Routing is the process of selecting best paths in a network.This capability is supported by a routing device called a router.There are many other details about routing such as algorithms and protocols used after configuration.
Worried about Big online corporations getting information about your browsing habits?Here is a video on Ted-talks about filter bubbles and how it can affect you.This brings the question, how does a user cover their online tracks, and hide information about their online history and habits.This could be through Browser add-on or software.I will therefore take you through the IT Techniques used by the software's and add-on.
Onion routing was originally developed by US Navy, its made up of projects researching,
designing, building, and analyzing anonymous communications
systems. The focus is on practical systems for low-latency Internet-based
connections that resist traffic analysis, eavesdropping, and other
attacks both by outsiders (e.g. Internet routers) and insiders (Onion
Routing servers themselves). Onion Routing prevents the transport
medium from knowing who is communicating with whom -- the network
knows only that communication is taking place. In addition, the
content of the communication is hidden from eavesdroppers up to the
point where the traffic leaves the OR network.(source)
Its generally free of charge to use, and runs on most operating systems.Onion Routing currently makes use of the Privoxy filter to reduce the
threat of identifying information from a client reaching a
server.The second generation Onion routing is called Tor,
Open-source tool, connection-based
low-latency anonymous communication system which addresses many flaws
in the original onion routing design.It can be downloaded here
Onion routing is like an advanced form of proxy routing. Instead of
routing through a single unprotected server, it uses a network of nodes
that constantly encrypt your data packets
at every step. Only at the end of this “chain” of onion nodes does your
data become decrypted and sent to the final destination. In fact, only
this “exit node” has the power to decrypt your message, so no other node
can even see what you’re sending.
Due to the multiple layers of
encryption, which not-so-coincidentally resemble the layers within an
onion, it’s extremely difficult to trace your information back to you as
the source when you use onion routing.
If you would like to know how to set up an anonymous website or server using tor read here as a computer user, you can be able to protect your browsing habits by doing this
Garlic routing: is a variant of Onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis. To protect the identity of the sender, messages are encrypted multiple times with the public keys
of selected nodes on the network. To be delivered the encrypted
packets must be received by routers selected by the sender, in the order
specified by the sender. Differently from Onion routing
an encrypted packet ("onion") can contain multiple packets ("cloves")
with different destinations, and the sender is not required to specify a
return path for the message.source
Tuesday, 10 December 2013
Thursday, 5 December 2013
Network Security starts with the user
We are in the process of approving our ICT policies and migrating to SUSE and one of the things I did prior , was to monitor within the test group their online and offline habits.I have come to the conclusion that most users have little or no regard to network security.Most people think that its the duty of the system administrator to come up with policies that protect them from network security downtime's.To some level, its true, but also there are little other things that users do, that could compromise the security of the network.
Its amazing how users tend to respond quickly to online pop ups of winning Free iphones and cockroaches moving on the screen without knowing what is really behind this pop ups.This could be phishing or spyware platforms that could could compromise any network.
One thing I have noted in the past is the reluctance of users to have strong passwords(This are passwords that are more that 8 letters, a mixture of both alphabetical letters,symbols and numbers). They have a tendency of submitting spouse, children and parents names, which can be easily guessed.Most password policies recommend password change after a certain period of time, its unfortunate most users have a problem changing passwords and tend to ask the systems admin to increase the expiry period.
Some users tend to be power users, meaning they can be able to install applications on their computers on their own.Its amazing you will get so many applications installed without the user knowing what they are for, worse still, their impact and space size.
My friend told me of how they would send embarrassing links to colleagues when one left their workstation without logging in.It would be great if this was deployed everywhere, due to the fact that most employees do not find the need to lock their workstations when they leave, this can adversely affect the privileges approved if a malicious person abused them using your workstation and account.
I am advocate of open source platforms, and one thing I have learnt through using Linux SUSE is the ability to monitor the little things and come up with policies, access lists to match up to them, since the users at times do not care, or have no idea.
Have you used SUSE?Kindly share your thoughts on it.
Its amazing how users tend to respond quickly to online pop ups of winning Free iphones and cockroaches moving on the screen without knowing what is really behind this pop ups.This could be phishing or spyware platforms that could could compromise any network.
One thing I have noted in the past is the reluctance of users to have strong passwords(This are passwords that are more that 8 letters, a mixture of both alphabetical letters,symbols and numbers). They have a tendency of submitting spouse, children and parents names, which can be easily guessed.Most password policies recommend password change after a certain period of time, its unfortunate most users have a problem changing passwords and tend to ask the systems admin to increase the expiry period.
Some users tend to be power users, meaning they can be able to install applications on their computers on their own.Its amazing you will get so many applications installed without the user knowing what they are for, worse still, their impact and space size.
