<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Bogdan Bot-Rus</title>
	<atom:link href="http://www.gfi.com/blog/author/bogdan-bot/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Undetected Threats: Cloud Storage</title>
		<link>http://www.gfi.com/blog/undetected-threats-cloud-storage/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=undetected-threats-cloud-storage</link>
		<comments>http://www.gfi.com/blog/undetected-threats-cloud-storage/#comments</comments>
		<pubDate>Mon, 28 Dec 2009 15:30:53 +0000</pubDate>
		<dc:creator>Bogdan Bot-Rus</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[cloud storage]]></category>
		<category><![CDATA[Dropbox]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1776</guid>
		<description><![CDATA[Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available. The files are stored by the solution providers.  Usually the files stored in the cloud can be accessed via a &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="Dropbox1" href="http://www.gfi.com/blog/wp-content/uploads/2009/12/Dropbox1.png"><img class="alignright size-medium wp-image-1777" style="border: 0pt none; margin: 10px;" title="Dropbox1" src="http://www.gfi.com/blog/wp-content/uploads/2009/12/Dropbox1-300x295.png" alt="" width="300" height="295" /></a>Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available.</p>
<p>The files are stored by the solution providers.  Usually the files stored in the cloud can be accessed via a web browser or by installing a client application.</p>
<p>Some of the most well known cloud storage solutions are Dropbox, Windows Live SkyDrive and Google Apps.</p>
<p>One of the easiest and most effective solutions of this kind is Dropbox.</p>
<p>After installing the Dropbox client application on a machine, a folder will be monitored by the application and the content will be automatically synchronized with the online storage. Thus, any file change performed in that folder (e.g. adding a file, changing a file) will be mirrored across all of the computers where the client is installed.</p>
<p><span id="more-1776"></span></p>
<p>Similar to a USB flash drive, this solution can allow:</p>
<ul>
<li>data leaks and theft</li>
<li>introduction of malicious and other unauthorized software to the network</li>
</ul>
<table style="height: 140px;" border="1" cellspacing="0" cellpadding="0" width="546">
<tbody>
<tr style="text-align: center;">
<td width="73" valign="top"><strong>Product Name</strong></td>
<td width="228" valign="top"><strong>Similar Products</strong></td>
<td width="48" valign="top"><strong>Price</strong></td>
<td width="289" valign="top"><strong>Advantages</strong></td>
</tr>
<tr>
<td width="73" valign="top">Dropbox Free</td>
<td width="228" valign="top">
<ul>
<li><a href="http://en.wikipedia.org/wiki/Rsync">rsync</a></li>
<li><a href="http://en.wikipedia.org/wiki/Skydrive">Windows Live SkyDrive</a></li>
<li><a href="http://en.wikipedia.org/wiki/USB_flash_drive">USB flash drives</a></li>
</ul>
</td>
<td width="48" valign="top">Free</td>
<td width="289" valign="top">
<ul>
<li>Rsync needs an additional web hosting   provider. Configuring rsync is not easy.</li>
<li><a href="http://en.wikipedia.org/wiki/Skydrive">Windows Live SkyDrive</a> lacks   the folder monitoring functionality.</li>
<li>USB flash drives can be blocked by   endpoint security software such as <a href="../../../../../../endpointsecurity/">GFI EndPointSecurity</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<h3>How can I Detect and/or Filter Dropbox Network Traffic?</h3>
<p>The Dropbox client communicates with the Dropbox servers via HTTPS.<br />
In order to detect usage of Dropbox in your network, monitor network traffic to *.getdropbox.com and *.dropbox.com domains.<br />
In order to block Dropbox, make the DNS lookup not work correctly for *.getdropbox.com and *.dropbox.com domains or block network traffic to and from *.getdropbox.com and *.dropbox.com domains.</p>
<h3>How can I Detect the Dropbox Application using GFI LANguard 9?</h3>
<p>From the GFI LANguard Scanning Profiles Editor select the current profile and add the application named “Dropbox” as a not authorized application. In order to also detect the Windows Live SkyDrive client application, add the applications “Windows Live Upload Tool” and “SkyDrive Explorer” as not authorized.<br />
After changing the scanning profile, perform a security scan using that profile. High security vulnerability warnings will be generated.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/undetected-threats-cloud-storage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Delete Windows Patch Install Folders in Vista</title>
		<link>http://www.gfi.com/blog/delete-windows-patch-install-folders-vista/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=delete-windows-patch-install-folders-vista</link>
		<comments>http://www.gfi.com/blog/delete-windows-patch-install-folders-vista/#comments</comments>
		<pubDate>Thu, 12 Nov 2009 17:04:53 +0000</pubDate>
