Wednesday, February 29, 2012

Storage Replication Configuring Jobs - Part 4

Introduction
In the previous article, I have more and less cover the needs that you need to know when you want to plan the storage replication in your organization. Planning is very important in the initial stage. On this article I will cover more toward on how to configure storage replication on a different server over a wan link.

Tuesday, February 28, 2012

Storage Replication Usage - Part 3


Introduction
In the previous article which I have explain the type of replication over by the software. As you can see each of the option you choose will have its own pros and cons especially on the expectation of recovery. What I would like to cover more on this episode will be how you should use your software and when you need to use it. Since in the first part 1 and part 2 I have mention this is all for Disaster recovery. Let have a quick look into it, where else we can use the solution in our common production system.

Where we should use storage replication?

Monday, February 27, 2012

Storage Replication Overview - Part 2

steeleye block level replication

Introduction
In the previous article which I have cover in storage replication part 1. It cover the installation of the software and also the requirement. The software we are looking at will be SteelEye.

What is SteelEye?
As you know in some of the bigger organization, they will have big storage such as NetApps or IBM N series which could provide the storage replication capabilities. However if you do not have such high-end storage device. How can you achieve and have a business continuity as usual during disaster. This is a solution to replace a shared storage.You will know what I mean when you continue the journey together with me on SteelEye

Friday, February 24, 2012

Storage Replication Intro - Part 1

disaster-recovery-plan

Introduction
Virtualization and disaster recovery have become more and more important part of the organization as an insurance to ensure business continuation. However there is a lot of method in technology to recover business from disaster recovery which are cause by natural or human-induced disaster. 

To be in detail disaster recovery is a subset of business continuity which involve more toward on planning to ensure every aspect of a business functioning in the midst of disruption events.Disaster recovery will be just focusing on the technology that can support the business in the event of disruption.

In the article, I will cover more toward on storage replication as there are lots more data are stored into it. Those data can be vhd which are used by hyper-v, mssql , file server and etc. In this sample of testing, I will be testing toward Microsoft Windows Server 2008 R2 which are running HyperV on top of it. I will explain more on the detail on part 2 regard on the software it self.

Tuesday, February 21, 2012

Exploiting Software

hakin9.org metasploit

Overview
In hakin9.org February release, I have wrote more on the latest version of nmap as well as metaploit how it could harm your network. In the article you will have an idea what does metasploit can offer you. I would like to share the in and out of the tools and how it can beneficial to any of the security practitioner.Below will be the content of the articles.

The power of exploitation tools
Since 2011, we have heard about a lot of incidents around the world about confidential information being compromised, government website being defaced and big corporation networks crippled for some reason. The famous example will be the anonymous group, but have you ever wonder why the success factor is? Is this the new area of the modern ninja?

Sunday, February 12, 2012

Firewall scanning technique


Introduction
In the previous years, we have always know that we can perform a stealth scan over a network via -sS. But base on today technology, this won't work anymore as now we have firewall vendor or antivirus vendor that came out with a solution to protect them self from those scanning techniques. However the scanning techniques is base on human, and we can always play around with the configuration and trick the firewall or IPS. In this articles I will be showing you

Tuesday, February 7, 2012

Nmap 5.61 TEST4 released

Nmap 5.61 TEST4 released

Introduction
The Legendary NMAP's new version Nmap 5.61 TEST4 have released. It include some new features as below.
  • a spidering library and associated scripts for crawling websites.
  • 51 new NSE scripts, bringing the total to 297.
  • a new vulnerability management library which stores and reports found vulnerabilities.

Saturday, February 4, 2012

The Modern Ninja

Introduction
Since 2011, we have heard a lot incident around the world where by confidential information was been stolen , government website was been defaced and big corporation network was been crippled for some reason. The famous will be the anonymous group, but have you ever wonder why they success?. The only reason for it, they think differently. I am

USB Security Risk


Setting the USB to read only for security
Introduction
I believe all of the IT in the corporate world have spent a lot of time in locking the computers to minimize the risk of information leakage. Some of common task was to hide the drive and also install certain software to block the access to the USB drive. However if there is a need for a USB drive, blocking access it is not a method or a good way to do so. The risk we are talking here is to avoid data from copy out to any portable drive.

Even for now we have a lot of new technology the risk have gone higher, last time we are talking about a single files missing.But how about now?. Now we are facing more challenging issues like your entire operating system is copied out for some unknown reason. The articles here is to give some idea on a better approach of securing those assets.I will show you

Wednesday, February 1, 2012

Security Configuration - Windows Server 8

Introduction
The Security Configuration Wizard (SCW) which the first released in Windows Server 2003 Service Pack 1 provide a process on configuring security for Microsoft Windows Operating System.The idea behind the tools is to configure the server with the smaller attack surface. I will show you on how to use