My friend told me of how they would send embarrassing links to colleagues when one left their workstation without logging in.It would be great if this was deployed everywhere, due to the fact that most employees do not find the need to lock their workstations when they leave, this can adversely affect the privileges approved if a malicious person abused them using your workstation and account.
I am advocate of open source platforms, and one thing I have learnt through using Linux SUSE is the ability to monitor the little things and come up with policies, access lists to match up to them, since the users at times do not care, or have no idea.
Have you used SUSE?Kindly share your thoughts on it.
Friday, 11 October 2013
My Love and hate relationship with browsers
Today marks the 3rd time I have UN-installed G-chrome out of despair this October (Yes its just 11th October). I install and un-install so many times in a month, due to all the problems that come with using it, but its like some rebound love or obsession.I love Google chrome but the love doesn't seem to be mutual.Whenever I install Google chrome, I always have bad experiences, such as my computer crushing 5-10 times in a day.I have tried everything, from upgrading my RAM, system updates, to reducing the apps on the chrome dashboard but still...I give up...Though I miss playing and experimenting on Apps.
I resulted to Mozilla with a heavy heart...Mozilla Mozilla... The number of times I see not responding and the processing circle going round and round...Is a lot..... and add-ons/plugins installing but never reflecting on websites...Endless cycle of Mozilla problems
IE is the most boring browser, too bad it comes by default, and most application keys can only be activated through IE.Though installing network printers using either IE or Mozilla is always a moody affair by the browsers.
I am yet to try Safari and Opera, I find them nauseating...LOL..though it seems my way is cut out, am heading there soon.
I love surfing, reading and criss-crossing on the internet highways that doesn't mean I should experience horrible experiences with browsers. At this point I am nearly coding my own browser, though I wish Chrome would work...
I resulted to Mozilla with a heavy heart...Mozilla Mozilla... The number of times I see not responding and the processing circle going round and round...Is a lot..... and add-ons/plugins installing but never reflecting on websites...Endless cycle of Mozilla problems
IE is the most boring browser, too bad it comes by default, and most application keys can only be activated through IE.Though installing network printers using either IE or Mozilla is always a moody affair by the browsers.
I am yet to try Safari and Opera, I find them nauseating...LOL..though it seems my way is cut out, am heading there soon.
I love surfing, reading and criss-crossing on the internet highways that doesn't mean I should experience horrible experiences with browsers. At this point I am nearly coding my own browser, though I wish Chrome would work...
Sunday, 29 September 2013
Data Center 101
What are data centers?
Data center support corporate database, websites, provide
locations for ISP’s ASPs website hosting companies, DSL providers and other IT
services.
Elements of data
centers:
- · The location site
- · Command center (NOC)
- · Cable management
- · Network infrastructure
- · Terminal servers
- · Environmental control
- · Electric Power
- · People
Considerations to
consider before building one:
·
Physical
constraints such as:
- Available space and weight of the equipment
- Power requirements
- Cooling
- Bandwidth
·
System availability profiles:
Categorization:
Device redundancies
Power redundancies
Adequate power
Surge
suppression
Cable layout
Proper grounding
of equipment
Forms of power redundancies:
Battery feed UPS
Power generators
Cooling
redundancies
Network
redundancies
Over flow
Proper cable management
Cabinet with appropriate
connection media
Constraints/Issues
facing data centers:
Why would an organization set up a data center: It’s easier
for an organization to store their large volumes of data to eliminate Risk, and
security threat of their information being leaked out. This is common among
banks and Insurance firms.
How an organization would benefit from building one: They
are able to Control their data privacy, integrity and confidentiality.
Future Issues/topics
·
Are there laws governing the setting up of one
in Kenya?
·
Why has it become a trend in Kenya; or rather
why are more companies embracing them?
Enjoy Pictures of the Google data center
The rise of smart phones and the fall of consumers..
Why would a consumer buy a commodity that they would not sufficiently use?
According to an economist, one should use a commodity until it serves them maximumly.
According to my observation of around 60% of consumers with smart phones, only
30% maximum use the applications of their smart phones or have actually
downloaded apps that they currently use.
Smart phone usage depends on several factors such as career, age,
lifestyle, income. If one is an IT Guru, they will actually want to own a phone
that fits the bill in terms of usage et al. Some IT professionals such as
programmers, can own several with different Mobile operating systems as a test
ground for their systems. Business professionals on the other hand, want to
read their emails and actually respond as fast as possible, viewing and
attaching all relevant materials from their phones. Some smart phones have gone
a step further and actually enable a user to sign their documents from their
own phones.
Age, most young people actually use their phones for more than the calling,
sms, Internet functionalities. They keep up with the latest applications, such
as games, or music players, others even watch movies from their smart phones
depending on the memory capacity.