		<dc:creator>Bogdan Bot-Rus</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Windows patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1582</guid>
		<description><![CDATA[After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive.  Some of these folders are only temporary folders and are &#8230;]]></description>
				<content:encoded><![CDATA[<p>After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive.  Some of these folders are only temporary folders and are not needed once the patch has been installed.</p>
<p>In Figure 1, the Microsoft patch “Security Update for Microsoft Visual Studio 2008 (KB972221)” left behind a folder named <code>D:\d707465963f1f97d0d9e8ad0d33066cd</code>.</p>
<p><a class="lightbox" title="PatchFolder" href="http://www.gfi.com/blog/wp-content/uploads/2009/11/PatchFolder.png"><img class="aligncenter size-medium wp-image-1583" title="PatchFolder" src="http://www.gfi.com/blog/wp-content/uploads/2009/11/PatchFolder-300x223.png" alt="" width="300" height="223" /></a></p>
<p style="text-align: center;">Figure 1 KB972221</p>
<p style="text-align: center;"><span id="more-1582"></span></p>
<p>These folders are temporary folders (e.g. uncompressed archives) created by the patch installation mechanism and deleted once a patch is successfully installed. If the patch installation does not finish (e.g. if the computer is restarted while installing the patch) these folders might remain on the file system.</p>
<p><strong>Note: </strong>please be cautious when deleting folders. Do not delete folders that you are not certain that they are not needed anymore. Do not delete folders for patch installations that are currently running. Make sure that you have usable backups of the deleted folders before deleting them.</p>
<p>Administrators cannot delete these folders.</p>
<p><a class="lightbox" title="CannotDelete" href="http://www.gfi.com/blog/wp-content/uploads/2009/11/CannotDelete.png"><img class="aligncenter size-medium wp-image-1585" title="CannotDelete" src="http://www.gfi.com/blog/wp-content/uploads/2009/11/CannotDelete-251x300.png" alt="" width="251" height="300" /></a></p>
<p style="text-align: center;">Figure 2 Deleting folder</p>
<p>This is because the owner of the folders is the user SYSTEM and the group Administrators does not have permissions to delete them.</p>
<p><a class="lightbox" title="ls-l" href="http://www.gfi.com/blog/wp-content/uploads/2009/11/ls-l.png"><img class="aligncenter size-medium wp-image-1584" title="ls-l" src="http://www.gfi.com/blog/wp-content/uploads/2009/11/ls-l-219x300.png" alt="" width="219" height="300" /></a></p>
<p style="text-align: center;">Figure 3 Folder permissions</p>
<h2>How can I Delete these Folders?</h2>
<p>In order to delete these folders you need to change the owner of the folder to your current user and then you need to grant the necessary permissions to the new owner.</p>
<p>In order to do these changes you can use either Windows Explorer or the command line.</p>
<p>The commands to use from the command line are:</p>
<p><code>takeown /f &lt;FolderName&gt; /r /d y</code></p>
<p><code>icacls &lt;FolderName&gt;&lt;UserName&gt;:F /t</code></p>
<p>E.g.</p>
<p><code>C:\&gt;takeown /f D:\d707465963f1f97d0d9e8ad0d33066cd /r /d y</code></p>
<p><code>SUCCESS: The file (or folder): "D:\d707465963f1f97d0d9e8ad0d33066cd" now owned by user "PC\Administrator".</code></p>
<p><code>...</code></p>
<p><code>C:\&gt;icacls D:\d707465963f1f97d0d9e8ad0d33066cd /grant administrator:F /t</code></p>
<p><code>processed file: D:\d707465963f1f97d0d9e8ad0d33066cd</code></p>
<p><code>Successfully processed x files; Failed processing 0 files</code></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/delete-windows-patch-install-folders-vista/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Undetected Threats: LogMeIn</title>
		<link>http://www.gfi.com/blog/undetected-threats-logmein/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=undetected-threats-logmein</link>
		<comments>http://www.gfi.com/blog/undetected-threats-logmein/#comments</comments>
		<pubDate>Wed, 26 Aug 2009 12:30:56 +0000</pubDate>
		<dc:creator>Bogdan Bot-Rus</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[LogMeIn]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=894</guid>
		<description><![CDATA[LogMeIn is a graphical desktop sharing system. After installing LogMeIn on a Windows machine (the host), users can control the desktop of that machine from virtually anywhere via: Any web browser (ActiveX add-on, Java plugin client, Firefox plugin) Windows or &#8230;]]></description>
				<content:encoded><![CDATA[<p style="text-align: left;">LogMeIn is a graphical desktop sharing system. After installing LogMeIn on a Windows machine (the host), users can control the desktop of that machine from virtually anywhere via:</p>
<ul style="text-align: left;">
<li>Any web browser (ActiveX add-on, Java plugin client, Firefox plugin)</li>
<li>Windows or iPhone or BlackBerry Storm  application (LogMeIn Ignition)</li>
</ul>
<table border="1" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="103" valign="top"><strong>Product Name<br />
