mcitp videos:

Trend Micro: Hacker threats to water supplies are real

A security researcher has shown that hackers, including an infamous group from China, are trying to break into the control systems tied to water supplies in the U.S. and other countries.

Last December, a decoy water control system disguised as belonging to a U.S. municipality, attracted the attention of a hacking group tied to the Chinese military, according to Trend Micro researcher Kyle Wilhoit. A dozen similar traps set up in eight countries lured a total of 74 attacks between March and June of this year.

Wilhoit’s work, presented last week at the Black Hat conference in Las Vegas, is important because it helps build awareness that the threat of a cyberattack against critical infrastructure is real, security experts said Tuesday.

“What Kyle is saying is really neat and important,” said Joe Weiss, a security expert and consultant in industrial control systems (ICS). “What he’s saying is that when people see what they think is a real control system, they’re going to try and go after it. That’s a scary thought.”

Indeed, people behind four of the attacks tinkered with the special communication protocol used to control industrial hardware. While their motivation is unknown, the attackers had taken a path that could be used to destroy pumps and filtration systems or whole facilities.

To sabotage specific systems, attackers would need design documents. Wilhoit’s research showed that there are hackers willing to destroy without knowing the exact consequences, according to Andrew Ginter, vice president of industrial security at Waterfall Security. “If you just start throwing random numbers into (control systems), the world is going to change,” said Ginter, who studied Wilhoit’s research. “Things are going to happen. You don’t know what. It’s a random type of sabotage.”

The Chinese hacking group, known as APT1, is the same team that security vendor Mandiant had tied to China’s People’s Liberation Army. The group, also called the Comment Crew, is focused on stealing design information, not sabotage, experts said.

Because sabotage would open itself up to retaliation and possibly war, China is unlikely to mount that type of attack. Those kinds of restraints do not exist for terrorists, however.

While Wilhoit did not identify any terrorist groups, his research did show that the attackers are interested in small utilities. He created eight honeypots, each masked by Web-based login and configuration screens created to look as if they belonged to a local water plant. The decoys were set up in Australia, Brazil, China, Ireland, Japan, Russia, Singapore and the U.S.

Attackers will often start with smaller targets to test software tools and prepare for assaults on larger facilities, Weiss said. “The perception is that they’ll have less monitoring, less experience and less of everything else (in security) than the big guys,” he said.

While Wilhoit’s honeypots showed that a threat exists, they did not reflect a real-world target. Control systems are typically not as easy to access through the Internet, particularly in larger utilities.

Buried within a company’s infrastructure, a control system would not be accessed without first penetrating a company’s defensive perimeter and then finding the IP address of the hosting computer, said Eric Cosman, vice president of standards and practices for the International Society of Automation.

None of the attackers in Wilhoit’s research showed a high level of sophistication, which wasn’t surprising. That’s because hackers typically use only the technology needed to succeed, nothing more.

“(Advanced attackers) are known to have many cards in their pockets, and they pull out the cheapest card first,” Ginter said. “If they can win the game with a two of hearts, then that’s the card they’ll play.”

Wilhoit’s research is seen as one more step toward building public awareness of the threats to critical infrastructure. In addition, such reports are expected to have an impact on regulators.

“You’re going to have public utilities commissions reading this report and asking the utilities questions,” Ginter said. “In a sense, this is a good thing. The awareness level needs to go up.”


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


Continue Reading

Windows 8 Update: Scarcity of touchscreens is hurting Windows 8

Dell deal on Windows RT, dubious Windows 8 sales numbers

Along with whatever other problems Windows 8 faces, Microsoft partners interested in making machines that show the operating system off to best advantage are handicapped by a short supply of touchscreens, the top Windows executive says.

The company is hoping the problem will be solved in time to make alluring devices in time for Christmas sales, says Tami Reller, chief marketing and financial officer for the Windows division, as quoted in this CITEworld story.

“We see that touch supply is getting so much better,” Reller says. “By the holidays we won’t see the types of restrictions we’ve seen on the ability of our partners and retail partners to get touch in the volume they’d like and that customers are demanding.”

Along with that area a slew of complaints about the Windows 8 user interface, many of which may be addressed by Windows Blue, the code name for the upgrade that is also coming out later this year, likely before the holidays, Reller says.

It’s still unclear what changes Windows Blue will include although rumors say the start button and start page so familiar in earlier versions of Windows will be restored. The specifics of Windows Blue – officially called Windows 8.1 – will be revealed at the Microsoft Build developers’ conference at the end of June, she says.

Although Reller didn’t mention it during her remarks at a JP Morgan tech conference in Boston, by the end of the year Intel’s Haswell chips should be in production offering a longer battery life, higher performance and improved graphic processing for a range of devices such as ultrabooks, convertibles and tablets.

This is a convergence of events that Microsoft no doubt would have welcomed last holiday season just after Windows 8 launched in October.

Windows RT deal
Dell has come out with a Windows RT tablet for $300 – $200 less expensive than the cheapest Microsoft Surface RT.

