High-tech

High-tech
Light

Monday, November 24, 2014

14 go-to tools for Mac sysadmins

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 24, 2014 9:20 AM
Subject: 14 go-to tools for Mac sysadmins
To: <aquarianm@gmail.com>
Cc:

Webcam snooper now looking for a job

IT modernization project makes the grade at North Carolina colleges

Network World Daily News AM
November 24, 2014

14 go-to tools for Mac sysadmins

What's in a Mac admin's toolbox? Former Apple employee Gerard Allen shared some of his favorite tools during JAMF Software's user conference. Based in Ireland, Allen built his career helping companies integrate Macs into their IT environments. He worked for Apple for eight years during the 1990s, then started providing technical support and training to businesses. His consultancy, Stream Solutions, was recently acquired by Apple reseller iConnect. Today Allen is chief technologist and general manager at iConnect.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Webcam snooper now looking for a job

2. INSIDER IT modernization project makes the grade at North Carolina colleges

3. Symantec identifies sophisticated, stealthy 'Regin' malware

4. A3, Advanced Adaptive Applications: The end of server malware and hacking?

5. Forget your robot overlords: Watch out for Lethal Autonomous Systems that make mistakes

6. Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people

7. No, Walmart, you can't walk away with my smartphone for price-matching purposes

8. DDoS Attacks Swamping Media and Entertainment Firms, Verisign Reports

9. Black Friday: Newegg axes prices on laptops, desktops, tablets and more

10. FUD: E-Cig chargers said to be delivering malware

11. US man sentenced for hacking POS systems at Subway

: MoreDirect

Data Center Interactive eGuide

In this eGuide, Computerworld examines the issue of Green IT and how some organizations are making changes for the better. Read on to learn about data center sustainability and how it can be implemented at your organization. Learn More

Webcam snooper now looking for a job

The developer of a widely vilified website that aggregated feeds from unsecured webcams is apparently looking for work as a remote programmer.Insecam, which was criticized last week by the U.K.'s data protection regulator, no longer features webcam feeds but has the message: "Programmer is looking for a good remote job. Skills: Linux, FreeBSD, C/C++, Python, MySQL."The attention drawn to Insecam is likely still driving traffic to the website, but probably not from employers eager to hire its creator. Insecam contended that it did not hack the webcams but that the devices had default credentials.In some countries, using default credentials to access a device would still be considered illegal.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

IT modernization project makes the grade at North Carolina colleges

The opportunity to save money, power and space is driving a multi-campus infrastructure modernization project within North Carolina Community Colleges (NCCC), a network of 58 institutions serving more than 800,000 students. So far 14 colleges throughout the state have upgraded to new servers that are more energy efficient, use less space and deliver higher performance than the systems they're replacing.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Symantec identifies sophisticated, stealthy 'Regin' malware

Symantec researchers have identified a particularly sophisticated piece of malware, called "Regin" that was likely developed by a nation state and has been used to spy on governments, infrastructure operators, businesses, researchers and individuals since at least 2008."Regin displays a degree of technical competence rarely seen," Symantec said in a statement Sunday, released along with a technical white paper about the malware. Indications are that Regin "is one of the main cyberespionage tools used by a nation state."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

10 Steps to Reduce Mainframe MLC Costs

Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. Learn More

A3, Advanced Adaptive Applications: The end of server malware and hacking?

One thing is certain in the IT World, the proliferation of malware isn't slowing down and the risks are increasing. Even those of who are really careful are at far greater risk these days because the bad guys keep getting better and better (it just occurred to me that it would be great if two ransomware outfits wound up holding each other's data hostage but I digress).Just consider the Shellshock vulnerability discovered in late September this year. Within the first day of discovery something like 24,000 hacking attacks based upon the flaw were detected. In the long term these types of vulnerability mean that systems will have to get more complex to thwart malware incursions and eventually each system and each application in each system will wind up with multiple layers of defense. This, in turn, will demand more memory and more cycles ... confirming once again that what Intel giveth, the black hats taketh away.To read this article in full or to leave a comment, please click here READ MORE

Forget your robot overlords: Watch out for Lethal Autonomous Systems that make mistakes

Robot overlords! Pah! The biggest military danger in the near future will be hunter-killer autonomous robots. No, not far-future Terminator-type 'droids but small, cheap bots that will be able to challenge you, figure out if you're us or them, and, if you're not, kill you. We've already seen such devices though they've not been cheap nor really smart. For example, 8 years ago Samsung Techwin announced the all weather SGR-A1, 5.56 mm robotic machine gun with an optional grenade launcher for $200,000 (it wasn't available, as far as I know, in the 2006 Neiman Marcus Christmas catalog). If you doubt that worse than this won't come just consider the remarkable advances in autonomous robots from flying drones for delivering goods (or ordnance) through to  Boston Dynamics "Big Dog" and "WildCat" that can navigate rough terrain and, in the case of the latter, run you down. To read this article in full or to leave a comment, please click here READ MORE

Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people

I've gone out for lunch with Bob, Carol, Ted, and Alice and now it's time to settle the bill. I only had a chicken salad and a soda but Bob had a steak and a beer, Carol had the pasta special and a glass of wine, and Ted a burger and coffee, while Alice just had toast and a glass of water. No surprise, now we can't agree on how much each person should pay ...This isn't unusual because people generally aren't very good at figuring our what's a fair split so unless everyone is cool and agrees to simply divide the bill by the number of people it becomes a real pain. Think that's bad? Try dividing assets after a death or during a divorce; figuring out what's fair often winds up usually becomes a knock 'em down and drag 'em out war of attrition.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: CommVault

Enhancing Application Protection and Recovery

This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable. Learn More

No, Walmart, you can't walk away with my smartphone for price-matching purposes

No, Walmart, you can't walk away to a back office with my smartphone in hand to check that an item is truly at a certain price for price-matching. Thanks to a few jerks who scammed Walmart via price-match abuse, the giant retailer's online price-matching policy that could have benefited the masses has been changed.First Sears.com accidentally listed the $300 Wii U and $200 Nintendo 3DS bundles for $60 each. But the fact that some gamers jumped on it before Sears could change the price back must have birthed the evil idea of price-match scamming.To read this article in full or to leave a comment, please click here READ MORE

DDoS Attacks Swamping Media and Entertainment Firms, Verisign Reports

The trend for DDoS attacks to target media, entertainment and online gaming services shows no sign of abating with these sectors now accounting for more than half of all incidents, according the latest figures from Verisign's protection services wing. The firm's Q3 numbers show that 55 percent of DDoS attacks picked on media and entertainment, beating IT services and SaaS into second place on 28 percent, e-commerce third on 10 percent and finance fourth on 7 percent. In the first quarter of 2014 the figure was 35 percent, which rose to 43 percent in Q2 which means that something has been driving media and gaming's popularity as a target throughout the year.To read this article in full or to leave a comment, please click here READ MORE

Black Friday: Newegg axes prices on laptops, desktops, tablets and more

Asus Chromebook Online retailer Newegg has beaten the Black Friday 2014 rush by revealing deals on brand name laptops, desktops, tablets and other products geared toward both hardcore gamers and everyday tech users.Newegg says the deals will roll out between now and Black Friday, which has really stretched into nearly a month-long affair with the likes of Walmart, Best Buy and others sneak-peaking deals on everything from iPhone 6 smartphones to Xbox game bundles.To read this article in full or to leave a comment, please click here READ MORE

FUD: E-Cig chargers said to be delivering malware

There was a headline in The Guardian on Friday, related to two topics that interest me personally: malware and vaping.What's the headline?"Health Warning: Now e-cigarettes can give you malware" The story is sensationalist, promoting FUD to a growing segment of the population already inundated by false claims and facts, so it needs to be debunked.The Guardian's story is sourced entirely from a post from Reddit, where a user discussing IT support said their boss' computer was infected with malware after plugging an E-Cig charger into it. The post is here, but the story is copied below.To read this article in full or to leave a comment, please click here READ MORE

US man sentenced for hacking POS systems at Subway

A former Subway franchise owner will spend time in prison for hacking into computerized cash registers he sold to the sandwich restaurant chain and obtaining more than US$40,000 in gift cards.U.S. District Judge Richard Stearns sentenced Shahin Abdollahi, also known as Sean Holdt, 46, of Lake Elsinore, California, to 18 months in prison. The judge also ordered him to pay more than $34,700 in restitution. Sentencing was Friday in U.S. District Court for the District of Massachusetts.Abdollahi pleaded guilty in May to one count of conspiracy to commit computer intrusion and wire fraud and one count of wire fraud.Abdollahi owned Subway franchises in Southern California, and later operated a California company called POS Doctor, which sold and installed point-of-sale computer systems to Subway franchises around the country, the U.S. Department of Justice said in a press release.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: NetBrain Technologies

Applying Automation to Maintain Accurate Network Diagrams

Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. Google Internet balloon drops in on farmer

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. 20-plus eye-popping Black Friday 2014 tech deals

4. SDN groups respond to Cisco's game over

5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

6. Why I am not deleting my Uber app

7. How does a Windows bug go undetected for 19 years

8. WebRTC close to tipping point as Cisco, Microsoft announce products

9. New cruise ship a floating heaven for tech geeks

10. Tech's new blue collar: Good-paying jobs that don't require a 4-year degree

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment