IPhone: Annotable is one of the best image annotation tools around, especially after Evernote abandoned Skitch a couple of years ago. Now, it’s been updated with a. Technology keeps you connected everywhere you go, helps you capture every moment & makes your life a bit easier; stay up-to-date with tips & tricks from eHow. Offers 50 GB of free storage space. Uploaded files are encrypted and only the user holds the decryption keys. As I deal with the realities of being middle-aged, I've had to confront the fact that I don't eat as well as I should, and I am not nearly as active as I should be. Theodolite's rangefinders allow you to quickly estimate distance to targets, objects, and landmarks, provided you know some dimension of the object in view. ![]() 15 ways the iPhone beats Android. Check out the new iPhone vs Android comparison for 2017 with the iPhone 7, iOS 10 and why Apple still wins. No more missed important software updates! UpdateStar 11 lets you stay up to date and secure with the software on your computer. This chapter focuses on the hardening of operating systems and the securing of virtual operating systems and will help you prepare for the CompTIA Security+ SY0-401 exam. To make the most of your commute, researchers at Harvard Business Review suggest you look at that travel time from a different perspective. It doesn’t have to be. How to bring back the Start menu and button to Windows 8. By Jamie Lendino on March 24, 2015 at 9:50 am; Comment; With Windows 10 seemingly just around the corner. Here's what may be crashing your i. Phone. New problems always seem to emerge whenever a new update hits, so we're here to tell you how to fix i. OS 1. 0. 3 issues. If you have a problem with i. ![]() OS 1. 0 you don't see here, let us know on Twitter and we'll do our best to help, and we'll tell you how to solve right on them this page. Just know, you're not alone if you're experiencing i. OS 1. 0 problems, as the i. Phone and i. Pad update has run into a number of issues. Here's how to fix the most common glitches, from poor battery life, to spotty Bluetooth connectivity, to i. Phones and i. Pads bricking when trying to update. Once you've sorted out your i. OS 1. 0 problems, check out our how to use i. OS 1. 0 guide to get the most out of the mobile operating systemi. OS 1. 0. 3 slow to updatei. OS 1. 0. 3 is the newest i. Phone and i. Pad update, which means it fixes a number of problems, but it now takes what seems like forever to install. Don't be alarmed if it eats up 3. MB. That seems like a problem, but Apple has re- arranged its filing system. Apple File System (APFS) replaces the older HFS+ way of arranging your files, and now it's optimized for flash and SSD storage. But it requires patience. Just an extra caution: Make sure you backup your i. Phone before updating to i. OS 1. 0. 3. We haven't experience problems, but you never know. Older i. Phone can't upgrade to i. OS 1. 0. 3. Some users have tweeted at us saying that their i. Phone 4. S won't work when they try to update to i. OS 1. 0. 3. There's a really good reason for that: i. OS 1. 0 compatibility goes back to the i. Phone 5, i. Phone 5. C and the i. Pad 4th Gen. You can't upgrade the i. Phone 4. S or the i. Pad 3rd Gen, sadly. OS 1. 0. 3. 2, when it graduates from its beta, may not work with 3. Phones and i. Pads, like the i. Phone 5, i. Phone 5. C and i. Pad 4th Gen. OS 1. 1 may bring a new round of incompatible i. Phones and i. Pads later this year, so you want to read on the redesigned i. Phone 8 rumors. See our best i. Phone deals guide for the cheapest ways to upgrade your Apple smartphone right away. OS 1. 0. 3 battery life fix. Ever since the i. OS 1. 0. 1. 1 update battery life problems, people have been asking why their newly updated i. Phone turns off at around 3. Other people are noticing that they i. Phone batteries now drop from 1. OS 1. 0. 1. 1. Apple appears to be aware of the problem, and this fix is simple: update to the newest version of i. OS 1. 0. 3. It recently launched i. OS 1. 0. 3. 2 beta, which has fixed the issue for some people. We haven't seen this problem persist in the newest version of i. OS 1. 0. How to fix i. OS 1. 0. 0. 2 problems. Apple has released an update to i. OS 1. 0, known as i. OS 1. 0. 0. 2, and while this addresses a number of problems we discuss in this page, there are a number of problems still plaguing i. OS 1. 0 users. If you still experience low battery life, flaky Bluetooth and unreliable Wi- Fi connections with i. OS 1. 0. 0. 2, read on below to find the solution to your i. OS 1. 0. 0. 2 problems. Hopefully i. OS 1. OS 1. 0 battery life drain. There's a lot of newness happening with September 1. OS 1. 0 battery life, and with the recent release of i. OS 1. 0. 0. 2, these problems remain. Remember this thing? OS 1. 0. 1 will likely address battery life drain, but until that happens, here's what we found works to increase the uptime of our i. Phone and i. Pad. Turn off background app refresh in Settings > General > Background App Refresh. It'll give you a list of apps, and you don't really need a lot of these to constantly update in the background. It's a big battery life killer. Turn off Fitness Tracking and non- essential apps tucked away in Settings > Privacy > Motion & Fitness. If you have an Apple Watch, you don't need fitness tracking on your phone. We also found Health, Microsoft Health, Trip. Advisor and Waze keeping tabs on us and wasting battery life. No thanks. Turn Wi- Fi on and off at the right times. When you're at home or work, make sure you're connected to Wi- Fi instead of cellular. When you're out, prevent your i. Phone from constantly hunting for open Wi- Fi networks when there are none you can join. The swipe- up- from- the- bottom Control Center has a handy toggle for W- Fi. Keep that brightness slider in check. Display brightness is the #1 battery life killer, so stop lighting up your phone every two minutes just to check the time. Spoiler alert: it's two minutes later than the last time you checked. Keep track which apps are draining your battery life the most. Now every app is tuned to the i. OS 1. 