That’s a limited time offering and is a $150 discount off the regular price for its XPS 10, which sports a 10.1-inch display and, like all Windows RT devices, runs on ARM chips. Another short-term option tosses in a keyboard/dock for an extra $50.

At that price the bundle is still significantly cheaper than an iPad and may grab a few potential Apple customers.

When is 100 million not 100 million?
Microsoft says it’s sold 100 million Windows 8 licenses so far and seems proud of it, but the number is being picked apart by people who note that the number of licenses sold might be far higher than the number in actual use.

According to a story in ComputerWorld the count of machines running Windows 8 could be closer to 59 million.

Why would Microsoft release the higher number but not release the number of machines that have activated the software? The obvious answer: that number is embarrassingly small.

Windows 8 is bad for this business
Buffalo, N.Y. -based Synacor blames Windows 8 for a 16% drop in search-engine advertising revenues for its content-portal services.
Because Windows 8 defaults to Bing as the search engine and sets MSN as the home page, according to this story in the the Buffalo News. Part of Synacor’s business is to set its customers’ advertising pages into the start page of end users’ browsers.

“That hurts Synacor because the company generates revenue every time a subscriber uses the Google search box on the start pages that it designs, while a reduction in page views also hurts Synacor’s advertising sales on those start pages,” the News story says.

The situation has contributed to a 5% drop in revenues for Synacore.

 


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 


Continue Reading

Microsoft MCSA Certification Training

The pros know: When it comes to boosting resumes and displaying skills, not all certs are created equal.

Many IT experts stress the fact that some accreditations are more valuable than others in today’s market. Though technologies constantly evolve and new certifications frequently become available in specific areas, the importance of holding basic credentials shouldn’t be overlooked.

Microsoft Certified Systems Administrator (MCSA) certification is among a handful of IT building blocks many professionals rely on to display their skills working with systems running Windows Server operating systems.
Market share boosts MCSA certification’s value

According to an early 2011 report from Network World, nearly 90 percent of all computers worldwide run on a Microsoft operating system. With such a vast percentage of the market using Windows, IT professionals with strong accreditations from Microsoft, including MCSA certification, are likely to be important players on any technology team.
Why the MCSA certification works for IT pros

According to Microsoft, the MCSA certification “helps enable IT professionals to demonstrate their ability to administer network and systems environments with Windows Server 2003-based business solutions.” It can be thought of as a stepping stone to the MCSE (Microsoft Certified Systems Engineer) and other certs.

Though Windows Server 2003 might sound like a dated operating system–indeed, official mainstream support from Microsoft ran out in July 2010–it’s important to be aware of the software’s staying power in world markets. Just as, according to a May 2011 report from Tech Spot, 53 percent of all PCs run Windows XP, many businesses have found no reason to replace their Windows Server 2003 platforms with Windows Server 2008 or 2008 R2 as of yet. That said, for newer technologies such as Windows Server 2008 or Exchange Server 2010, Microsoft recommends pursuing the MCITP (Microsoft Certified IT Professional) title.

According to Microsoft, IT pros eligible for MCSA candidacy typically have “one to 12 months of experience in working with a desktop operating system, a network operating system and an existing network infrastructure.” For most professionals, MCSA certification can be obtained after earning passing marks on four tests.
MCSA certification makes a difference in the job market

Microsoft boasts that workers who hold its certifications are valuable members of any IT staff, claiming, “Training and certification are necessary to maintain a high level of performance.” The company says that 63 percent of higher-level managers believe that certified individuals are more productive on the job and that certs authenticate relevant skills.

Earning MSCA certification might make a bigger paycheck a reality, too. According to information updated in May of 2011 from PayScale.com, annual salary for an IT manager with MCSA certification typically ranges from $55,900 to $85,817.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


Continue Reading

What’s the Business Value of SOA? Show It with KPIs


What’s the Business Value of SOA? Show It with KPIs

If you’re in IT, you’re being asked to add more business value than ever. In fact, today’s “CIOs are being asked to become drivers of the business while at the same time many are trying to replace old and inflexible infrastructures with modern and flexible ones,” according to InformationWeek’s Analytics 2009 Global CIO Survey. This report adds that “across the globe CIOs are fighting the stubborn perception that IT in general-and CIOs and their teams in particular-are cost centers rather than creators of value and accelerators of innovation.” Does this sound familiar? Whether you already have an SOA in place-or you’re just getting started with SOA-it is essential to prove business benefits.

Today, measuring cost and revenue impact as well as other SOA metrics is vital to any leading organization. Measuring the value and tracking changes to these metrics are critical as your SOA grows and its portfolio expands. Recent surveys from Forrester Research show organizations are increasingly implementing SOA as a business enabler. Furthermore, recent Gartner research concluded that:

More than 60% of organizations said their SOA projects had a positive impact on their organization’s ability to grow revenue; and
SOA projects generated positive returns…typically within 10 months

 

MCTS Certification, MCITP Certification

Best SOA Certification, SOA Exam at examkingdom.com

A proven way to demonstrate an SOA’s business value is through Key Performance Indicators (KPIs). KPIs use a language your business colleagues understand: metrics. They give you the means to measure a return on your SOA investment and directly link SOA projects to real business improvements:

What KPIs you can use to start measuring SOA results
How leading organizations-Avnet, Coca-Cola Enterprises and France Telecom-measure how SOA contributes to business success
How Software AG can help you analyze and deliver on your SOA-based KPIs

Software AG, provides a complete solution for SOA Governance, CentraSite, that enables customers to manage their IT assets and measure their business value.

