summary, the AVERT lab tour was an informative look behind the scenes, without much of a sales pitch, and I found the co-operation amongst AV researchers of different AV companies very interesting.</p>]]></description>
			<category>More Reading</category>
			<pubDate>Mon, 18 Jul 2011 07:31:24 +1000</pubDate>
		</item>
		<item>
			<title>Code-Red Worms: A Global Threat </title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/code-red-worm.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/code-red-worm.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The first incarnation of the <strong>Code-Red worm</strong> (<strong>CRv1</strong>) began to infect hosts running unpatched versions of Microsoft's IIS webserver on July 12th, 2001. The first version of the worm uses a static seed for it's random number generator. Then, around 10:00 UTC in the morning of July 19th, 2001, a random seed variant of the <strong>Code-Red worm</strong> (<strong>CRv2</strong>) appeared and spread. This second version shared almost all of its code with the first version, but spread much more rapidly. Finally, on August 4th, a new worm began to infect machines exploiting the same vulnerability in Microsoft's IIS webserver as the original Code-Red virus. Although the new worm shared almost no code with the two versions of the original worm, it contained in its source code the string "CodeRedII" and was thus named <span style="color: #6666cc;">CodeRed II</span>. The characteristics of each worm are explained in greater detail below.</p>
<h2>The IIS .ida Vulnerability</h2>
<p style="text-align: justify;">On June 18, 2001 eEye released information about a buffer-overflow vulnerability in Microsoft's IIS webservers.</p>
<p style="text-align: justify;">The remotely exploitable vulnerability was discovered by Riley Hassell. It allows system-level execution of code and thus presents a serious security risk. The buffer-overflow is exploitable because the ISAPI (Internet Server Application Program Interface) .ida (indexing service) filter fails to perform adequate bounds checking on its input buffers.</p>
<h2>Code-Red version 1 (CRv1)</h2>
<p style="text-align: justify;">On July 12, 2001, a worm began to exploit the aforementioned buffer-overflow vulnerability in Microsoft's IIS webservers. Upon infecting a machine, the worm checks to see if the date (as kept by the system clock) is between the first and the nineteenth of the month. If so, the worm generates a random list of IP addresses and probes each machine on the list in an attempt to infect as many computers as possible. However, this first version of the worm uses a static seed in its random number generator and thus generates identical lists of IP addresses on each infected machine.</p>
<p style="text-align: justify;">The first version of the worm spread slowly, because each infected machine began to spread the worm by probing machines that were either infected or impregnable. The worm is programmed to stop infecting other machines on the 20th of every month. In its next attack phase, the worm launches a Denial-of-Service attack against www1.whitehouse.gov from the 20th-28th of each month.</p>
<p style="text-align: justify;">On July 13th, Ryan Permeh and Marc Maiffret at eEye Digital Security received logs of attacks by the worm and worked through the night to disassemble and analyze the worm. They christened the worm "Code-Red" both because the highly caffeinated "Code Red" Mountain Dew fueled their efforts to understand the workings of the worm and because the worm defaces some web pages with the phrase "Hacked by Chinese". There is no evidence either supporting or refuting the involvement of Chinese hackers with the Code-Red worm.</p>
<p style="text-align: justify;">The first version of the Code-Red worm caused very little damage. The worm did deface web pages on some machines with the phrase "Hacked by Chinese." Although the worm's attempts to spread itself consumed resources on infected machines and local area networks, it had little impact on global resources.</p>
<p style="text-align: justify;">The Code-Red version 1 worm is memory resident, so an infected machine can be disinfected by simply rebooting it. However, once-rebooted, the machine is still vulnerable to repeat infection. Any machines infected by Code-Red version 1 and subsequently rebooted were likely to be reinfected, because each newly infected machine probes the same list of IP addresses in the same order.</p>
<h2>Code-Red version 2</h2>
<p style="text-align: justify;">At approximately 10:00 UTC in the morning of July 19th, 2001 a random seed variant of the Code-Red worm (CRv2) began to infect hosts running unpatched versions of Microsoft's IIS webserver. The worm again spreads by probing random IP addresses and infecting all hosts vulnerable to the IIS exploit. Code-Red version 2 lacks the static seed found in the random number generator of Code-Red version 1. In contrast, Code-Red version 2 uses a random seed, so each infected computer tries to infect a different list of randomly generated IP addresses. This seemingly minor change had a major impact: more than 359,000 machines were infected with Code-Red version 2 in just fourteen hours.</p>
<p>Because Code-Red version 2 is identical to Code-Red version 1 in all respects except the seed for its random number generator, its only actual damage is the "Hacked by Chinese" message added to top level webpages on some hosts. However, Code-Red version 2 had a greater impact on global infrastructure due to the sheer volume of hosts infected and probes sent to infect new hosts. Code-Red version 2 also wreaked havoc on some additional devices with web interfaces, such as routers, switches, DSL modems, and printers. Although these devices were not infected with the worm, they either crashed or rebooted when an infected machine attempted to send them a copy of the worm.</p>
<p>Like Code-Red version 1, Code-Red version 2 can be removed from a computer simply by rebooting it. However, rebooting the machine does not prevent reinfection once the machine is online again. On July 19th, the probe rate to hosts was so high that many machines were infected as the patch for the .ida vulnerability was applied.</p>
<h2>CodeRedII</h2>
<p style="text-align: justify;">On August 4, 2001, an entirely new worm, CodeRedII began to exploit the buffer-overflow vulnerability in Microsoft's IIS webservers. Although the new worm is completely unrelated to the original Code-Red worm, the source code of the worm contained the string "CodeRedII" which became the name of the new worm.</p>
<p style="text-align: justify;">Ryan Permeh and Marc Maiffret analyzed CodeRedII to determine its attack mechanism. When a worm infects a new host, it first determines if the system has already been infected. If not, the worm initiates its propagation mechanism, sets up a "backdoor" into the infected machine, becomes dormant for a day, and then reboots the machine. Unlike Code-Red, CodeRedII is not memory resident, so rebooting an infected machine does not eliminate CodeRedII.</p>
<p style="text-align: justify;">After rebooting the machine, the CodeRedII worm begins to spread. If the host infected with CodeRedII has Chinese (Taiwanese) or Chinese (PRC) as the system language, it uses 600 threads to probe other machines. All other machines use 300 threads.</p>
