hahaha

josh reynolds :: chief information officer
spitwspots :: www.spitwspots.com

On 12/02/2014 08:53 AM, Ken Hohhof via Af wrote:
My wife is watching that new show Gotham and now I’m scared of Radio Shack and Geek Squad employees because they remind me of that Penguin character.
*From:* That One Guy via Af <mailto:[email protected]>
*Sent:* Tuesday, December 02, 2014 11:47 AM
*To:* [email protected] <mailto:[email protected]>
*Subject:* Re: [AFMUG] 1. Netflix 2. Hacking
If they want free I point them to security essentials, all the free products are worthless, security essentials is the lightest, so malwayre has less probability of taking advantage of taxed processor/cpu ala anything norton.
malwarebytes seems to be the best at catching things
if they want paid AV its always kasperky though it causes notable slowness on the interwebs, since it actually scans stuff Geek squad is actually a great solution, send them there, then you dont have to worry about it since their computer no longer works, better than telling them to unplug the power cord On Tue, Dec 2, 2014 at 10:34 AM, Mike Hammett via Af <[email protected] <mailto:[email protected]>> wrote:

    I haven't decided to integrate my idea with SPAM prevention, but
    I've been thinking about it.  ;-) I'll get the other stuff working
    first.



    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com

    ------------------------------------------------------------------------
    *From: *"Ken Hohhof via Af" <[email protected] <mailto:[email protected]>>
    *To: *[email protected] <mailto:[email protected]>
    *Sent: *Tuesday, December 2, 2014 10:24:59 AM

    *Subject: *Re: [AFMUG] 1. Netflix 2. Hacking

    I've had a similar discussion with customers who manually block
    the email
    address of everyone who sends them spam.  So they have a blacklist of
    thousands of random fictitious email addresses that sound like the
    real
    names of Batman villains.  They feel good blocking the spammers,
    so I've
    given up trying to talk them out of it.


    -----Original Message-----
    From: Mike Hammett via Af
    Sent: Tuesday, December 02, 2014 9:36 AM
    To: [email protected] <mailto:[email protected]>
    Subject: Re: [AFMUG] 1. Netflix 2. Hacking

    I can't force the abuse contact to do anything.

    If you don't try something, you're just as complicit.

    Fail2Ban with custom rules and actions is what I'm working on.

    Just because it is a dynamic pool doesn't mean people don't
    perpetually have
    the same IP.



    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com




    ----- Original Message -----
    From: Ken Hohhof via Af <[email protected] <mailto:[email protected]>>
    To: [email protected] <mailto:[email protected]>
    Sent: Tue, 02 Dec 2014 09:27:58 -0600 (CST)
    Subject: Re: [AFMUG] 1. Netflix 2. Hacking

    Just when you put all that effort into it, and talk about throwing
    violators
    into a BGP blackhole, and forcing abuse contacts to take action,
    it seemed
    inconsistent with the reality. Plus the fact that a lot of those
    will be
    dynamic pool addresses. If you’re talking about something like
    Fail2ban and
    blocking SSH for 60 minutes, that makes sense. SSH and RDP dictionary
    attacks are a big problem, as are DNS amplification attacks. But
    rarely does
    the source IP actually identify who is behind the attack, just one of
    millions of bots. It seems a futile exercise to block them one IP
    address at
    a time.


    From: Mike Hammett via Af
    Sent: Tuesday, December 02, 2014 9:10 AM
    To: [email protected] <mailto:[email protected]>
    Subject: Re: [AFMUG] 1. Netflix 2. Hacking

    Yes and I stated so in that e-mail.




    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com



    
--------------------------------------------------------------------------------

    From: "Ken Hohhof via Af" <[email protected] <mailto:[email protected]>>
    To: [email protected] <mailto:[email protected]>
    Sent: Tuesday, December 2, 2014 8:46:23 AM
    Subject: Re: [AFMUG] 1. Netflix 2. Hacking


    You do understand most of those IPs will be infected computers
    with a bot
    doing the scanning, not a bad guy sitting at his own computer, right?

    As far as customers, we tell them they need to at a minimum have
    Microsoft
    Security Essentials or the free version of a commercial AV. If
    they ask for
    a recommendation of a commercial AV product, we tell them we use
    ESET.
    Nothing will protect someone who engages in risky online activity
    or clicks
    before thinking. Those people need a good local computer shop (not
    Geek
    Squad) to rescue their computer and data and to install security
    software.
    And amazingly, I still need to tell people that securing their
    WiFi is not
    optional, and 1234 is not an acceptable email password.


    From: Mike Hammett via Af
    Sent: Tuesday, December 02, 2014 8:39 AM
    To: [email protected] <mailto:[email protected]>
    Subject: Re: [AFMUG] 1. Netflix 2. Hacking

    No bursting anywhere for anything.

    Currently I firewall all IPs that touch my honey pot IPs or
    attempt SSH at
    my edge. No need to have any of them on my network. I'm
    implementing a
    method to bring all servers, routers, switches, etc. back to a
    central
    syslog where I run my analysis there. That will then capture the more
    distributed scansattacks. Other than a whitelist, violators will
    be thrown
    into a BGP blackhole. It'll also fire off an e-mail to the RIR
    registered
    abuse contact. If you're doing any sort of trickery or trickeration
    (intentional via script kiddieworse or unintentional via malware),
    I don't
    want simple scans escalating into something more complex and
    possibly more
    damaging. You do the simple stuff, into the blackhole you go. I do
    understand that the abuse contact on the other side isn't likely
    to do much,
    but for the networks that will take action, I'd like to give them the
    information to do so. Plus if enough people do it, the abuse
    contacts are
    going to have to do something.




    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com



    
--------------------------------------------------------------------------------

    From: "Tyson Burris @ Internet Communications Inc via Af"
    <[email protected] <mailto:[email protected]>>
    To: [email protected] <mailto:[email protected]>
    Cc: [email protected] <mailto:[email protected]>
    Sent: Tuesday, December 2, 2014 8:28:16 AM
    Subject: [AFMUG] 1. Netflix 2. Hacking


    Two questions for the group this am.



    1. Are you setting burst limits for Netflix or other streaming video
    services on your network routers? If so, what rate are you
    limiting it at?

    2. With 97% of the US networks now Hackable, what are you doing on
    your side
    and advising customers to do? Meaning… what front line defenses
    are you
    taking and what software and/or hardware protection are you
    recommending to
    your customers?

    (It would appear that the majority of hacks these days are
    actually Malware
    infections inside the network - Employee related errors)



    Put your 2 cents in.



    Tyson Burris, President
    Internet Communications Inc.
    739 Commerce Dr.
    Franklin, IN 46131

    317-738-0320 <tel:317-738-0320> Daytime #
    317-412-1540 <tel:317-412-1540> Cell/Direct #
    Online: www.surfici.net <http://www.surfici.net>





    What can ICI do for you?


    Broadband Wireless - PtP/PtMP Solutions - WiMax - Mesh
    Wifi/Hotzones - IP
    Security - Fiber - Tower - Infrastructure.

    CONFIDENTIALITY NOTICE: This e-mail is intended for the
    addressee shown. It contains information that is
    confidential and protected from disclosure. Any review,
    dissemination or use of this transmission or its contents by
    unauthorized organizations or individuals is strictly
    prohibited.








--
All parts should go together without forcing. You must remember that the parts you are reassembling were disassembled by you. Therefore, if you can't get them together again, there must be a reason. By all means, do not use a hammer. -- IBM maintenance manual, 1925

Reply via email to