If you’re looking for an introduction to SOA, please read our book, SOA Adoption for Dummies.


Continue Reading

Microsoft’s SkyDrive now stores 1B documents

Microsoft adds document-sharing link feature

Microsoft’s SkyDrive cloud storage service now has one billion Office documents stored in it, the company announced today.

While a billion may seem like a lot, the most popular consumer cloud storage service, Dropbox, has more than 100,000,000 users. According to the company’s information site, users save one billion files to Dropbox every 24 hours.

But along with Microsoft’s upload milestone news, Microsoft said it has added new features to SkyDrive that will make it easier to share content with others.

“Recently, we reached a big milestone; our customers are now storing over a billion Office documents on SkyDrive! We’re really excited about the feedback we’ve seen around the new version of Office and the deep integration of SkyDrive,” Sarah Filman, a Lead Program Manager on SkyDrive, wrote in a blog post.

Last week, Microsoft launched Office 365 Home Premium, which is tightly integrated with SkyDrive, offering an icon for saving and sharing documents through the cloud service.

Today, Microsoft announced a new feature in SkyDrive and the Office Web Apps that offers an easier way to share and edit documents by not requiring users to sign in with their Microsoft account.

In a feature similar to what other cloud storage vendors such as Dropbox already offer, Microsoft now gives users an edit link that can be used to give anyone access to a document at the same time.

Sharing a document link through SkyDrive

“One piece of feedback we’ve consistently heard, especially from students, is that our current SkyDrive edit links can be frustrating for recipients when they find that they need to sign in or sign up for a Microsoft account just to make a quick edit to the document,” Filman wrote.

Document originators can also limit who can view and edit their content by inviting specific people via their email addresses and checking the “Require user to sign-in” check box.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


Continue Reading

General Issues in Computer Networking

Computer networking is one of the most important aspect of any IT based firm either directly related to IT or not at all. Though, there are businesses and firms which are not related to IT but have to have computer networks for their business operations and management of the records. They might need to communicate within their offices and to share digital files and data that are stored on a computer. So, computer networking, which may be limited to few computers, is essential for a particular firm. Because of its importance and benefits, most of the firms and businesses setup computer networks having various aims and purposes but the most important is to have safe and sound computer networking in place in order to have secure information and data sharing.
Though, different high-fi technologies and equipment exist today enable robust computer networks but still there are several limitation and issues that may be caused due to different reasons. These issues are mostly about security, network failure, disaster and recovery. Having a secure network is the most crucial requirement of the computer network because it is not only about compromising over the data loss but it’s more about the sensitivity of the data and its importance. If the network setup is not that secure then any spy can hijack your network and may play around for malicious aims which may not be in your favour at any cost. Therefore, having a professional network or IT consulting service from a renowned firm to establish a secure and theft proof computer network is quite worthy.

MCTS Training, MCITP Trainnig

Best Network General Certification, Network General Exam at certkingdom.com

 

Apart from security, there are many other concerns such as network failure, which may be caused by any damage, or environmental hazards like fire, building damages, or electricity burn down. In such cases, there should always be suitable disaster recovery mechanism in place in order to have backup which may be utilized to avoid heavy data losses. However, implementing a disaster recovery system is not so easy, so a professional firm must be consulted for enhanced security and disaster recovery solutions in computer networking.


Continue Reading

Does McAfee Total Protection Protect Your Computer ?

McAfee Total Protection protects your family and entire network of PCs from viruses, spyware, hackers, identity thieves, and online scammers. Designed to redefine the way in which companies manage security solutions, McAfee Total Protection is the industry’s first and only offering to combine and manage all the elements of a comprehensive system security solution through a single console and agent platform. Accelerated performance and revolutionary Active Protection technology enabling the fastest updates and highest levels of detection against malicious threats. One of the first things you would notice about McAfee Total Protection is the abundance of unique security tools. Without doubt, the antivirus protection is exceptional and the anti-spam considered great.

McAfee Total Protection is hassle-free, all-you-need security ideal for people who are constantly online for communication, shopping, banking, trading or viewing entertainment.

This program was initially code named “Falcon”, which was designed with every imaginable protection. As you can imagine, McAfee Total Protection includes an excellent firewall, along with antivirus protection, anti-spyware, and even protection against unwanted spam. However, this program offers much more such as wireless network protection, network management, parental controls, back up and restoration features, and more.

MCTS Training, MCITP Trainnig

Best McAfee Certification, McAfee Exam  at certkingdom.com

McAfee Total Protection is the fi nal word in PC security. Powerful industry-grade spam protection helps keep your inbox free from unwanted, fraudulent, offensive, and phishing emails. Provides you with easy to understand alerts regarding your protection. Alerts you to web sites that may try to steal your identity Identity Protection. Helps you to shop, bank, and trade online safely Two-way Firewall Protection. Automatically saves copies of your most valuable files on a CD/DVD, USB, external, or network drive Protection without Interference. There’s no excuse for not giving your systems the best security available, as the total cost of ownership for McAfee Total Protection is less than half when compared to Symantec and Trend Micro.