<p style="text-align: justify;">CodeRedII uses a more complex method of selecting hosts to probe than Code-Red. CodeRedII generates a random IP address and then applies a mask to produce the IP address to probe. The length of the mask determines the similarity between the IP address of the infected machine and the probed machine. 1/8th of the time, CodeRedII probes a completely random IP address. 1/2 of the time, CodeRedII probes a machine in the same /8 (so if the infected machine had the IP address 10.9.8.7, the IP address probed would start with 10.), while 3/8ths of the time, it probes a machine on the same /16 (so the IP address probed would start with 10.9.).</p>
<p style="text-align: justify;">Like Code-Red, CodeRedII avoids probing IP addresses in 224.0.0.0/8 (multicast) and 127.0.0.0/8 (loopback). The bias towards the local /16 and /8 networks means that an infected machine may be more likely to probe a susceptible machine, based on the supposition that machines on a single network are more likely to be running the same software as machines on unrelated IP addresses.</p>
<p style="text-align: justify;">The CodeRedII worm is much more dangerous than Code-Red because CodeRedII installs a mechanism for remote, root-level access to the infected machine. Unlike Code-Red, CodeRedII neither defaces web pages on infected machines nor launches a Denial-of-Service attack. However, the backdoor installed on the machine allows any code to be executed, so the machines could be used as zombies for future attacks (DoS or otherwise).</p>
<p style="text-align: justify;">A machine infected with CodeRedII must be patched to prevent reinfection and then the CodeRedII worm must be removed. A security patch for this vulnerability is available from Microsoft at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/topics/codealrt.asp. A tool that disinfects a computer infected with CodeRedII is also available: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31878.</p>
<h2>CAIDA Analysis</h2>
<p style="text-align: justify;">CAIDA's ongoing analysis of the Code-Red worms includes a detailed analysis of the spread of Code-Red version 2 on July 19, 2001, a follow-up survey of the patch rate of machines infected on July 19th, and dynamic graphs showing the prevalence of Code-Red version 2 and CodeRedII worldwide.</p>
<h3>The Spread of the Code-Red Worm (CRv2)</h3>
<p style="text-align: justify;">An analysis of the spread of the Code-Red version 2 worm between midnight UTC July 19, 2001 and midnight UTC July 20, 2001.</p>
<p style="text-align: justify;">On July 19, 2001 more than 359,000 computers were infected with the Code-Red (CRv2) worm in less than 14 hours. At the peak of the infection frenzy, more than 2,000 new hosts were infected each minute. 43% of all infected hosts were in the United States, while 11% originated in Korea followed by 5% in China and 4% in Taiwan. The .NET Top Level Domain (TLD) accounted for 19% of all compromised machines, followed by .COM with 14% and .EDU with 2%. We also observed 136 (0.04%) .MIL and 213 (0.05%) .GOV hosts infected by the worm. An animation of the geographic expansion of the worm is available.</p>
<h3>Animations</h3>
<p style="text-align: justify;">To help us visualize the initial spread of Code-Red version 2, Jeff Brown created an animation of the geographic spread of the worm in five minute intervals between midnight UTC on July 19, 2001 and midnight UTC on July 20, 2001. For the animation, infected hosts were mapped to latitude and longitude values using ipmapper, and aggregated by the number at each unique location. The radius of each circle is sized relative to the infected hosts mapped to the center of the circle using the formula 1+ln(total-infected-hosts). When smaller circles are obscured by larger circles, their totals are not combined with the larger circle; the smaller data points are hidden from view.</p>
<p style="text-align: justify;">Although we attempted to identify the geographic location of each host as accurately<br />as possible, in many cases the granularity of the location was limited to the country of origin. We plot these hosts at the center of their respective countries. Thus, the rapidly expanding central regions of most countries is an artifact of the localization method.</p>
<p style="text-align: justify;">Animations created by Jeff Brown (UCSD CSE department), based on analysis by David Moore (CAIDA at SDSC). <br />Copyright UC Regents 2001.</p>
<div id="_mcePaste" class="mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px;">
<table border="0" class="bodyline" style="width: 100%;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>
<table border="0" style="width: 100%;" cellspacing="0" cellpadding="0" align="center">
<tbody>
<tr valign="top">
<td style="width: 100%;" valign="top">
<div align="center">
<table border="0" style="width: 630px;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="width: 645px; height: 3739px;" valign="top">
<p><strong><span style="color: #00ffff;">About Code-Red</span></strong></p>
<p>The first incarnation of the <span style="color: #00ff00;">Code-Red worm (CRv1)</span> began to infect hosts running unpatched versions of Microsoft's IIS webserver on July 12th, 2001. The first version of the worm uses a static seed for it's random number generator. Then, around 10:00 UTC in the morning of July 19th, 2001, a random seed variant of the <span style="color: #ff9900;">Code-Red worm (CRv2)</span> appeared and spread. This second version shared almost all of its code with the first version, but spread much more rapidly. Finally, on August 4th, a new worm began to infect machines exploiting the same vulnerability in Microsoft's IIS webserver as the original Code-Red virus. Although the new worm shared almost no code with the two versions of the original worm, it contained in its source code the string "CodeRedII" and was thus named <span style="color: #6666cc;">CodeRed II</span>. The characteristics of each worm are explained in greater detail below.</p>
<p><strong><span style="color: #ffff33;">The IIS .ida Vulnerability </span></strong></p>
<p>Detailed information about the IIS .ida vulnerability can be found at eEye<br />(http://www.eeye.com/html/Research/Advisories/AD20010618.html).</p>
<p>On June 18, 2001 eEye released information about a buffer-overflow vulnerability in Microsoft's IIS webservers.</p>
<p>The remotely exploitable vulnerability was discovered by Riley Hassell. It allows system-level execution of code and thus presents a serious security risk. The buffer-overflow is exploitable because the ISAPI (Internet Server Application Program Interface) .ida (indexing service) filter fails to perform adequate bounds checking on its input buffers.</p>
<p>A security patch for this vulnerability is available from Microsoft at<br />http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/topics/codealrt.asp.</p>
<p><br /><strong><span style="color: #00ff00;">Code-Red version 1 (CRv1) </span></strong></p>
<p>Detailed information about Code-Red version 1 can be found at eEye<br />(http://www.eeye.com/html/Research/Advisories/AL20010717.html).</p>
<p>On July 12, 2001, a worm began to exploit the aforementioned buffer-overflow vulnerability in Microsoft's IIS webservers. Upon infecting a machine, the worm checks to see if the date (as kept by the system clock) is between the first and the nineteenth of the month. If so, the worm generates a random list of IP addresses and probes each machine on the list in an attempt to infect as many computers as possible. However, this first version of the worm uses a static seed in its random number generator and thus generates identical lists of IP addresses on each infected machine.</p>
