WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) 990-8686 4/03/2009 www2.widener.edu/wins

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
What to expect.  Linux  Windows Server (2008 or 2012)
Content Overview Update Process Additional Tools.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
Norman Endpoint Protection Advanced security made easy.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Internet Connection Sharing Ben Ramig Erik Tierney.
TAX-AIDE Windows 7 Upgrade Chris Hughes - NTC 1. TAX-AIDE TCS Conference Call Sept Windows 7 Imperative ● Microsoft support for Windows XP ends.
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Tim Robinson IT Manager Prophet Business Group.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Module 4: Add Client Computers and Devices to the Network.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
DAY TO DAY USAGE OF THE NETWORK for academic and administrative support (How we make it work) Presented by: Donnie Mize, Network Manager, FTCC Wanda Jones,
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Microsoft Management Seminar Series SMS 2003 Change Management.
WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 www2.widener.edu/wins.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /05/2008 www2.widener.edu/wins
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Patrick Wall IT Technician Prophet Business.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 www2.widener.edu/wins.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /04/2011 www2.widener.edu/wins
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Computer virus Done: Aaesha Mohammed ID: H
WINS Monthly Meeting 02/04/2011
WINS Monthly Meeting www2.widener.edu/wins 03/02/2007 www2.widener.edu/wins
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /06/2009 www2.widener.edu/wins
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Free Software, Protection against Thieves, and the Cloud Omnilore Computer Talk Rick Spilane Feb. 25, /7/2016Rick Spillane1.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Module 8: Networking Services
WINS Monthly Meeting www2. widener. edu/wins internet2
Firewalls.
Welcome To : Group 1 VC Presentation
Call AVG Antivirus Support | Fix Your PC
6. Operating Systems Finger printing & Scanning
Module 1: Overview of Systems Management Server 2003
Presentation transcript:

WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins

Agenda Introductions In-Line Content Filtering Nortel Update Conficker Worm Infoblox Presentation Question & Answers

Introductions Name Title Location

In-Line Content Filtering sent Feb 27 th to Content Filter Users : “As you build your images, please go into the Google and Yahoo preferences for all of the supported browsers and select Strict Safe Search. Also try to lock it down so your users can not change it. And after we cut you over, be ready for the calls from those PC’s that you have not touched. Good communications before hand will help us through this.” Just a reminder! Thanks!!

Nortel Update Passport 8600 SMLT Redesign Widener Kirkbride Upgraded from to in March Garnet Valley scheduled for Thursday April 9 th Rest of backbone will be done in July unless needed…

Conficker Worm Millions of computers worldwide have already been infected with the Conficker worm.Conficker worm So far, it hasn't done any major damage, but it is replicating itself. And on Wednesday, it's apparently programmed to "phone home," possibly getting instructions from some master computer to start causing real problems. Most experts don't expect anything dramatic on Wednesday, but Windows users are being advised to make sure to apply the latest Microsoft security patch and to be sure they're using up-to-date antivirus software.

Conficker Worm The Conficker worm is receiving a lot of attention because of its vast scale (millions of machines infected) and advanced update mechanisms. Its botnet army is scheduled for new updates and instructions starting on Wednesday (4/1), and nobody (except the bad guys) knows exactly what those instructions will be. Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.license

Infoblox Presentation Brought to you by Tim Slattery of CNI (610) Presented by Infoblox Phil Regan Infoblox pioneered the development of core network services appliances, which deliver utility-grade domain name resolution (DNS), IP address assignment and management (DHCP/IPAM), authentication and authorization (RADIUS), configuration (TFTP/HTTP), and network time (NTP). Infoblox solutions control and automate the core services that drive all networks and applications. Read more: "Infoblox Overview: Leading Core Network Services Appliances Developer" -

Questions & Answers Next Meeting May 1st, 2009! Fortinet will be presenting!