</strong></td>
<td width="198" valign="top"><strong>Similar Products</strong></td>
<td width="48" valign="top"><strong>Price</strong></td>
<td width="289" valign="top"><strong>Advantages</strong></td>
</tr>
<tr>
<td width="103" valign="top">LogMeIn Free</td>
<td width="198" valign="top"><a href="http://www.microsoft.com/ts">Remote Desktop Services (formerly known as Terminal Services)</a><br />
<a href="http://en.wikipedia.org/wiki/Vnc">Virtual Network Computing (VNC)</a></td>
<td width="48" valign="top">Free</td>
<td width="289" valign="top">Is not detected by firewalls, Intrusion Detection Systems, network security scanners.Allows connecting from anywhere on the internet to machines <a href="http://en.wikipedia.org/wiki/Non-routable_ip_address">without routable IP addresses</a>.</td>
</tr>
</tbody>
</table>
<p> </p>
<p><span id="more-894"></span></p>
<h2 style="text-align: left;"><a class="lightbox" title="LogMeInActiveX" href="http://www.gfi.com/blog/wp-content/uploads/2009/08/LogMeInActiveX.jpg"><img class="size-medium wp-image-896 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="LogMeInActiveX" src="http://www.gfi.com/blog/wp-content/uploads/2009/08/LogMeInActiveX-300x260.jpg" alt="" width="300" height="260" /></a></h2>
<h2 style="text-align: left;">How can I detect and/or filter LogMeIn Network Traffic?</h2>
<p style="text-align: left;">The machine where LogMeIn is installed initiates and maintains a constant HTTPS connection to the LogMeIn, Inc servers; the firewalls treat this as an outgoing connection as if a user is navigating to an HTTPS site.</p>
<p style="text-align: left;">Below is a Wireshark capture of the network traffic to and from the LogMeIn application installed on the host computer.</p>
<p><code>&lt;localhost&gt;   35641  &lt;DNSServer&gt;   53     DNS    Standard query A secure.logmein.com</code></p>
<p><code>&lt;DNSServer&gt;   53     &lt;localhost&gt;   35641  DNS    Standard query response CNAME secure.logmein.com.akadns.net A 77.242.192.193</code></p>
<p><code>&lt;localhost&gt;   2474   77.242.192.193       80     TCP    2474 &gt; http [SYN]</code></p>
<p><code>77.242.192.193       80     &lt;localhost&gt;   2474   TCP    http &gt; 2474 [SYN, ACK]</code></p>
<p><code>&lt;localhost&gt;   2474   77.242.192.193       80     TCP    2474 &gt; http [ACK]</code></p>
<p><code>&lt;localhost&gt;   2474   77.242.192.193       80     TCP    [TCP segment of a reassembled PDU]</code></p>
<p><code>&lt;localhost&gt;   53211  &lt;DNSServer&gt;   53     DNS    Standard query A control.app105.logmein.com</code></p>
<p><code>&lt;DNSServer&gt;   53     &lt;localhost&gt;   53211  DNS    Standard query response CNAME app105.logmein.com A 77.242.193.145</code></p>
<p><code>&lt;localhost&gt;   2475   77.242.193.145       443    TCP    2475 &gt; https [SYN]</code></p>
<p><code>77.242.193.145       443    &lt;localhost&gt;   2475   TCP    https &gt; 2475 [SYN, ACK]</code></p>
<p style="text-align: left;">The above capture shows all of the types of traffic done by the LogMeIn application. The application connects via HTTP to secure.logmein.com to and receives a web page that contains the host name of a LogMeIn gateway. Then, the application connects via HTTPS to the received host name.</p>
<p style="text-align: left;">In order to detect LogMeIn applications in your network, monitor network traffic to *.logmein.com domain.</p>
<p style="text-align: left;">In order to block LogMeIn applications, make the DNS lookup not work correctly for *.logmein.com domain or block network traffic to and from  *.logmein.com domain.</p>
<h2 style="text-align: left;">How can I detect LogMeIn using GFI LANguard 9?</h2>
<p style="text-align: left;">From the GFI LANguard Scanning Profiles Editor select the current profile and add the application named “LogMeIn” as shown in the screen shot below.</p>
<p style="text-align: center;"><a class="lightbox" title="SoftwareAuditProfile" href="http://www.gfi.com/blog/wp-content/uploads/2009/08/SoftwareAuditProfile.jpg"><img class="size-medium wp-image-897 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="SoftwareAuditProfile" src="http://www.gfi.com/blog/wp-content/uploads/2009/08/SoftwareAuditProfile-300x173.jpg" alt="" width="300" height="173" /></a></p>
<p style="text-align: left;">After changing the scanning profile, perform a security scan using that profile. A high security vulnerability warning will be generated.</p>
<p style="text-align: center;"><a class="lightbox" title="SoftwareAuditProfileScanResults" href="http://www.gfi.com/blog/wp-content/uploads/2009/08/SoftwareAuditProfileScanResults.jpg"><img class="size-medium wp-image-898 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="SoftwareAuditProfileScanResults" src="http://www.gfi.com/blog/wp-content/uploads/2009/08/SoftwareAuditProfileScanResults-300x128.jpg" alt="" width="300" height="128" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/undetected-threats-logmein/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:59:25 by W3 Total Cache --