<p>The first version of the worm spread slowly, because each infected machine began to spread the worm by probing machines that were either infected or impregnable. The worm is programmed to stop infecting other machines on the 20th of every month. In its next attack phase, the worm launches a Denial-of-Service attack against www1.whitehouse.gov from the 20th-28th of each month.</p>
<p>On July 13th, Ryan Permeh and Marc Maiffret at eEye Digital Security received logs of attacks by the worm and worked through the night to disassemble and analyze the worm. They christened the worm "Code-Red" both because the highly caffeinated "Code Red" Mountain Dew fueled their efforts to understand the workings of the worm and because the worm defaces some web pages with the phrase "Hacked by Chinese". There is no evidence either supporting or refuting the involvement of Chinese hackers with the Code-Red worm.</p>
<p>The first version of the Code-Red worm caused very little damage. The worm did deface web pages on some machines with the phrase "Hacked by Chinese." Although the worm's attempts to spread itself consumed resources on infected machines and local area networks, it had little impact on global resources.</p>
<p>The Code-Red version 1 worm is memory resident, so an infected machine can be disinfected by simply rebooting it. However, once-rebooted, the machine is still vulnerable to repeat infection. Any machines infected by Code-Red version 1 and subsequently rebooted were likely to be reinfected, because each newly infected machine probes the same list of IP addresses in the same order.</p>
<p><br /><strong><span style="color: #ff9900;">Code-Red version 2 </span></strong></p>
<p>Detailed information about Code-Red version 2 can be found at eEye<br />(http://www.eeye.com/html/Research/Advisories/AL20010717.html) and silicon defense (http://www.silicondefense.com/cr/).</p>
<p>At approximately 10:00 UTC in the morning of July 19th, 2001 a random seed variant of the Code-Red worm (CRv2) began to infect hosts running unpatched versions of Microsoft's IIS webserver. The worm again spreads by probing random IP addresses and infecting all hosts vulnerable to the IIS exploit. Code-Red version 2 lacks the static seed found in the random number generator of Code-Red version 1. In contrast, Code-Red version 2 uses a random seed, so each infected computer tries to infect a different list of randomly generated IP addresses. This seemingly minor change had a major impact: more than 359,000 machines were infected with Code-Red version 2 in just fourteen hours.</p>
<p>Because Code-Red version 2 is identical to Code-Red version 1 in all respects except the seed for its random number generator, its only actual damage is the "Hacked by Chinese" message added to top level webpages on some hosts. However, Code-Red version 2 had a greater impact on global infrastructure due to the sheer volume of hosts infected and probes sent to infect new hosts. Code-Red version 2 also wreaked havoc on some additional devices with web interfaces, such as routers, switches, DSL modems, and printers. Although these devices were not infected with the worm, they either crashed or rebooted when an infected machine attempted to send them a copy of the worm.</p>
<p>Like Code-Red version 1, Code-Red version 2 can be removed from a computer simply by rebooting it. However, rebooting the machine does not prevent reinfection once the machine is online again. On July 19th, the probe rate to hosts was so high that many machines were infected as the patch for the .ida vulnerability was applied.</p>
<p><br /><strong><span style="color: #6666cc;">CodeRedII </span></strong></p>
<p>Detailed information about CodeRedII can be found at eEye (http://www.eeye.com/html/Research/Advisories/AL20010804.html) and http://aris.securityfocus.com/alerts/codered2/.</p>
<p>On August 4, 2001, an entirely new worm, CodeRedII began to exploit the buffer-overflow vulnerability in Microsoft's IIS webservers. Although the new worm is completely unrelated to the original Code-Red worm, the source code of the worm contained the string "CodeRedII" which became the name of the new worm.</p>
<p>Ryan Permeh and Marc Maiffret analyzed CodeRedII to determine its attack mechanism. When a worm infects a new host, it first determines if the system has already been infected. If not, the worm initiates its propagation mechanism, sets up a "backdoor" into the infected machine, becomes dormant for a day, and then reboots the machine. Unlike Code-Red, CodeRedII is not memory resident, so rebooting an infected machine does not eliminate CodeRedII.</p>
<p>After rebooting the machine, the CodeRedII worm begins to spread. If the host infected with CodeRedII has Chinese (Taiwanese) or Chinese (PRC) as the system language, it uses 600 threads to probe other machines. All other machines use 300 threads.</p>
<p>CodeRedII uses a more complex method of selecting hosts to probe than Code-Red. CodeRedII generates a random IP address and then applies a mask to produce the IP address to probe. The length of the mask determines the similarity between the IP address of the infected machine and the probed machine. 1/8th of the time, CodeRedII probes a completely random IP address. 1/2 of the time, CodeRedII probes a machine in the same /8 (so if the infected machine had the IP address 10.9.8.7, the IP address probed would start with 10.), while 3/8ths of the time, it probes a machine on the same /16 (so the IP address probed would start with 10.9.).</p>
<p>Like Code-Red, CodeRedII avoids probing IP addresses in 224.0.0.0/8 (multicast) and 127.0.0.0/8 (loopback). The bias towards the local /16 and /8 networks means that an infected machine may be more likely to probe a susceptible machine, based on the supposition that machines on a single network are more likely to be running the same software as machines on unrelated IP addresses.</p>
<p>The CodeRedII worm is much more dangerous than Code-Red because CodeRedII installs a mechanism for remote, root-level access to the infected machine. Unlike Code-Red, CodeRedII neither defaces web pages on infected machines nor launches a Denial-of-Service attack. However, the backdoor installed on the machine allows any code to be executed, so the machines could be used as zombies for future attacks (DoS or otherwise).</p>
<p>A machine infected with CodeRedII must be patched to prevent reinfection and then the CodeRedII worm must be removed. A security patch for this vulnerability is available from Microsoft at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/topics/codealrt.asp. A tool that disinfects a computer infected with CodeRedII is also available: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31878.</p>
<p><strong><span style="color: #99ff00;">CAIDA Analysis </span></strong></p>
<p>CAIDA's ongoing analysis of the Code-Red worms includes a detailed analysis of the spread of Code-Red version 2 on July 19, 2001, a follow-up survey of the patch rate of machines infected on July 19th, and dynamic graphs showing the prevalence of Code-Red version 2 and CodeRedII worldwide.</p>
<p><strong><span style="color: #ff3300;">The Spread of the Code-Red Worm (CRv2) </span></strong></p>
<p>An analysis of the spread of the Code-Red version 2 worm between midnight UTC July 19, 2001 and midnight UTC July 20, 2001.</p>
<p>On July 19, 2001 more than 359,000 computers were infected with the Code-Red (CRv2) worm in less than 14 hours. At the peak of the infection frenzy, more than 2,000 new hosts were infected each minute. 43% of all infected hosts were in the United States, while 11% originated in Korea followed by 5% in China and 4% in Taiwan. The .NET Top Level Domain (TLD) accounted for 19% of all compromised machines, followed by .COM with 14% and .EDU with 2%. We also observed 136 (0.04%) .MIL and 213 (0.05%) .GOV hosts infected by the worm. An animation of the geographic expansion of the worm is available.</p>
<p><strong><span style="color: #ff66ff;">Animations</span></strong></p>
<p>To help us visualize the initial spread of Code-Red version 2, Jeff Brown created an animation of the geographic spread of the worm in five minute intervals between midnight UTC on July 19, 2001 and midnight UTC on July 20, 2001. For the animation, infected hosts were mapped to latitude and longitude values using ipmapper, and aggregated by the number at each unique location. The radius of each circle is sized relative to the infected hosts mapped to the center of the circle using the formula 1+ln(total-infected-hosts). When smaller circles are obscured by larger circles, their totals are not combined with the larger circle; the smaller data points are hidden from view.</p>
<p>Although we attempted to identify the geographic location of each host as accurately<br />as possible, in many cases the granularity of the location was limited to the country of origin. We plot these hosts at the center of their respective countries. Thus, the rapidly expanding central regions of most countries is an artifact of the localization method.</p>
<p>Animations created by Jeff Brown (UCSD CSE department), based on analysis by David Moore (CAIDA at SDSC). <br />Copyright UC Regents 2001.</p>
<p><a href="https://www.firewall.cx/pictures/movies/newframes-small-log.mov">Quicktime animation of growth by geographic breakdown</a> (200K .mov - requires QuickTime v3 or newer )</p>
</td>
</tr>
</tbody>
</table>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div>]]></description>
			<category>More Reading</category>
			<pubDate>Sat, 16 Jul 2011 17:59:36 +1000</pubDate>
		</item>
		<item>
			<title>Windows  Bugs Everywhere!</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/windows-bugs.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/windows-bugs.html</guid>
			<description><![CDATA[<h2>Vulnerabilities, bugs and exploits will keep you on your toes</h2>
<p>Every day a new exploit, bug, or vulnerability is found and reported on the Internet, in the news and on TV. Although Microsoft seems to get the greatest number of bug reports and alerts, they are not alone. Bugs are found in all of the operating systems, whether it is server software, desktop software or imbedded systems. <br /><br />Here is a list of bugs and flaws affecting Microsoft products that have been uncovered just in the month of <strong>June 2001</strong>:</p>
<ul>
<li>MS Windows 2000 LDAP SSL Password Modification Vulnerability</li>
<li>MS IIS Unicode .asp Source Code Disclosure Vulnerability</li>
<li>MS Visual Studio RAD Support Buffer Overflow Vulnerability</li>
<li>MS Index Server and Indexing Service ISAPI Extension</li>
<li>Buffer Overflow Vulnerability</li>
<li>MS SQL Server Administrator Cached Connection Vulnerability</li>
<li>MS Windows 2000 Telnet Privilege Escalation Vulnerability</li>
<li>MS Windows 2000 Telnet Username DoS Vulnerability</li>
<li>MS Windows 2000 Telnet System Call DoS Vulnerability</li>
<li>MS Windows 2000 Telnet Multiple Sessions DoS Vulnerability</li>
<li>MS W2K Telnet Various Domain User Account Access Vulnerability</li>
<li>MS Windows 2000 Telnet Service DoS Vulnerability</li>
<li>MS Exchange OWA Embedded Script Execution Vulnerability</li>
<li>MS Internet Explorer File Contents Disclosure Vulnerability</li>
<li>MS Outlook Express Address Book Spoofing Vulnerability</li>
</ul>
<p><br />The mere frequency and number of bugs that are being found does not bode well for Microsoft and the security of their programming methods. These are just the bugs that have been found and reported, but bugs like the Internet Explorer bug may have been around and exploited for months and hidden from discovery by the underground community.<br /><br />But it isn't just Microsoft that is plagued with bugs and vulnerabilities. All flavors of <strong>Linux</strong> have their share of serious bugs also. The vulnerabilities below have also been discovered or reported for the month of <strong>June 2001</strong>:</p>
<ul>
<li>Procfs Stream Redirection to Process Memory Vulnerability</li>
<li>Samba remote root vulnerability</li>
<li>Buffer overflow in fetchmail vulnerability</li>
<li>cfingerd buffer overflow vulnerability</li>
<li>man/man-db MANPATH bugs exploit</li>
<li>Oracle 8i SQLNet Header Vulnerability</li>
<li>Imap Daemon buffer overflow vulnerability</li>
<li>xinetd logging code buffer overflow vulnerability</li>
<li>Open SSH cookie file deletion vulnerability</li>
<li>Solaris libsldap Buffer Overflow Vulnerability</li>
<li>Solaris Print Protocol buffer overflow vulnerability</li>
</ul>
<p><br />These are not all of the bugs and exploits that affect *nix systems, there are at least as many *nix bugs found in the month of June as there are for Microsoft products. Even the Macintosh OS, the operating system that is famous for being almost hacker proof, is also vulnerable. This is especially true with the release of OS X. This is because OS X is built on an OpenBSD Linux core. Many of the Linux/BSD specific vulnerabilities can also affect the Macintosh OS X. As an example the Macintosh OS X is subject to the SUDO buffer overflow vulnerability.<br /><br />Does all of this mean that you should just throw up your hands and give up? Absolutely not! Taken as a whole the sheer number of bugs and vulnerabilities is massive and almost overwhelming. The point is that if you keep up with the latest patches and fixes, your job of keeping your OS secure is not so daunting.</p>
<p>Keeping up is simple if you just know where to look. Each major OS keeps a section of their Web site that is dedicated to security, fixes and patches. Here is a partial list categorized by operating system:</p>
<p><strong>Windows</strong><br />The Microsoft TechNet section on security contains information on the latest vulnerabilities, bugs, patches and fixes. It also has a searchable database that you can search by product and service pack.</p>
<div><strong>Linux</strong></div>
<div>Since there are so many different flavors of Linux I will list some of the most popular ones here.</div>
<p><strong>RedHat</strong></p>
<p><a href="http://www.redhat.com/support/alerts" target="_parent" rel="nofollow" title="Alerts and Errata">Alerts and Errata</a><span></span><br />RedHat lists some of the most recent vulnerabilities here as well as other security links on the RedHat site and security links that can be found elsewhere on the Web.</p>
<p><strong>Slackware</strong></p>
<p><a href="http://www.slackware.com/lists/archive/" target="_blank" rel="nofollow noopener" title="Security Mailing List Archives">Security Mailing List Archives</a><br />Although not as well organized as the Microsoft or RedHat sites, the mailing list archives contain a wealth of information. The archive is organized by year and then by month.</p>
