Article: Malware infects computers by hiding in browser ad GIFs

Posted by on Dec 9, 2016 in NET ADMIN | 0 comments

Article: Malware infects computers by hiding in browser ad GIFs

Malware infects computers by hiding in browser ad GIFs http://flip.it/awphb4 Share this:ShareClick to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Google+ (Opens in new window)Click to email this to a friend (Opens in new...

Read More

New free eBooks for SysAdmins and DevOps

Posted by on Sep 26, 2016 in NET ADMIN | 0 comments

New free eBooks for SysAdmins and DevOps

New free eBooks for SysAdmins and DevOps – VMware NSX, Windows 10, SQL Server 2016 https://4sysops.com/archives/new-free-ebooks-for-sysadmins-and-devops-vmware-nsx-windows-10-sql-server-2016/ Share this:ShareClick to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Google+ (Opens in new window)Click to email this to a friend (Opens in new...

Read More

Linux free book

Posted by on Jun 7, 2016 in NET ADMIN, Technology | 0 comments

Linux free  book

Linux All-in-One For Dummies (a $25.99 value) FREE! http://www.ubuntugeek.com/linux-all-in-one-for-dummies-a-25-99-value-free.html Share this:ShareClick to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Google+ (Opens in new window)Click to email this to a friend (Opens in new...

Read More

What we give away when we log on to a public Wi-Fi network

Posted by on Oct 19, 2014 in HeadLines, NET ADMIN, Technology | 0 comments

What we give away when we log on to a public Wi-Fi network

In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random café in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones. Wouter removes his laptop from his backpack, puts the black device on the table, and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of local cafe visitors. On his screen, phrases like “iPhone Joris” and “Simone’s MacBook” start to appear. The device’s antenna is intercepting the signals that are being sent from the laptops, smartphones, and tablets around us. We learn that Joris had previously visited McDonald’s, probably spent his vacation in Spain, and had been kart-racing. More text starts to appear on the screen. We are able to see which WiFi networks the devices were previously connected to. Sometimes the names of the networks are composed of mostly numbers and random letters, making it hard to trace them to a definite location, but more often than not, these WiFi networks give away the place they belong to. We learn that Joris had previously visited McDonald’s, probably spent his vacation in Spain (lots of Spanish-language network names), and had been kart-racing (he had connected to a network belonging to a well-known local kart-racing center). Martin, another café visitor, had been logged on to the network of Heathrow airport and the American airline Southwest. In Amsterdam, he’s probably staying at the White Tulip Hostel. He had also paid a visit to coffee shop called The Bulldog. Session 1: Let everyone connect to our fake network The waitress serves us our coffee and hands us the WiFi password. After Slotboom is connected, he is able to provide all the visitors with an internet connection and to redirect all internet traffic through his little device. Most smartphones, laptops, and tablets automatically search and connect to WiFi networks. They usually prefer a network with a previously established connection. If you have ever logged on to the T-Mobile network on the train, for example, your device will search for a T-Mobile network in the area. My phone automatically connects itself to one of these networks, which all belong to the black device. Slotboom’s device is capable of registering these searches and appearing as that trusted WiFi network. To demonstrate, I suddenly see the name of my home network appear on my iPhone’s list of available networks, as well as my workplace, and a list of cafes, hotel lobbies, trains, and other public places I’ve visited. My phone automatically connects itself to one of these networks, which all belong to the black device. Slotboom can also broadcast a fictitious network name, making users believe they are actually connecting to the network of the place they’re visiting. For example, if a place has a WiFi network consisting of random letters and numbers (Fritzbox xyz123), Slotboom is able to provide the network name (Starbucks). People, he says, are much more willing to connect to these. We see more and more visitors log on to our fictitious network. The siren song of the little black device appears to be irresistible. Already 20 smartphones...

