AI Tech Update

AI Tech Update

Kiss to you my new friend

Let’s follow a new spam saga 🙂   I juzt recieved a new spam message and now i’ll show you all bits and bytes 🙂 and of course we can continue publishing if you suggest me an answer   cheers   —–Original Message—– —–Internet Headers—– Microsoft Mail Internet Headers Version 2.0 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxs-xx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxx-xxx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from mtv-iport-4.cisco.com ([173.36.130.15]) by xbh-rcd-301.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 08:41:49 -0500 X-Files: 2062888s.jpg : 60599 Received: from…

ISE basic installation and configuration. Part 2

When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong. By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked. The Web Interface   Now we can go on and see what we can do. open a supported browser and go to: http://<IP address or host name>/admin/…

ISE basic installation and configuration. Part 1

Ok since I have to do some activity on ISE I think would be nice to write a little journal that can be also used as a quick guideline. ISE is the acronym for Identity Service Engine, an identity policy manager released by cisco, now in version 1.1 available also on cisco cco website. It comes in different format, as appliances or as virtual machine on VMware, as well as as upgrade to other cisco engine. I will not look at the other release I will play a bit with the appliance. The Software Upgrade First of all I have…

ise training day 3

Posture posture and posture 🙂 interesting but long labs Related articles Ise Training day 2 (aitechupdate.wordpress.com) ISE basic installation and configuration. Part 2 (aitechupdate.wordpress.com) ISE basic installation and configuration. Part 1 (aitechupdate.wordpress.com) Open a file in PowerShell ISE via cmdlet – Version 3 Update (powertoe.wordpress.com) Proliferation of “Bring Your Own Device” (houstonchannels.wordpress.com) Related posts: Ise Training day 2 Diary of an acquisition part2 FW SPAM: My dear friend Looks good it’s good Yummy Powered by YARPP.

Ise Training day 2

Ok my turn to talk today:  We talked about one of the most interesting features of ISE, profiling. Worth to explain a little what profiling is, and what discovery and classification means. it is a very useful and powerful engine but it needs to be understood, also on what it means and why should be used. other great new, finally  ise 1.1 is available on CCO, worth the upgrade absolutely. http://www.cisco.com/en/US/docs/security/ise/1.1/release_notes/ise1.1_rn.html new stuffs: – Support for IOS Sensor for advanced features and remote profiling on the switch. – Active scan with NMAP. – A new portal guest type Device Registration…

Today ISE training day 1

Image by Getty Images via @daylife and the day is gonna be at its end for the first day of ISE training here, tomorrow I will have to talk about Profiling, we’ll see Related articles Configure cisco ISE for Cisco Access Points (aitechupdate.wordpress.com) Fab Site: ThisIsAuto.com (fabsugar.com) Canon Powershot SX210IS Best Buy (canondigitalslrcamerasbuy.wordpress.com) Good practice to delete rows from database by attribute(eg. is_removed) (stackoverflow.com) Squaring Numbers from 30-70 (mathema-tricks.blogspot.com) How We’re Going Fix Online Identity and Reputation (readwriteweb.com) Οι συζητήσεις μας (sxoliastesxwrissynora.wordpress.com) Method isEmpty for binary tree proble (stackoverflow.com) Double-Check the Accuracy of Your Clock at Time.is [Clocks] (lifehacker.com) It…

Configure cisco ISE for Cisco Access Points

Let’s say you have been asked to configure ISE to allow secured network access for Cisco Wireless Access Points. To do so you should : · Enable the ISE endpoint profile for Cisco Access Points · Configure an Authorization Profile and Authorization Policy rule for Cisco Access Points · Review the access switch configuration to authorize an access point using MAC Authentication Bypass (MAB). · Verify proper authorization of a Cisco Access Point based on ISE policy   Login to ISE The ISE Home Dashboard page should display. Navigate the interface using the multi-level menus. Configure the Profiler Policy to…

Introduction To Network Security – Part 2

Introduction To Network Security – Part 2: By Sahir Hidayatullah – Firewall.cx Security Advisor Tools An Attacker Uses Now that we’ve concluded a brief introduction to the types of threats faced by both home users and the enterprise, it is time to have a look at some of the tools that attackers use. Keep in mind that a lot of these tools have legitimate purposes and are very useful to administrators as well. For example I can use a network sniffer to diagnose a low level network problem or I can use it to collect your password. It just depends…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

Spear Phishing: can it fool me?

Image via Wikipedia Recent articles in the news remind me that anyone can be fooled by a good scam. the problem is always the trust we gave to the communication we received. is not just a financial problem (you remember the Madoff scam?) but a problem that can hit anyone, even expert guys can fall.The most recent was the hack occurs at Oak Ridge National Laboratory, but it is just the last of an infinite series. Also the RSA securID breach  was prepared with spear phishing. What is spear phishing? Spear phishing is an e-mail spoofing fraud attempt that targets…

Posts navigation