<p><a href="http://www.apple.com/support/security/" target="_blank" rel="nofollow noopener" title="Apple Product Security">Apple Product Security<br /></a>Even though the Mac is not as prone to security problems as other OSs, you should still take steps to secure your Mac. With the introduction of OS X, security will be more of a concern.</p>
<div id="_mcePaste" class="mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 377px; width: 1px; height: 1px; text-align: justify;"><span style="font-size: 10pt;">Keeping up is simple if you just know where to look. Each major OS keeps a section of their Web site that is dedicated to security, fixes and patches. Here is a partial list categorized by operating system:</span><br /><br /><span style="font-size: 10pt;">Windows</span><br /><br /><span style="font-size: 10pt;">TechNet Security Bulletins</span><br /><span style="font-size: 10pt;">The Microsoft TechNet section on security contains information on the latest vulnerabilities, bugs, patches and fixes. It also has a searchable database that you can search by product and service pack.</span><br /><br /><span style="font-size: 10pt;">Linux</span><br /><br /><span style="font-size: 10pt;">Since there are so many different flavors of Linux I will list some of the most popular ones here.</span><br /><br /><span style="font-size: 10pt;">RedHat</span><br /><br /><span style="font-size: 10pt;">Alerts and Errata</span><br /><span style="font-size: 10pt;">RedHat lists some of the most recent vulnerabilities here as well as other security links on the RedHat site and security links that can be found elsewhere on the Web.</span><br /><br /><span style="font-size: 10pt;">Slackware</span><br /><br /><span style="font-size: 10pt;">Security Mailing List Archives</span><br /><span style="font-size: 10pt;">Although not as well organized as the Microsoft or RedHat sites, the mailing list archives contain a wealth of information. The archive is organized by year and then by month.</span><br /><br /><span style="font-size: 10pt;">SuSe</span><br /><br /><span style="font-size: 10pt;">SuSE Linux Homepage </span><br /><span style="font-size: 10pt;">Included here is an index of alerts and announcements on SuSe security. There is also a link for you to subscribe to the SuSe Security Mailing list.</span><br /><br /><span style="font-size: 10pt;">Solaris</span><br /><br /><span style="font-size: 10pt;">Security</span><br /><span style="font-size: 10pt;">This is one of the most comprehensive and complete security sites of all of the OSs. If you can't find it here, you won't find it anywhere.</span><br /><br /><span style="font-size: 10pt;">Macintosh</span><br /><br /><span style="font-size: 10pt;">Apple Product Security</span><br /><span style="font-size: 10pt;">Even though the Mac is not as prone to security problems as other OSs, you should still take steps to secure your Mac. With the introduction of OS X, security will be more of a concern.</span></div>]]></description>
			<category>More Reading</category>
			<pubDate>Thu, 14 Jul 2011 22:25:33 +1000</pubDate>
		</item>
		<item>
			<title>The Cable Modem Traffic Jam</title>
			<link>https://www.firewall.cx/tools-tips-reviews/more-reading/cable-modems-jam.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/tools-tips-reviews/more-reading/cable-modems-jam.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Tie-ups that slow broadband Internet access to a crawl are a reality--but solutions are near at hand<br /></strong><strong>The Cable Modem Traffic Jam</strong></p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/articles-connectivity-cmtj-1-1.gif" alt="articles-connectivity-cmtj-1-1" width="146" height="146" style="margin: 5px; float: right;" /> Broadband access to the Internet by cable modem promises users lightning-fast download speeds and an always-on connection. And recent converts to broadband from dial-up technology are thrilled with complex Web screens that download before their coffee gets cold.</p>
<p style="text-align: justify;">But, these days, earlier converts to broadband are noticing something different. They are seeing their Internet access rates slow down, instead of speed up. They are sitting in a cable modem traffic jam. In fact, today, a 56K dial-up modem can at times be faster than a cable modem and access can be more reliable.</p>
<p style="text-align: justify;">Other broadband service providers--digital subscriber line (DSL), integrated-services digital networks (ISDNs), satellite high-speed data, and microwave high-speed data--have their own problems. In some cases, service is simply not available; in other situations, installation takes months, or the costs are wildly out of proportion. Some DSL installations work fine until a saturation point of data subscribers per bundle of twisted pairs is reached, when the crosstalk between the pairs can be a problem.&nbsp;</p>
<p style="text-align: justify;">In terms of market share, the leaders in providing broadband service are cable modems and DSL as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/articles-connectivity-cmtj-2-1.gif" alt="articles-connectivity-cmtj-2-1" width="309" height="146" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">But because the cable modem was the first broadband access technology to gain wide popularity, it is the first to face widespread traffic tie-ups. These tie-ups have been made visible by amusing advertisements run by competitors, describing the "bandwidth hog" moving into the neighborhood. In one advertisement, for example, a new family with teenagers is seen as a strain on the shared cable modem interconnection and is picketed. (The message is that this won't happen with DSL, although that is only a half-truth.)</p>
<p style="text-align: justify;">So, today, the cable-modem traffic jam is all too real in many cable systems. In severe cases, even the always-on capability is lost. Still, it is not a permanent limitation of the system. It is a temporary problem with technical solutions, if the resources are available to implement the fixes. But during the period before the corrections are made, the traffic jam can be a headache.</p>
<h2 style="text-align: justify;">Cable modem fundamentals</h2>
<p style="text-align: justify;">Today's traffic jam stems from the rapid acceptance of cable broadband services by consumers. A major factor in that acceptance was the 1997 standardization of modem technology that allowed consumers to own the in-home hardware and be happy that their investment would not be orphaned by a change to another cable service provider.</p>
<p style="text-align: justify;">A cable modem system can be viewed as having several components:</p>
<p><img src="https://www.firewall.cx/images/stories/articles-connectivity-cmtj-3-1.gif" alt="articles-connectivity-cmtj-3-1" width="649" height="250" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The cable modem connects to the subscriber's personal computer through the computer's Ethernet port. The purpose of this connection is to facilitate a safe hardware installation without the need for the cable technician to open the consumer's PC. If the PC does not have an Ethernet socket, commercially available hardware and software can be installed by the subscriber or by someone hired by the subscriber.</p>