Read More

Free e-books for Windows administrators

Posted by on Jul 2, 2014 in HeadLines, NET ADMIN | 0 comments

Free e-books for Windows administrators

This is a list of free e-books that are useful for Windows administrators. It will be regularly updated. I added three new books from Microsoft Press that have been released recently: Microsoft System Center: Integrated Cloud Platform, Introducing Microsoft Azure HDInsight and How To: BYOD Project – Volume 1: The Desktop.   By Michael Pietroforte – Wed, July 2, 2014 Michael Pietroforte is the founder and editor of 4sysops. He is a Microsoft Most Valuable Professional (MVP) with more than 30 years of experience in system administration. Contents of this article Microsoft System Center: Integrated Cloud Platform Introducing Microsoft Azure HDInsight How To: BYOD Project – Volume 1: The Desktop Introducing Microsoft SQL Server 2014 Microsoft System Center: Network Virtualization and Cloud Computing Microsoft System Center: Building a Virtualized Network Solution Introducing Microsoft System Center 2012 R2 Microsoft System Center: Optimizing Service Manager Microsoft System Center: Cloud Management with App Controller Microsoft System Center: Troubleshooting Configuration Manager Introducing Windows Server 2012 R2 Technical Overview Introducing Windows 8.1 for IT Professionals Microsoft System Center: Configuration Manager Field Experience Introducing Windows Azure for IT Professionals Introducing Windows Server 2012 R2 Preview Release Introducing Windows 8: An Overview for IT Professionals Secrets of PowerShell Remoting Introducing Windows Server 2012 Introducing Microsoft SQL Server 2012 Security and Privacy for Microsoft Office Users Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime Windows 7 Power Users Guide Introducing Microsoft SQL Server 2008 R2 Administrator’s Guide to Windows PowerShell Remoting The SysAdmin Handbook Understanding Microsoft Virtualization Solutions (Second Edition) The Complete Windows 7 Shortcuts eBook Introducing Windows Server 2008 R2 Windows Server 2008 R2 Essentials Hyper-V Essentials First Look Microsoft Office 2010 Deploying Windows 7 Essential Guidance Planning and architecture for Office SharePoint Server 2007 Effective Windows PowerShell: The Free eBook TCP/IP Fundamentals for Microsoft Windows TCP/IP Tutorial and Technical Overview Introduction to Storage Area Networks Microsoft Windows Server System Deployment Guide for Midsize Businesses eBook Layman’s Guide to PowerShell 2.0 remoting WMI query language (WQL) via PowerShell The Administrator Crash Course: Windows PowerShell v2 VMM 2008 Essentials Xen Virtualization Essentials Security Concepts Book Security+ Essentials Windows Server 2008 Essentials Windows Server 2008 R2 – Das umfassende Handbuch   If you know of another good free e-book that could be of interest for Windows administrators, please post the link as a comment below or send me an email.   I will update this page regularly, so you might want to bookmark it. If you spot a book that is no longer available as a free e-book, please let me know.   The books are ordered chronologically. Books without a publishing date are at the end of the list.   Microsoft System Center: Integrated Cloud Platform   David Ziembicki and Mitch Tulloch, Microsoft Press, 2014 Microsoft System Center: Integrated Cloud Platform is targeted toward IT executives and architects interested in the big picture of how Microsoft’s cloud strategy is delivered using Windows and Microsoft System Center.   Introducing Microsoft Azure HDInsight   Avkash Chauhan, Valentine Fontama, Michele Hart, Wee Hyong Tok, and Buck Woody, Microsoft Press, 2014   In Introducing Microsoft Azure HDInsight, we cover what big data really means, how you can use it to your advantage in your company or organization, and one of the services you can use to do that quickly—specifically, Microsoft’s HDInsight service.   How To: BYOD Project – Volume 1: The Desktop   Douglas A. Brown, 2014   Volume 1 covers Citrix DesktopPlayer for Mac and XenClient Enterprise Synchronizer, including Hyper-V 2012 R2 and FSLogix Apps.   Introducing Microsoft SQL Server 2014   Ross Mistry and Stacia Misner, Microsoft Press, April 2014 This book...

Read More