Welcome

Cybermick Web and IT Services! Providing Cyber Solutions since 1998!
Mick Dobra Peoria, IL 309-340-2256
Specializing in Ubuntu Linux open source solutions, making high end IT solutions affordable for small businesses!

Thursday, June 9, 2011

Converged Networking

Doing some research for a network upgrade project and thought I would share.

Converged Networking/Infrastructure

Finally really coming of age. I have built custom solutions, in fact I'm operating on one now, but now the vendors are really supporting this at the physical, logical, and application layers.

I always frowned at having to keep two parallel networks operating: one for the LAN (ethernet), and one for the SAN (Fibre Channel). I had started to move to one network, with seperate subnets and vlans. Which was finally supported by FCoE (fiber channel over ethernet), if you didn't want to just use NAS.

Two offerings that I have researched recently now flatten or converge the network even further: Cisco Unified Fabric, and HP FlexFabric. And now with 10GE LAN speeds... yeah, major ROI savings and network reliability.

Any way, I enjoyed some high level business analytical reading and thought I would share. Enjoy the white papers linked above.

Tuesday, June 7, 2011

Phishing Emails - Don't Take the Bait!

The DefenseTech.org blog has a great post about the phishing emails from China that were used to penetrate the U.S. State Department.

There is a good lesson here. If you follow the link to the post "you’ll see a screen grab showing what’s apparently the text of one of the phony phishing emails sent to senior U.S. government officials’ Gmail, Hotmail and Yahoo mail accounts by hackers in China." They were very well done! Very legitimate looking! It would be hard to blame the user in a small corporate environment for getting fooled.
("What Those Chinese Phishing Emails Look Like" defensetech.org)

Here is the moral of the story:

- Do Not open attachments from unknown or unverified sources!

If you are not sure who it is from, or if it is legitimate:

- forward the message (don't reply) to the supposed sender after removing any attachments, and ask them if they really sent it.

- or pick of that old tech, the phone, and call the supposed sender and ask them.

Don't take the bait!

More:

Cyber-Attacks on Gmail, Defense Industries Linked to China: Investigators