<p style="text-align: justify;">Downstream communication (from cable company headend to cable subscriber's modem) is accomplished with the same modulation systems used for cable digital television. There are two options, both using packetized data and quadrature amplitude modulation (QAM) in a 6-MHz channel, the bandwidth of an analog television channel. QAM consists of two sinusoidal carriers that are phase shifted 90 degrees with respect to each other (that is, the carriers are in quadrature with each other) and each is amplitude modulated by half of the data. The slower system uses 64 QAM with an approximate raw data rate of 30 Mb/s and a 27-Mb/s payload information rate (which is the actual usable data throughput after all error correction and system control bits are removed). The faster system uses 256 QAM with an approximate raw data rate of 43 Mb/s and a payload information rate of 39 Mb/s.</p>
<p style="text-align: justify;">With 64 QAM, each carrier is amplitude modulated with one of eight amplitude levels. The product of the two numbers of possible amplitude levels is 64, meaning that one of 64 possible pieces of information can be transmitted at a time. Since 2^6 is 64, with 64 QAM modulation, 6 bits of data are transmitted simultaneously. Similarly, with 256 QAM, each carrier conveys one of 16 amplitude levels, and since 256 is 2^8, 8 bits of data are transmitted simultaneously. The higher speed is appropriate for newer or upgraded cable plant, while the lower speed is more tolerant of plant imperfections, such as the ingress of interfering signals and reflected signals from transmission line impedance discontinuities.</p>
<p style="text-align: justify;">The upstream communications path (from cable modem to cable headend) resides in a narrower, more challenged spectrum. A large number of sources of interference limits the upstream communication options and speeds. Signals leak into the cable system through consumer-owned devices, through the in-home wiring, the cable drop, and the distribution cable. Fortunately, most modern cable systems connect the neighborhood to theheadend with optical fiber, which is essentially immune to interfering electromagnetic signals. A separate fiber is usually used for the upstream communications from each neighborhood. Also, the upstream bandwidth is not rigorously partitioned into 6-MHz segments.</p>
<p style="text-align: justify;">Depending on the nature of the cable system, one or more of a dozen options for upstream communications are utilized. The upstream bandwidth and frequency are chosen by the cable operator so as to avoid strong interfering signals.</p>
<p style="text-align: justify;">The cable modem termination system (CMTS) is an intelligent controller that manages the system operation. Managing the upstream communications is a major challenge because all of the cable modems in the subscriber's area are potentially simultaneous users of that communications path. Of course, only one cable modem can instantaneously communicate upstream on one RF channel at a time. Since the signals are packetized, the packets can be interleaved, but they must be timed to avoid collisions.</p>
<p style="text-align: justify;">The 1997 cable modem standard included the possibility of an upstream telephone communications path for cable systems that have not implemented two-way cable. Such one-way cables have not implemented an upstream communications path from subscriber to headend. Using a dial-up modem is a practical solution since most applications involve upstream signals that are mainly keystrokes, while the downstream communications includes much more data-intensive messages that fill the screen with colorful graphics and photographs and even moving pictures and sound. The CMTS system interfaces with a billing system to ensure that an authorized subscriber is using the cable modem and that the subscriber is correctly billed.</p>
<p style="text-align: justify;">The CMTS manages the interface to the Internet so that cable subscribers have access to more than just other cable subscribers' modems. This is accomplished with a router that links the cable system to the Internet service provider (ISP), which in turn links to the Internet. The cable company often dictates the ISP or may allow subscribers to choose from among several authorized ISPs. The largest cable ISP is @Home, which was founded in 1995 by TCI (now owned by AT&amp;T), Cox Communications, Comcast, and others. Another ISP, Road Runner, was created by Time Warner Cable and MediaOne, which AT&amp;T recently purchased.</p>
<p style="text-align: justify;">Cable companies serving 80 percent of all North American households have signed exclusive service agreements with @Home or Road Runner. Two more cable ISPs--High Speed Access Corp. and ISP Channel--serve the remaining U.S. and Canadian broadband households. And other major cable companies, CableVision and Adelphia in the United States and Videotron in Canada, offer their own cable modem service.</p>
<h2 style="text-align: justify;">Cable modem bottlenecks</h2>
<p style="text-align: justify;">If there were just one cable modem in operation, it could in principle have an ultimate data download capacity of 27 Mb/s in a 64 QAM cable system or 39 Mb/s in a 256 QAM cable system. While the 256 is four times 64, the data capacity does not scale by this factor since the 8 bits simultaneously transmitted by 256 QAM are not four times the 6 bits simultaneously transmitted by 64 QAM. The 256 QAM data rates are only about 50 percent larger than the 64 QAM rates. Of course, if the cable modem is not built into a PC but is instead connected with an Ethernet link, the Ethernet connection is a bottleneck, albeit at 10 Mb/s. In any case, neither of these bottlenecks is likely to bring any complaints since downloads at these speeds would be wonderful.</p>
<p style="text-align: justify;">A much more likely bottleneck is in the cable system's connection to the Internet or in the Internet itself or even the ultimate Web site. For example, Ellis Island recently opened its Web site to citizens to let them search for their ancestors' immigration records, and huge numbers of interested users immediately bogged down the site. No method of subscriber broadband access could help this situation since the traffic jam is at the information source. A chain is only as strong as its weakest link; if the link between the cable operator and the ISP has insufficient capacity to accommodate the traffic requested by subscribers, it will be overloaded and present a bottleneck.</p>
<p style="text-align: justify;">This situation is not unique to a cable modem system. Any system that connects subscribers to the Internet will have to contract for capacity with an ISP or a provider of connections to the Internet backbone, and that capacity must be shared by all the service's subscribers. If too little capacity has been ordered, there will be a bottleneck. This limitation applies to digital subscriber line systems and their connections to the Internet just as it does to cable systems. If the cable operator has contracted with an ISP, the ISP's Internet connection is a potential bottleneck, because it also serves other customers. Of course, the Internet itself can be overloaded as it races to build infrastructure in step with user growth.</p>
