Are you among the many who have seen more status updates on social media websites saying things like, “please ignore my emails as my account was compromised”? Sometimes they might also later add “everything is okay now”. Or maybe you’ve seen this one and were glad it wasn’t you, “lost all my contacts please text me your numbers folks.”
Here’s one reality and let’s face it, no one is immune to hackers in today’s world and only being aware/informed will help us be safe from the breed of internet hackers (both ethical and unethical). Hacking is when someone tries to gain access to a computer to view and access data without destroying or maliciously harming the computer. Hackers may use free public Wi-Fi to remotely access your smartphone to install spyware. Another ethical form of hacking is when a hacker works towards finding exploits to prevent other hackers from harming one’s network/computer(s). Good young ethical hackers or computer enthusiast often get paid and hired by big corporations to do such work.
First and foremost avoid and delete any possible phishing emails that trap you into believing false details and ask you to take immediate action! Be very suspicious of any emails from unknown email addresses, links in emails, emails from banks/institutions asking you to reconfirm or change passwords and more. Anytime someone asks for financial help in an email, says urgent action required and tells you that services will terminate, the most important thing is to never to click on the links in the email and to call your bank directly. Go and access the website from your bookmarks or opening the site yourself. Ensure it has https and a small padlock icon to indicate it is secure to access it.
Be smart online
It’s a sad world we live in when if something is unbelievably good to you online, it is most likely false! Have your privacy settings set to strong, keep social profiles private even if you don’t share anything too personal, keep anti-virus software updated and always block pop-ups. Also, go to My computers>Uninstall or change a program and see if there are any unknown programs and uninstall the ones you don’t need or know. If you think your system has been compromised, disconnect the Internet, change passwords, run a virus scan in safe mode, restart the PC and keep checking on any abnormality.
Here’s a list of the best free malware removal software for Windows PC: https://www.techradar.com/news/the-best-free-malware-removal-tools
What the laws say
The Information and Communication Technology Laws criminalize unauthorized access and use of computers and databases, using the computer for fraud, identity theft, credit card fraud, password and social security hacks. However these laws only protect the larger interest of society and common users have to protect themselves. In case of unethical hacking we must inform the service provider and also inform our contacts.
LAN network monitoring software
Using strong business network monitoring software can help you to filter out websites, objectionable URLs, applications and in turn keep the network clean of malware. LogicMonitor business in-depth network monitoring software comes with full live monitoring features, logged reports, remote control, filtering and more.
IPv6 is shaping the future of communication and enabling the latest datacenter trends, including data consolidation and virtualization, which make it possible for data to live anywhere and be continually accessible.
Once all of your data resources and applications are consolidated, they can be centrally managed, monitored and better utilized across your entire organization.
The path to data consolidation is through virtualization, which allows multiple applications to share a platform and resources without interfering with each other on the network. How do you enable and support these cutting-edge approaches to data and application management? You guessed it: IPv6.
Watch out Baby Boomers: The next generation is on its way into the federal workforce. And if you don’t think it’s vital to transition to IPv6, check out how teenagers are communicating today. They have multiple mobile devices, love lifestyle and Web 2.0 technologies, and rely on presence-based technologies like Instant Messaging to get through the day. As these individuals move into the workforce and federal marketplace, IT planners, enterprise designers and architects must prepare to support an always-online mentality and lifestyle. To attract and retain future employees, we’ll have to match the functionality “those crazy kids” are used to at home. The surefire way to deliver that rich user experience is via IPv6.
Thanks to IPv6, an entirely new command and control model is taking shape for federal agencies and the Department of Defense. While military requirements and systems are constantly in flux, IPv6 makes it possible to create ad hoc and expansive networks as well as attach an IP address to anything that has a CPU to enhance mobility, refine tactics and improve military strategy.
With IPv6, we can create network capabilities that better meet mission needs. IPv6 is clearly changing the game and arming our soldiers with better IT capabilities as we take on critical missions around the world.
Maybe the folks that said Christopher Columbus was headed for trouble when he set out for the New World weren’t so crazy after all!
Today, the world is FLAT, thanks to Internet technologies that give us the ability to communicate to anyone, anywhere at any time. There is a growing need for broad communications across the Globe, and IPv6 is paving the way to technology enhancements that enable Internet expansion, new capabilities, and new aspects of mobility communication and collaboration we’ve never seen before.
Who knew there were so many forward-thinkers way back in 1492? They were simply anticipating the benefits of IPv6.
Ubiquitous Internet connectivity is no longer a dream with IPv6. In fact, countries like Korea are on the forefront of enabling ubiquitous IP connectivity for everyone by leveraging IPv6 support and network expansion capabilities. True peer-to-peer communication, multiple IP addresses, video exchange, Internet access for the entire population, and more functionality in a dynamic setting are all possible with IPv6.
In many cases, IPv6 transition may be as simple as turning it on in networks and enabling it in application code. IPv6 is the horizontal integration poster child. It impacts, at some point, every user, every network element, and every application (existing or new) across the global communications domain.
It is important for all network managers to act now to access their IPv6 readiness and take the necessary steps to migrate their networks to enable new services and capabilities like Web 2.0 content mash-ups, ubiquitous access, predictive healthcare, advanced warfighter capabilities and anywhere/anytime nomadic mobility leading to presence-based, self forming networks.
The security for IPv6 comes in the form of IPsec, which allows authentication, encryption, and compression. IPv6 also possesses capabilities for packet integrity that IPv4 does not offer. Indeed, IPv6 mandates that security be provided through information encryption and source authentication.
In order to reach the IPv6 Internet, an isolated host or network must be able to use the existing IPv4 infrastructure to carry IPv6 packets. This is done using a technique known as tunneling which consists of encapsulating IPv6 packets within IPv4, in effect using IPv4 as a link layer for IPv6.
IPv6 packets can be directly encapsulated within IPv4 packets using protocol number 41. They can also be encapsulated within UDP packets e.g. in order to cross a router or NAT device that blocks protocol 41 traffic. They can of course also use generic encapsulation schemes, such as AYIYA or GRE.
Solaris has had IPv6 capabilities since Solaris 8. In Solaris 10, Sun has what it calls a complete IPv6 implementation. Much of the thrust of the new parts of the implementation is to provide a migration path from IPv4 and to use the IPv4 infrastructure. One cool thing in this space is 6to4 automatic tunnels. 6to4 tunnels use a system’s IPv4 address to create a 6to4 IPv6 prefix, made up of 2002:a.b.c.d. Well, here’s an example:
- IPv4 address: 10.1.2.3
- IPv6 prefix: 2002:a01:0203::/64
If you set up a Solaris host on your network or networks as a 6to4 gateway, the other IPv6 hosts on those networks can communicate using IPv6 traveling over IPv4. Sun has a pilot of this and it works quite well. More information can be found at http://docs.oracle.com/en/.