An Internet connection is required to install this software and to receive automatic updates and upgrades to keep your security up to date. Lets you easily fix security issues on your home network from one PC. Proactive security for what you value most Unparalleled protection by blending the most sophisticated security technologies available McAfee security service automatically and continually upgrades software and updates threat protection .

With continuous and automatic updates, McAfee helps ensure that you are always running the most current security to combat the ever-evolving threats on the Internet for the duration of your subscription. Together with Anti-Spyware and Adware protection, McAfee Total Protection is even better value than before. No pop-up window blocker or internet security software (such as Norton Internet Security, McAfee Total Protection) is running during the installation. A powerful web site guide and shield, McAfee SiteAdvisor Plus technology helps you to safely search and transact online by providing you with color-coded ratings to warn you about and actually prevent you from visiting risky web sites that can compromise your identity and your PC.

McAfee Total Protection is a single concept with four distinct offerings for customers of all sizes and needs. McAfee Total Protection for enterprise includes anti-virus for all tiers of the network, anti-spyware, anti-spam, desktop firewall, host intrusion prevention and a complete network access control system all managed by a single console.

With continuous and automatic updates, McAfee ensures that you’re running the most current security to combat the ever-evolving threats on the Internet for the duration of your subscription.

McAfee Total Protection for small business builds upon McAfee heritage of delivering security and software-as-a-service, ensuring an always on, always up-to-date, security environment

Detects, blocks, and removes viruses, spyware, adware and rootkits such as W32/Conficker.

The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.


Continue Reading

Windows 8 discounts end in three weeks

Price of Windows 8 Pro upgrade may quintuple after Jan. 31

Microsoft’s Windows 8 Pro upgrade discount will expire in about three weeks, at which point the company will triple or even quintuple the current price of the new operating system, according to several online retailers.

On Friday, Microsoft reminded customers that a different upgrade deal will expire Jan. 31 — one that lets purchasers of new Windows 7 PCs acquire Windows 8 Pro for $14.99 — but made no mention of the same deadline for an upgrade from Windows XP, Vista and Windows 7 on older PCs.

10 third-party alternatives for ‘missing’ Windows 8 apps

That discount, also set to end Jan. 31, prices a download upgrade to Windows 8 Pro at $39.99, or $69.99 for a DVD.

Microsoft announced both deals in mid-2012, and began selling the upgrades in October when Windows 8 debuted in retail.

According to online retailers, including Amazon, Newegg and TigerDirect, the DVD-based Windows 8 Pro upgrade carries a suggested list price of $199.99, or nearly triple the now-discounted price of $69.99.

Although Microsoft has repeatedly declined to comment on post-January pricing plans for Windows 8 Pro, its past pricing practices sync with the $199.99 list price: An upgrade to Windows 7 Professional, analogous to Windows 8 Pro, has always been priced at $199.99. Microsoft’s e-store currently lists it at that price.

It’s unknown whether Microsoft will continue to sell Windows 8 Pro as a download after the discount expires, and if it does, at what cost. If the price of a download is identical to the boxed copy — Microsoft has priced downloads and DVDs identically in the past — then the OS price will jump five-fold on Feb. 1.

The company has also declined to answer questions about Windows 8, the less-capable edition pre-installed on most new consumer PCs. But its silence has effectively confirmed that there will never be a Windows 8, as opposed to Windows 8 Pro, upgrade.

There is another, less-expensive, option after Jan. 31: Windows System Builder, the version for do-it-yourselfers who assemble their own machines, and who want to run Windows in a virtual machine or dual-boot configuration. While the new “Personal Use License” of System Builder bans using it as “an upgrade license for an existing underlying Windows operating system,” there’s nothing stopping customers from using it to do a “clean install,” the term for installing an operating system on a reformatted hard drive.

Microsoft does not sell Windows 8 or Windows 8 Pro System Builder itself, leaving that to retail partners. Although some offer minor discounts, the list prices are $99.99 (Windows 8) and $139.99 (Windows 8 Pro). Those are identical to the prices for “OEM” editions — the former name for System Builder — of Windows 7 Home Premium and Windows 7 Professional, respectively.

Another price that may jump after Jan. 31 is the Windows 8 Pro Pack’s, which upgrades Windows 8 to Windows 8 Pro. Microsoft sells Pro Pack at $69.99; retailers currently sell it at that price or the slightly-lower $66.99, but note its list price as $99.99.

Other Windows 8 deadlines are also approaching: The Windows 8 Developer Preview of September 2011, the Consumer Preview of February 2012 and the Release Preview of May 2012 all expire Jan. 15. After that date, the free previews will automatically restart every one or two hours, and on-screen messages will tell customers that they must upgrade to a paid license.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Can Microsoft Survive If Windows 8 Fails?