<p style="text-align: justify;">Recognizing that the Internet itself can slow things down, cable operators have created systems that cache popular Web sites closer to the user and that contain local sites of high interest. These sites reside on servers close to the subscriber and reduce dependence on access to the Internet. Such systems have been called walled gardens because they attempt to provide a large quantity of interesting Web pages to serve the subscriber's needs from just a local server. Keeping the subscriber within the walled garden not only reduces the demand on the Internet connection, but can also make money for the provider through the sale of local advertising and services. This technique can become overloaded as well. But curing this overload is relatively easy with the addition of more server capacity (hardware) at the cache site.</p>
<p style="text-align: justify;">Two cable ISPs, Road Runner and @Home, were designed to minimize or avoid Internet bottlenecks. They do it by leasing virtual private networks (VPNs) to provide nationwide coverage. VPNs consist of guaranteed, dedicated capacity, which will ensure acceptable levels of nationwide data transport to local cable systems. @Home employs a national high-speed data backbone through leased capacity from AT&amp;T. Early on, a number of problems caused traffic jams, but these are now solved.</p>
<p style="text-align: justify;">Other potential bottlenecks are the backend systems that control billing and authorization of the subscriber's service. As cable modem subscriber numbers grow, these systems must be able to handle the load.</p>
<p style="text-align: justify;">The capacity on the cable system is shared by all the cable modems connected to a particular channel on a particular node. Cable systems are divided into physical areas of several hundred to a few thousand subscribers, each of which is served by a node. The node converts optical signals coming from (and going to) the cable system's headend into radio frequency signals appropriate for the coaxial cable system that serves the homes in the node area:</p>
<p><img src="https://www.firewall.cx/images/stories/articles-connectivity-cmtj-4-1.gif" alt="articles-connectivity-cmtj-4-1" width="475" height="369" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Only the cable modems being used at a particular time fight for sizable amounts of the capacity. Modems that are connected but idle are not a serious problem, as they use minimal capacity for routine purposes.</p>
<p style="text-align: justify;">Clearly, success on the part of a cable company can be a source of difficulty if it sells too many cable modems to its subscribers for the installed capacity. The capacity of a given 6-MHz channel assigned to the subscribers' neighborhood and into their premises is limited to the amounts previously discussed (27 Mb/s in a 64 QAM cable system or 39 Mb/s in a 256 QAM cable system) and the demand for service can exceed that capacity. Both upstream and downstream bandwidth limitations can hinder performance. Upstream access is required to request downloads and to upload files. Downstream access provides the desired information.</p>
<p style="text-align: justify;">Usually, it is the downstream slowdown that is noticed. Some browsers (the software that interprets the data and paints the images on the computer screen) include so-called fuel gages or animated bar graphs that display the progress of the download. They can be satisfying when they zip along briskly, but rub salt in the wound when they crawl slowly and remind the user that time is wasting.</p>
<p style="text-align: justify;">Bandwidth hogs in a subscriber's neighborhood can be a big nuisance. As subscribers attempt to share large files, like music, photos, or home movies, they load up the system. One of the rewards of high-speed Internet connections is the ability to enjoy streaming video and audio. Yet these applications are a heavy load on all parts of the system, not just the final link. System capacity must keep up with both the number of subscribers and the kinds of applications they demand. As the Internet begins to look more like television with higher-quality video and audio, it will require massive downstream capacity to support the data throughput. As the Internet provides more compelling content, it will attract even more subscribers. So the number of subscribers grows and the bandwidth each demands also grows. Keeping up with this growth is a challenge.</p>
<h2 style="text-align: justify;">Impact of open access</h2>
<p style="text-align: justify;">Open access is the result of a fear on the part of the government regulators that cable system operators will be so successful in providing high-speed access to the Internet that other ISPs will be unable to compete. The political remedy is to require cable operators to permit competitive ISPs to operate on their systems. Major issues include how many ISPs to allow, how to integrate them into the cable system, and how to charge them for access. The details of how open access is implemented may add to the traffic jam.</p>
<p style="text-align: justify;">A key component in dealing with open access is the CMTS. The ports on the backend of this equipment connect to the ISPs. But sometimes too few ports are designed into the CMTS for the number of ISPs wishing access. More recent CMTS designs accommodate this need. However, these are expensive pieces of equipment, ranging up to several hundreds of thousands of dollars. An investment in an earlier unit cannot be abandoned without great financial loss.</p>
<p style="text-align: justify;">If the cost of using cable modem access is fairly partitioned between the cost of using the cable system and the access fees charged by the cable company, then the cable operator is fairly compensated for the traffic. With more ISPs promoting service, the likelihood is that there will be more cable modem subscribers and higher usage. This, of course, will contribute to the traffic jam. In addition, the backend processing of billing and cable modem authorization can be a strain on the system.</p>
<h2>What to do about the traffic jam?</h2>
<p style="text-align: justify;">The most important development in dealing with all these traffic delays is the release of the latest version of the cable modem technical standard. Docsis Release 1.1 (issued by CableLabs in 1999) includes many new capabilities, of which the most pertinent in this context is quality of service (QoS). In most aspects of life, the management of expectations is critical to success. When early adopters of cable modem service shared a lightly loaded service, they became accustomed to lightning access. When more subscribers were added, the loading of the system lowered speed noticeably for each subscriber in peak service times.</p>
<p style="text-align: justify;">Similarly, the difference between peak usage times and the late night or early morning hours can be substantial. It is not human nature to feel grateful for the good times while they last, but rather to feel entitled to good times all the time. The grades of service provided by QoS prevent the buildup of unreasonable expectations and afford the opportunity to contract for guaranteed levels of service. Subscribers with a real need for speed can get it on a reliable basis by paying a higher fee while those with more modest needs can pay a lower price. First class, business class, and economy can be implemented with prices to match.</p>
<h2 style="text-align: justify;">Beefing up to meet demand</h2>
