All about computer, communications and consumer electronics (3C)

Archive for February, 2008

Microsoft: to create a perfect worm for patch distribution

Posted by Suntrekker on February 25, 2008

Microsoft researchers are working on the “perfect worm”– a critter that can distribute patches without the need for centralized servers while minimizing bandwidth.

Microsoft researchers are hoping to use “information epidemics” to distribute software patches more efficiently.

Milan Vojnović and colleagues from Microsoft Research in Cambridge, UK, want to make useful pieces of information such as software updates behave more like computer worms: spreading between computers instead of being downloaded from central servers.

The research may also help defend against malicious types of worm, the researchers say.

Software worms spread by self-replicating. After infecting one computer they probe others to find new hosts. Most existing worms randomly probe computers when looking for new hosts to infect, but that is inefficient, says Vojnović, because they waste time exploring groups or “subnets” of computers that contain few uninfected hosts. source

I wonder how would it be practically implemented. How to define ” trusted source” and if you only trust a very small number of systems, where is advantage of descentralized patching?

After all its Microsoft,  What have we got to worry about?


Posted in ICT Press | Tagged: , | Leave a Comment »

Nmap : Most popular network security tool in the world.

Posted by Suntrekker on February 9, 2008

December’s release of Nmap 4.50 marked the popular port-scanning tool’s tenth anniversary. A cross-platform GUI front end for Nmap which includes a command creation wizard, a scripting engine, and a host of other improvements called Zenmap.

Nmap offers much more in its GUI and at the command line than we’ve covered here. If you haven’t used Nmap before, reading its documentation will improve both the speed and scope of your learning curve.

Professionals and casual users alike can benefit and learn from this tool. If I had a “must have” list of all the apps I use, Nmap would rank near the top. If you’re not familiar with it, grab it and give it a go.

More here…

Posted in ICT Press | Tagged: | Leave a Comment »

Backups.. Backups…and more backups

Posted by Suntrekker on February 1, 2008

Back in the days were  something I never  thought about before is Backup. Some people take them very seriously especially for those Network Administrator.

But now that I am holding that position, backup became the Law. Ensuring  all of my clients are getting good backups and good images. Period.  Backups saved me time and further chaos in the office.

Backups are good! And I agree.

What I did in the office is I used Ghost 2006 version to do backup on all workstations by making an image of system partitions after installing OS and other applications and finish tweaking the system for security and is ready to roll out. I even set local group policies and set common profiles of each computer.

Case Scenario:

OS always hang-up, corrupt profile, OS infected with virus and can’t be easily removed. Good thing in using backup is I do not need to reformat, install all from scratch – OS to application that would eat a lot of time. It is just a matter of minutes the the PC is back on its feet again. =)

I am now reaping the joys of backups . It makes me all warm and fuzzy just thinking about it! 🙂 lol

Posted in Test Jig | Tagged: , , | 2 Comments »