Microsoft is betting the farm on the success of Windows 8–its new and radically different operating system.

That at least is the uncompromising view espoused by Steve Ballmer, the company’s chief executive. “Our hardware partners are all in, companies like Verizon and AT&T are all in, there are hundreds of operators and retailers around the world who are all in, developers are all in, and–if anyone wasn’t convinced yet –Microsoft is all in,” he said at the San Francisco launch of the desktop version of the software in October.

But in financial terms, Microsoft may not be quite so “all-in” as Ballmer suggests: The company has plenty more chips on the table to use if its gamble with the new look Windows fails to deliver. Last year the company’s revenues from operating system sales accounted for just 25 percent of its total sales, and almost half of that came from its enterprise licensing agreements which generate cash regardless of whether customers chooses to upgrade to Windows 8 or not. (That’s probably just as well for Microsoft–only 4 percent of enterprises questioned in a recent Forrester survey have specific plans to deploy Windows 8 desktops in the next 12 months.)

So however Windows 8 is received, Microsoft will be just fine financially. But what would the failure of Windows 8 really mean for the future of Windows? Could it spell the end for the Microsoft’s client operating system business?

“Anything can fail and disappear,” says Michael Cherry, an analyst at Directions on Microsoft. “Wang was once the big name in word processing but it has gone, and DEC is no longer around today,” he points out. “Windows is used in so many places that it would take more than a single screw-up by Microsoft for Windows to disappear, but I wouldn’t say that it could never happen.”

Failure for Windows 8 would certainly have more far reaching consequences for Microsoft than did the failure of Windows Vista. When that operating system proved not to be the hit that the company had hoped, Microsoft simply moved swiftly on and released Windows 7, a stable and (relatively) secure operating system that is popular with consumers and, increasingly, enterprise customers.

But things are different this time around because Windows 8 is not just a new operating system for the desktop, but part of a whole new Windows 8 ecosystem that also includes operating systems for the increasingly important tablet computer market and for smartphones–all with the same tile-based user interface. That means it can’t back away from the new desktop user interface without leaving its “one interface for all devices” strategy in tatters.

So Microsoft is apparently hitching its Windows desktop fortunes to a user interface which was originally designed for Windows Phone. And there’s no getting around the fact that Windows Phone has spectacularly failed to impress thus far: IDC’s Q3 2012 figures show Android was biggest selling phone operating system with 75 percent of the market, with iOS in second place with Apple in second place with just under 15 percent.

Windows Phone, by contrast, commands less than 4 percent. (Some may argue that there are other reasons why Windows Phone is failing, like a lack of apps, but that didn’t hold iOS or Android back in their early days.)

In fact, Windows Phone may be irrelevant to the fortunes of Windows 8. That’s because the key purpose of the “one interface for all devices” strategy is to capture a sizable chunk of the rapidly developing tablet market, says David Johnson, a senior analyst at Forrester Research. “The big value proposition is the communality across form factors,” he says. “Microsoft’s best chance is that employees want to use Windows tablets and bring them in to their workplace.”
Tablets Are Key to Windows 8 Impact

So what’s most important for Microsoft is that the new Windows 8 interface proves popular on tablet computers–either the consumer oriented ARM-based ones running Windows RT, or the Intel-based ones running Windows 8 Pro which can be managed by IT departments, and which are thus more suitable for enterprise use.

9 Things Enterprise IT Will Like About Windows 8

And the good news for Microsoft is that although sales of Windows Phone devices have been poor, there appears to be a high level of interest in Windows tablets. A recent Forrester survey found that 20 percent of respondents plan to use one for work, compared to 26 percent who plan to use an iPad.

But it’s important to remember that Forrester’s survey was carried out before any Windows 8 tablets had been released, and there’s still a risk that people will reject Windows 8 on tablets the way they seem to be doing with Windows Phone devices. If neither of these platforms take off then Microsoft will be left with a desktop operating system with a user interface that has no reason to exist — one that has been adopted to match a tablet and phone user interface that no-one is interested in. “If enterprises are slow to adopt Windows tablets or don’t see the value proposition then that whole strategy is at risk,” Johnson says.

This view is echoed by Michael Silver, a research vice president at Gartner. “If Windows 8 on the phone doesn’t take off then it’s really no big deal for Microsoft. But if they do poorly with the tablet this has much bigger implications.” The only driver to deploy Windows 8 at this stage is to provide a unified operating system for tablet and PC users, so if Windows tablets fail to take off then that driver disappears, he adds.

The barriers to adoption of Windows 8 would remain, however: A new interface means a new way of working, and probably a certain amount of training or experimenting before productivity levels return to pre-Windows 8 levels.

“The new user interface is less of a problem than it would have been ten years ago because people have got used to mobile interfaces, says Johnson. “But our surveys show that companies are concerned about this, they don’t think the user interface changes are good changes.”

10 Must-Have Features for Windows 9

Perhaps what Ballmer meant with his “all-in” comment was simply that there is no going back from the changes that Windows 8 introduces: If Windows 8 fails, there will be more of the same, including the new interface, in Windows 9. “Windows 8 should be seen as the start of a journey,” says Michael Cherry at Directions at Microsoft. “The current Windows code is now 20-years-old, so for Microsoft doing nothing is just as risky as attempting to introduce the new Windows. At some point they really do have to get off the old plumbing,” he says.

