Seven "NOT" monitoring of IT infrastructure

Throughout my work, I periodically observed situations when the introduction of monitoring in the company did not bring the expected results. Monitoring worked poorly or did not work at all. Analyzing such situations, I understood that their reasons were almost always the same. Although they all lay on the surface, I met them all the time and therefore decided to put them together so that you were warned and armed.
 
 
Seven "NOT" monitoring of IT infrastructure  
 

1. HE implement the monitoring tool


 
If IT departments receive only a monitoring tool, effective and demanded monitoring will not arise by itself. Instead of implementing the ...[/h]
+ 0 -

Security Week 34: what are the &lt;{short}&gt; routers broken for? &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hij

routers broken for? <{full}>
When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.
 
 
Security Week 34: what are the  routers broken for?   When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.    
    
       
 Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable information. Or not only: it seems that cybercriminals of the middle level are also starting to try to play cyber espionage. Researchers from the Chinese team 360 Netlab were able to identify at least ?500 Mikrotik routers that were hacked and transmitted traffic passing through them to the servers of cybercriminals (  routers broken for?   When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.    
    
       
 Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable information. Or not only: it seems that cybercriminals of the middle level are also starting to try to play cyber espionage. Researchers from the Chinese team 360 Netlab were able to identify at least ?500 Mikrotik routers that were hacked and transmitted traffic passing through them to the servers of cybercriminals (
 
Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable ...
+ 0 -

As a cloud provider to manage software licenses - will help the blocker

Company Red Hat presented a block system that helps cloud providers determine how customers use their services. As a result, vendors are able to offer new, more user-friendly payment models and identify fraud with software licenses.
 
 
More details about the Red Hat system and other block-based solutions in this area, we tell further.
 
 
As a cloud provider to manage software licenses - will help the blocker

 
/photo PxHere PD
 
 

About the system Red Hat


 
Red Hat offer to apply block to monitor how and how much (on time) the customer ...[/h]
+ 0 -

In the US, two traders created a fake brokerage company to steal money from novice investors

In the US, two traders created a fake brokerage company to steal money from novice investors
 
 
Image:
Unsplash

 
 
In the US, a lawsuit is being filed against two traders from Michigan who created a fake brokerage company. Scammers attracted novice investors and abducted their money. The criminals hoped that no one would notice their activities, as "newcomers will still lose money", writes Bloomberg. caused fluctuations in the shares of these securities.
 
 
For example, in 2013 Craig said in a fake account that an investigation into the suspicion of fraud was launched ...
+ 0 -

The robot is not heavy: how mail logistics becomes smarter than

The robot is not heavy: how mail logistics becomes smarter than  
 
The growth of popularity of online stores has changed the field of postal logistics. In many ways, the customer's life has become better: the delivery time for packages has decreased, it has become possible to track the status of the order and choose options that are convenient for them. Have you ever thought about how mail companies process our orders? We decided to tell you about new technologies and concepts that are used in logistics centers in Russia and abroad.
 
is notable abroad. DHL , which invests significant investments for the ...
+ 0 -

School of programmers HeadHunter: a new set - 2018/19

You probably already heard about School of programmers : from the beginning developers we grow specialists with experience of project launching and participation in all business processes. Because that's how it works in a large IT company.
 
School of programmers HeadHunter: a new set - 2018/19  
From today we open the ninth set to the School. What awaits those who will begin their education in November this year?
 
Here is a training project did one of the teams last year.
 
 

We are learning to think, not to code


 
The school is open to all: from graduates and self-taught without experience to programmers with two years of ...[/h]
+ 0 -

Security Week 33: for whom does the monitor oscillate?

Security Week 33: for whom does the monitor oscillate? In Neil Stevenson's book "Kryptonomicon", about which we had in our blog post , describes different types of information leakage through third-party channels. There are practical, like the interception of van Eyck , and purely theoretical, for a red word: tracking a person's travels along the beach on the other side of the ocean, building a map of the city by how its inhabitants overcome the curb at intersections (now it can now be realized with accelerometers, only curbs everywhere sawed curbs ). The interception of Van Eyck, however, is also a difficult thing - it is not easy to reconstruct ...
+ 0 -

Ethical Issues of Artificial Intelligence

Ethical Issues of Artificial Intelligence The author of the article is Alexey Malanov, an expert of Kaspersky Lab's anti-virus technology development department
 
 
Artificial intelligence breaks into our lives. In the future, probably, everything will be cool, but while there are some questions, and increasingly these issues affect aspects of morality and ethics. Is it possible to mock the thinking AI? When will it be invented? What prevents us from writing the laws of robotics right now, by investing morals in them? What surprises does machine learning teach us now? Is it possible to cheat machine learning, and how difficult is it? ...
+ 0 -

Java EE Concurency API

Java EE Concurency APIHello!
 
 
And we are here We indulge in buns run the second course thread "The Java Enterprise Developer" . Permanent creator and teacher of the course - Vitaly Ivanov , wrote here on this occasion an article even, which, we hope, will seem useful to you :)
 
 
So let's go :)
 
 
This article is devoted to the study of the API to the JavaEE Concurrency specification (
? JSR 236- ), Which defines the standard for executing parallel tasks in the JavaEE container, using the concept of managed resources. The release of the seventh version of JavaEE made it possible to run parallel ...
+ 0 -

Chinese laptop Jumper EZBook X4 - not only a disgusting screen (in TN version), but also a keyboard with illumination

When a knowledgeable person does not have money for a new fast laptop, he goes and buys an old one on one popular site. But what about those who do not know much about technology and do not particularly have money? One possible solution is to buy a new laptop of a Chinese brand in an online store (and no, I'm not saying that it's so necessary to do everything to everyone).
 
Among the Chinese brands the most popular were and remain Chuwi, Teclast and Jumper. About the products of the latter, I'll tell you in this review, namely about the Jumper EZBook X4.
 
 
Chinese laptop Jumper EZBook X4 - not only a disgusting screen (in TN version), but also a keyboard with illumination
 
...
+ 0 -