Lifestyle, some people are 'walking brands' they actually represent a kind
of brand that people would like to be associated with. A phone also should much
the kind of lifestyle that they want to live.
Smart phones do not come cheap, so why would someone not use the
applications that are available to the user?
·
Time: Most apps require searching and testing, some people will only act on
referrals rather than search for their own. As for some they do not have the
time to use these applications.
·
Ignorance: This is whereby one doesn’t know or rather doesn’t want to know
what their phones can do for them.
·
Illiteracy: This could be as a result of being given a phone as a gift, or
Buying a phone where one is not sufficiently educated.
·
Boring
applications: Some applications are general especially games, they
maybe be boring to one user, but interesting to another. The best way to
solve this is to download applications that suite your interest.
As an IT person, i would encourage people to maximally use their phones so
as to get ROI also to appreciate technology and engineering through the usage.
This also helps programmers get reviews about their applications in terms of
usage, ad revenues, points to improve also better your live by making things
easy.
Buy a phone that you intend to use,don't be like a Subaru driver who drives it through traffic all the days of his life.
PS: If you can get it on your computer, probably there is a version for your
smart phone.
All pictures are subject to copyright.
Is M-Shwari the new shylock?
Long time ago, probably around 8 years ago, driving a BMW or
Mercedes, was considered that you are part of rich.When the new Hummer
came around, it went for around 5M, and only a few bought them.As the
years have gone by, more and more Kenyans are earning big bucks, shaking
the lifestyles of the middle class resulting to growth in Banks and
micro finance institutions.
Kenya has become a den of banks.Banks are everywhere, if you do not see a branch then you will see an bank agent.This tends to tell us a lot about our economy.Middle class people have money, when i say money I mean MONEY..Look at the traffic jams that are ever increasing, because of so many cars,another scenario is the boom of smart phones.Nearly every week, there is a launch of a new smart phones and tabs which cost an average of 20,000 and above for a gadget.
Middle class are spending a lot of money on lavish lifestyles according to Daily nation and some who cannot afford it are trying too hard by taking up loans to buy lavish items according to the standard. Banks have come up with alot of packages to fit the class of people such as Car loans, mortgage loans for the gated house communities that are sprouting everywhere in the country.Banks do not have good reputations as at now, due to the increased loan interest that over stretch consumers, meaning that there is an opportunity for micro finance institutions.
The difference between a bank and a shylock in lay mans language is that a bank gives you an amount of money, for a particular period at an interest, you pay at reasonable time while a shylcok is, someone who lends money at excessive rates of interest according to the free Dictionary.
The M-Shwari service is designed to act as a rudimentary credit facility for those who have been locked out of the loans market for lack of collateral and credit history. “M-Shwari will attract a one-time facilitation fee (read interest rate) of 7.5 per cent of the borrowed amount,” Safaricom said in a statement this is according to Business daily.But the period is one month?
How do you repay a lon in 30days? unless you are a shylock
Is mshwari the new shylock? thats the question I have been asking my friends.
Fof those people who do not know who a shylcok is, someone who lends money at excessive rates of interest according to the free Dictionary.
Kenya has become a den of banks.Banks are everywhere, if you do not see a branch then you will see an bank agent.This tends to tell us a lot about our economy.Middle class people have money, when i say money I mean MONEY..Look at the traffic jams that are ever increasing, because of so many cars,another scenario is the boom of smart phones.Nearly every week, there is a launch of a new smart phones and tabs which cost an average of 20,000 and above for a gadget.
Middle class are spending a lot of money on lavish lifestyles according to Daily nation and some who cannot afford it are trying too hard by taking up loans to buy lavish items according to the standard. Banks have come up with alot of packages to fit the class of people such as Car loans, mortgage loans for the gated house communities that are sprouting everywhere in the country.Banks do not have good reputations as at now, due to the increased loan interest that over stretch consumers, meaning that there is an opportunity for micro finance institutions.
The difference between a bank and a shylock in lay mans language is that a bank gives you an amount of money, for a particular period at an interest, you pay at reasonable time while a shylcok is, someone who lends money at excessive rates of interest according to the free Dictionary.
The M-Shwari service is designed to act as a rudimentary credit facility for those who have been locked out of the loans market for lack of collateral and credit history. “M-Shwari will attract a one-time facilitation fee (read interest rate) of 7.5 per cent of the borrowed amount,” Safaricom said in a statement this is according to Business daily.But the period is one month?
How do you repay a lon in 30days? unless you are a shylock
Is mshwari the new shylock? thats the question I have been asking my friends.
Fof those people who do not know who a shylcok is, someone who lends money at excessive rates of interest according to the free Dictionary.
Subscribe to:
Posts (Atom)