 


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


Continue Reading

Security firms warn of spreading Windows AutoRun malware

Security firms warn of spreading Windows AutoRun malware

Antivirus vendors are warning customers of a spreading malware that can infect computers through a well-known bug in the Windows AutoRun software used to automatically launch programs on a DVD or USB device.

The significant increase in infection is curious because Windows 7 and Windows 8 PCs will not launch autorun.inf files, and Microsoft has released two patches for older systems. Therefore, security experts believe infections are happening through a combination of unpatched computers, shared folders and files and social media.

WINDOWS 8 UPDATE: Microsoft Surface Pro tablets start at $899, no keyboard

Someone inserting a USB drive or memory stick carrying the malware can infect unpatched PCs. On other systems, an infection can occur once the malware travels to a network share and someone clicks on an infected file or folder. Trend Micro reported that malware was also spreading on Facebook.

Other vendors tracking the malware include McAfee, Symantec and Sophos. While it is interesting that cybercriminals are still exploiting a four-year-old AutoRun bug, Sophos says most corporate PCs are being infected through network sharing.

Clicking the malware on Facebook would certainly open a quick path to a shared folder on a corporate network, said Chester Wisniewski, a senior security adviser for Sophos.

[How to: 10 commandments of Windows security]

“I would say the AutoRun part of it is probably not the source of the majority of infections,” Wisniewski said on Friday. “It’s just an interesting note that [criminals] are still using it. I think spreading through the file shares is probably the primary vector to get people in trouble.”

Microsoft released an AutoRun patch in 2009, a month after the U.S. Computer Emergency Readiness Team (US-CERT) issued a warning that Windows 2000, XP and Server 2003 did not properly disable the feature. Microsoft had patched AutoRun a year earlier in Vista and Windows Server 2008.

The infamous Stuxnet malware created an autorun.inf file to infect computers via USB drives. Stuxnet, created jointly in 2009 by U.S. and Israel, reportsA’A The New York Times, damaged Iranian nuclear facilities.

The latest malware disguises itself as files and folders in writeable network shares and removable devices, while hiding the originals. The application will also create .exe files named “porn” and “sexy” and a folder called “passwords,” to entice people to click on them, Sophos said.

The malware adds a registry key, so it can start when a PC is booted up. Variants of the application will disable Windows Update to prevent the victim from downloading patches to disable the malware.

Once a PC is infected, the application follows the typical procedure for such malicious software. It contacts a command-and-control server for instructions and to receive other applications. Malware downloaded include Trojans in the Zeus/Zbot family, which steals online banking credentials, Sophos said

To combat the malware, security experts recommend disabling AutoRun on all Windows operating systems and restricting write permissions to file shares. Depending on the AV vendor, the malware has several names, including W32/VBNA-X, W32/Autorun.worm.aaeb, W32.ChangeUp and WORM_VOBFUS.

The latest outbreak arrives about a year and a half after Microsoft reported big declines in AutoRun infection rates. In the first five months of 2011, the number of AutoRun-related malware detected by Microsoft fell 59% on XP computers and 74% on Vista PCs, compared with 2010.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 


Continue Reading

Best 9A0-142 practice test

Adobe Systems Incorporated is the American international company. It usually deals in computer software products. Headquarter of this corporation is situated in San Jose, California, United States of America. Adobe Systems Incorporated Company has done a lot of work in the multimedia and some other software products. The products of Adobe have become much admired in all over the world. Adobe is also offering so many vital certification exams for the IT persons. More and more IT professionals are moving toward the certifications of Adobe so as to make their resume more strong and eye-catching. All the prominent & famous organizations prefer to hire only those candidates who are quite experienced, knowledgeable, & have some additional degree in their relevant field. Having additional certifications relevant to the field facilitates the person in getting high ranked job, good salary packages and it also shows your worth and competency. In this way Adobe certifications can be very vital in order to capture the attention of these companies. 9A0-142 is one of the advantageous certification test of the Adobe. 9A0-142 is also known as “Adobe® In Design CS5 ACE Exam”.

MCTS Certification, MCITP Certification

Best Adobe Training, Adobe Certification at examkingdom.com

This certification exam of Adobe will enhance your career & increase your knowledge. But in order to pass the 9A0-142 one important aspect must keep in mind and which is selecting the latest training or coaching material and well preparation before the date of the exam. And these important things or online resources make easy to clear the Adobe exam of 9A0-142. There are many online resources that are offering the latest material for the 9A0-142 test. But all of these preparation materials are not considered as the latest material. You should hunt for the best and reliable online source for the latest material for the 9A0-142 exam. The latest material or the preparation material which is acquired from the online vendor must give the clear idea about the real exam questions & answers of the exam. Many of the online vendors also give the real exam questions with the money back guarantee. If you get the real exam questions which approximately come in the real exam of the 9A0-142 then you don’t need to worry. These real exam questions & answers are specifically very useful for the working professionals. Practice test can also be vital for the 9A0-142 exam. Practice tests comprise the real exam questions and answers which come into view in the ultimate paper of the 9A0-142. After acquiring practice tests you should be well practiced before the date of the exam. If you desire to clear the 9A0-142 certification exam of Adobe in the first attempt you should utilize the 9A0-142 boot camps, 9A0-142 practice tests and 9A0-142 exam questions & answers kits.


Continue Reading

70-664 Q&A / Study Guide / Testing Engine / Videos

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. You have been asked to deploy Lync Server
2010 as a VOIP telephony and video conferencing solution for the company.
Company management is concerned about the possible network load imposed by the VoIP and
video conferencing features of Lync Server 2010.
To manage the network bandwidth used by the system, you configure Call Admission Control.
How can you enable the Call Admission Control feature?

A. By running the Set-CsNetworkInterSitePolicy cmdlet.
B. By running the Set-CsNetworkConfiguration cmdlet.
C. By running the Set-CsCpsConfiguration cmdlet.
D. By running the Set-CsVoiceConfiguration cmdlet.

Answer: B

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The company’s communication system is
provided by a Lync Server 2010 infrastructure.
You have configured a bandwidth policy to limit the network bandwidth used by real-time audio
and video sessions.
You want to override the policy for the Managing Director of the company.
What type of policy should you create first to enable you to override the bandwidth policy for the
Managing Director?

A. You should first create a Conferencing Policy.
B. You should first create a Client Version Policy.
C. You should first create a Voice Policy.
D. You should first create an External Access Policy.

Answer: C

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. You are configuring a new Lync Server 2010 infrastructure.
You want the company phone number to be displayed in the format +11112222333 when users on
the Public Switched Telephone Network (PSTN) receive calls from users using the Lync Server
system.
Which cmdlet should you run?

A. You should run the Set-CsVoiceConfiguration cmdlet.
B. You should run the Set-CsNetworkInterSitePolicy cmdlet.
C. You should run the Set-CsVoicePolicy cmdlet.
D. You should run the Set-CsLocationPolicy cmdlet.

Answer: C

Explanation:


QUESTION 4
Your work as a Network Administrator at Certkingdom.com includes the management of the Lync Server
2010 infrastructure.
The Lync Server 2010 infrastructure includes a Mediation Server pool that includes three servers
named Certkingdom-Med1, Certkingdom-Med2 and Certkingdom-Med3.
You need to take Certkingdom-Med3 offline for maintenance.
Which two of the following steps should you perform to allow you to take Certkingdom-Med3 offline without
disconnecting any current calls in progress?

A. Navigate to the Lync Server 2010 Topology Builder.
B. Navigate to the Lync Server 2010 Control Panel.
C. Modify the properties of the Mediation Pool.
D. Modify the properties of Certkingdom-Med3.
E. Create a new Mediation Pool.

Answer: B,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. You are in the process of deploying a Lync
Server 2010 infrastructure for the company.
You have configured dial-in conferencing and verified that it is functioning properly.
You now want to notify users about the availability of the feature. The notification should include
introductory instructions such as the initial PIN and the link to the Dial-in Conferencing Settings
webpage.
What is the easiest way to send the notification with the required information to the users?

A. Open the Lync Management Shell and run the New-CsAnnouncement cmdlet.
B. Open the Lync Management Shell and run the Set-CsPinSendCAWelcomeMail cmdlet.
C. Open the Lync Management Shell and run the New-CsConferenceDirectory cmdlet.
D. Open the Lync Management Shell and run the New-CsConferencingConfiguration cmdlet.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

70-664 Q&A / Study Guide / Testing Engine / Videos

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. You have been asked to deploy Lync Server
2010 as a VOIP telephony and video conferencing solution for the company.
Company management is concerned about the possible network load imposed by the VoIP and
video conferencing features of Lync Server 2010.
To manage the network bandwidth used by the system, you configure Call Admission Control.
How can you enable the Call Admission Control feature?

A. By running the Set-CsNetworkInterSitePolicy cmdlet.
B. By running the Set-CsNetworkConfiguration cmdlet.
C. By running the Set-CsCpsConfiguration cmdlet.
D. By running the Set-CsVoiceConfiguration cmdlet.

Answer: B

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The company’s communication system is
provided by a Lync Server 2010 infrastructure.
You have configured a bandwidth policy to limit the network bandwidth used by real-time audio
and video sessions.
You want to override the policy for the Managing Director of the company.
What type of policy should you create first to enable you to override the bandwidth policy for the
Managing Director?

A. You should first create a Conferencing Policy.
B. You should first create a Client Version Policy.
C. You should first create a Voice Policy.
D. You should first create an External Access Policy.

Answer: C

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. You are configuring a new Lync Server 2010 infrastructure.
You want the company phone number to be displayed in the format +11112222333 when users on
the Public Switched Telephone Network (PSTN) receive calls from users using the Lync Server
system.
Which cmdlet should you run?

A. You should run the Set-CsVoiceConfiguration cmdlet.
B. You should run the Set-CsNetworkInterSitePolicy cmdlet.
C. You should run the Set-CsVoicePolicy cmdlet.
D. You should run the Set-CsLocationPolicy cmdlet.

Answer: C

Explanation:


QUESTION 4
Your work as a Network Administrator at Certkingdom.com includes the management of the Lync Server
2010 infrastructure.
The Lync Server 2010 infrastructure includes a Mediation Server pool that includes three servers
named Certkingdom-Med1, Certkingdom-Med2 and Certkingdom-Med3.
You need to take Certkingdom-Med3 offline for maintenance.
Which two of the following steps should you perform to allow you to take Certkingdom-Med3 offline without
disconnecting any current calls in progress?

A. Navigate to the Lync Server 2010 Topology Builder.
B. Navigate to the Lync Server 2010 Control Panel.
C. Modify the properties of the Mediation Pool.
D. Modify the properties of Certkingdom-Med3.
E. Create a new Mediation Pool.

Answer: B,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. You are in the process of deploying a Lync
Server 2010 infrastructure for the company.
You have configured dial-in conferencing and verified that it is functioning properly.
You now want to notify users about the availability of the feature. The notification should include
introductory instructions such as the initial PIN and the link to the Dial-in Conferencing Settings
webpage.
What is the easiest way to send the notification with the required information to the users?

A. Open the Lync Management Shell and run the New-CsAnnouncement cmdlet.
B. Open the Lync Management Shell and run the Set-CsPinSendCAWelcomeMail cmdlet.
C. Open the Lync Management Shell and run the New-CsConferenceDirectory cmdlet.
D. Open the Lync Management Shell and run the New-CsConferencingConfiguration cmdlet.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

70-659 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of an internal LAN and a perimeter network. The two networks are
separated by an internal corporate firewall. An external corporate firewall connects the perimeter
network to the Internet.
The network includes virtual machines (VMs) running on host servers contained in both the
internal network and the perimeter network.
You have recently installed a server named Certkingdom-VMM1 on the internal network. Certkingdom-VMM1 runs
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage
the virtual environment.
You are now in the process of deploying VMM agents on the host servers. You have configured
the port number for the VMM agents and configured the internal corporate firewall to allow
communications on the appropriate port number.
What else do you need to configure to ensure that the VMM agents can communicate with CertkingdomVMM1?

A. You need to configure the name of the VMM server (Certkingdom-VMM1).
B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller.
C. You need to configure the name of a SQL Server.
D. You need to configure an encryption key.

Answer: D

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of two subnets. The Development subnet is used by the
Development department. The Production subnet is used by all other company departments.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMHost1 in the Production
subnet. Certkingdom-VMHost1 contains two network interface cards named NIC1 and NIC2. You have
configured NIC1 as a management interface.
You want to configure Certkingdom-VMHost1 to host virtual machines on both the Production subnet and
the Development subnet.
How should you configure Certkingdom-VMHost1?

A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode.
B. You should assign NIC2 as an additional management interface.
C. You should configure both adapters to support jumbo frames.
D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2
with an IP address in the Development subnet.

Answer: A

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2.
A server named Certkingdom-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 and is used to manage the company’s virtual environment.
The company includes a Development department. Users in the Development department use
their computers to develop and test software applications for use by other company departments and customers.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMTest1 in the Development
department. Certkingdom-VMTest1 will host virtual machines (VMs) for the Development department
users to use to test their applications.
You need to ensure that the VMs are completely isolated from production servers.
How can you ensure that the test VMs can communicate with each other while being isolated from
the host server and the rest of the network?

A. By configuring the VMs to connect to a Dedicated virtual network.
B. By configuring the VMs to connect to an Internal virtual network.
C. By configuring the VMs to connect to a Local virtual network.
D. By configuring the VMs to connect to a Private virtual network.

Answer: D

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
You are configuring a virtual environment for the company. You have an iSCSI storage disk array
that will be used to store virtual machines (VMs).
You install a server named Certkingdom-Host1 that runs a Server Core Installation of Windows Server 2008 R2.
You need to configure Certkingdom-Host1 to store to VMs on the iSCSI disk array.
Which two of the following tools could you use?

A. You could use Disk Management.
B. You could use Diskpart.exe.
C. You could use iSCSICLI.exe.
D. You could use iSCSICPL.exe.

Answer: C,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain named Certkingdom.com.
The company network consists of an internal LAN and a perimeter network. To comply with
company security policy, servers located in the perimeter network are not members of the
Certkingdom.com domain.
A Microsoft Hyper-V Server 2008 R2 server named Certkingdom-VMHost1 is located in the perimeter network.
You relocate Certkingdom-VMHost1 into the internal network. You now need to join Certkingdom-VMHost1 to the
Certkingdom.com AD DS domain.
How should you join Certkingdom-VMHost1 to the Certkingdom.com domain?

A. You should use the System Properties control panel applet.
B. You should use the Netsh command line utility.
C. You should use the Hyper-V configuration utility (hvconfig).
D. You should use the dcpromo utility.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Follow Us

Bookmark and Share


Popular Posts