<p style="text-align: justify;">Network traffic engineering is the design and allocation of resources to satisfy demand on a statistical basis. Any economic system must deal with peak loads while not being wasteful at average usage times. Consumers find it difficult to get a dial tone on Mother's Day, because it would be impractically expensive to have a phone system that never failed to provide dial tone. The same is true of a cable modem system. At unusually high peaks, service may be temporarily delayed or even unavailable.</p>
<p style="text-align: justify;">An economic design matches the capacity of all of the system elements so that no element is underutilized while other elements are under constant strain. This means that a properly designed cable modem system will not have one element reach its maximum capacity substantially before other elements are stressed. There should be no weakest links. All links should be of relatively the same capacity.</p>
<p style="text-align: justify;">More subscribers can be handled by allocating more bandwidth. Instead of just one 6-MHz channel for cable modem service, two or more can be allocated along with the hardware and software to support this bandwidth. Since many cable systems are capacity limited, the addition of another 6-MHz channel can be accomplished only by sacrificing the service already assigned to it. A typical modem cable system would have a maximum frequency of about 750 MHz. This allows for 111 or so 6-MHz channels to be allocated to conflicting demands. Perhaps 60-75 of them carry analog television. The remainder are assigned to digital services such as digital television, video on demand, broadband cable service, and telephony.</p>
<p style="text-align: justify;">Canceling service to free up bandwidth for cable modems may cause other subscriber frustrations. While adding another 6-MHz channel solves the downstream capacity problem, if the upstream capacity is the limiting factor in a particular cable system, merely adding more 6-MHz channels will still leave a traffic jam. The extra channels help with only one of the traffic directions.</p>
<p style="text-align: justify;">Cable nodalization is another important option in cable system design for accommodating subscriber demand. Nodalization is essentially the dividing up of the cable system into smaller cable systems, each with its own path to the cable headend. The neighborhood termination of that path is called a node. In effect, then, several cables, instead of a single cable, come out of the headend to serve the neighborhoods.</p>
<p style="text-align: justify;">Cable system nodes cater to anywhere from several thousand subscribers to just a few hundred. Putting in more nodes is costly, but the advantage of nodalization is that the same spectrum can be used differently at each node. A specific 6-MHz channel may carry cable modem bits to the users in one node while the same 6-MHz channel carries completely different cable modem bits to other users in an adjacent node. This has been called space-division multiplexing since it permits different messages to be carried, depending on the subscriber's spatial location.</p>
<p style="text-align: justify;">An early example of this principle was deployed in the Time Warner Cable television system in Queens, New York City. Queens is a melting pot of nationalities. The immigrants there tend to cluster in neighborhoods where they have relatives and friends who can help them make the transition to the new world. The fiber paths to these neighborhoods can use the same 6-MHz channel for programs in different languages. So a given channel number can carry Chinese programming on the fiber serving that neighborhood, Korean programming on another fiber, and Japanese programming on still another fiber. As the 747s fly into the John F. Kennedy International Airport in Queens each night, they bring tapes from participating broadcasters in other countries that become the next day's programming for the various neighborhoods. (Note that this technique is impossible in a broadcast or satellite transmission system since such systems serve the entire broadcast area and cannot employ nodalization.)</p>
<p style="text-align: justify;">The same concept of spectrum reuse is applied to the cable modem. A 6-MHz channel set aside for this purpose carries the cable modem traffic for the neighborhood served by its respective node. While most channels carry the same programming to all nodes, just the channel(s) assigned to the modem service carry specialized information directed to the individual nodes. Importantly, nodalization reuses the upstream spectrum as well as the downstream spectrum. So, given enough nodes, traffic jams are avoided in both directions.</p>
<p style="text-align: justify;">However, nodalization is costly. Optical-fiber paths must be installed from the headend to the individual nodes. The fiber paths require lasers and receivers to convert the optical signals into electrical signals for the coaxial cable in the neighborhood. Additional modulators per node are required at the cable headend , as well as routers to direct the signals to their respective lasers. The capital investment is substantial. However, it is technically possible to solve the problem. (In principle, nodalization could be implemented in a fully coaxial cable system. But in practice coaxial cable has a lot higher losses than fiber and incurs even greater expense in the form of amplifiers and their power supplies.)</p>
<p style="text-align: justify;">Other techniques for alleviating the traffic jam include upgrading the cable system so that 256 QAM can be used instead of 64 QAM downstream and 16 QAM can be used upstream instead of QPSK. If the ISP's connection to the Internet is part of the problem, a larger data capacity connection to the Internet backbone can be installed.</p>
<p style="text-align: justify;">Also, non-Docsis high-speed access systems are under development for very heavy users. These systems will provide guaranteed ultrahigh speeds of multiple megabits per second in the downstream direction while avoiding the loading of the Docsis cable modem channels. The service can then be partitioned into commercial and residential or small business services that do not limit each other's capabilities.</p>
<h2 style="text-align: justify;">Speculations on the future</h2>
<p style="text-align: justify;">The cable modem traffic jam is due to rapid growth that sometimes outpaces the resources available to upgrade the cable system. But solutions may be near at hand.</p>
<p style="text-align: justify;">The next wave of standardization, Docsis 1.1 released in 1999, provides for quality-of-service segmentation of the market. Now that the standard is released, products are in development by suppliers and being certified by CableLabs. Release 1.1 products will migrate into the subscriber base over the next several years. Subscribers will then be able to choose the capacity they require for their purposes and pay an appropriate fee. The effect will be to discourage bandwidth hogs and ensure that those who need high capacity, and are willing to pay for it, get it. And market segmentation will provide financial justification to implement even more comprehensive nodalization. After enough time has passed for these system upgrades to be deployed, the traffic jam should resolve itself.</p>]]></description>
			<category>More Reading</category>
			<pubDate>Wed, 13 Jul 2011 06:01:15 +1000</pubDate>
		</item>
	</channel>
</rss>