0 update and could be wasting precious battery. Head to Settings > Battery to see the top villains here, especially Twitter and music- streaming apps. If you have an i. Phone 6. S, then the cause could be a faulty battery. The good news is that Apple will replace your i. Phone 6. S battery for free. Check out our guide on how to get your i. Phone 6. S battery replaced for more information. OS 1. 0 bricking phones. While the beta went well for us, the final launch of i. OS 1. 0 has bricked a number of i. Phones and i. Pads. That's disheartening for Apple fans after a solid three- month beta. The solution here is a simple one, thankfully: good ol' i. Tunes (you hate it, but love it when you need it) has had success in restoring afflicted Apple devices. Time to resort to a Mac or PC. With the news of i. OS 1. 0 bricking i. Phones and i. Pads around the world, now is a good time to mention that you should always back up your devices before updating. Over- the- air (OTA) updates have made us lazy when it comes to backing up our precious i. Phone and i. Pad data. And i. Cloud backups work, but only if you're paying Apple enough to back up your entire storage capacity. How to avoid the latest i. Phone- crashing bugs. There are some nasty bugs out there that can make your i. Phone crash just by receiving a text message. To protect yourself from these bugs, make sure you upgrade to the latest version of i. OS 1. 0, where the bugs have been fixed. If your i. Phone gets affected by this bug, restart the device then update to i. OS 2. 2. 2 or later. For more information check out our guide on how to avoid the latest i. Phone- crashing bugs. OS 1. 0 Wi- Fi and Bluetooth issues. This problem creeps up every year, and sadly it's no different with i. OS 1. 0. Even after Apple released i. OS 1. 0. 0. 2 people are still experiencing Wi- Fi and Bluetooth problems. In i. OS 1. 0. 2 people are also complaining about their devices disconnecting from the Wi- Fi when they are locked. Here's what we've done to resolve both Wi- Fi and Bluetooth problems in one fell swoop: Go to Settings > General > Reset > Reset Network Settings. It's the third option down, and you'll want to avoid Reset All Settings and Erase All Content and Settings. By selecting Reset Network Settings you'll keep your data intact, but your wireless connects will be back to their default settings. That usually solves our issues. Assistive. Touch freezes in i. OS 1. 0. 2. Some users are experiencing problems with the Assistive. Touch feature, which makes it easier to use some commands such as multi- finger gestures. In i. OS 1. 0. 2 there have been cases where this feature becomes unresponsive and freezes. To fix this, try turning Assistive. Touch off and on again. To do this, go to Settings > General > Accessibility > Assistive. Touch and toggle the feature off and on. How to stop Messages installing other apps. A new feature of i. OS 1. 0 allows apps to install themselves via the i. Messages App Store. These extensions can make using the Messages app easier, as you can quickly check out third party apps from within Messages, but it can also make the app more complicated to use. To stop i. Message extensions from automatically installing, open up the Messages app and tap on the arrow icon, then 'Apps'. Next, tap the four circles icon in the bottom- left of the screen, then select the 'Store' icon. Tap 'Manage' then toggle the switch next to 'Automatically Add Apps' to off. OS 1. 0 crashes when sending messages. If your i. Phone or i. Pad running i. OS 1. First reboot your i. Phone or i. Pad to see if that fixes the problem. If not you may need to delete the conversation thread if a particular conversation is causing i. OS 1. 0 to crash. To do this, open up the Messages app, then tap and hold on any sent or received messages in the conversation. From the menu that appears, tap 'More' then tap on the Trash icon. At the top of the screen tap 'Delete All' - this will erase all the messages in the conversation, so if any contain important information, make a note of them. If messages are still not sending, open up Settings, then go to General > Reset and tap on 'Reset Network Settings'. If that doesn't work, then you may need to reset your device. Open up Settings, then tap on 'General'. Scroll down to 'Reset' then tap on 'Reset All Settings', then tap it again to confirm. OS 1. 0 home buttoni. OS 1. 0 changes the home button functionality now that 'Slide to Unlock' is no more. It actually makes you press in on the Touch ID fingerprint sensor. Is that too much work for you? Apple didn't seem to think so when it developed i. OS 1. 0, but here's a quick fix in case you want to go back to the old way of unlocking your phone. It's super- buried in i. OS 1. 0's settings. Go to Settings > General > Accessibility > Home Button (midway down the page) and turn on 'Rest Finger to Open'. This will enable you to open your i. Phone or i. Pad with Touch ID, without having to press the home button any more. If the Home button doesn't work, then press the Sleep/Wake button to lock your device, then wait a few seconds and then press the Home button. The i. Phone or i. Pad should wake up. If it doesn't restart your device and see if that helps. If not, check for any dust, dirt or anything else around the Home button and clean it with a cloth. After all that, if it still doesn't work, contact Apple Support. Phone Sleep/Wake button doesn't work. Comp. TIA Security+ SY0- 4. Authorized Cert Guide: OS Hardening and Virtualization . But in general, they need to be hardened so that they are more difficult to compromise. This chapter focuses on the hardening of operating systems and the securing of virtual operating systems and will help you prepare for the Comp. TIA Security+ SY0- 4. This chapter is from the book . Group policies, security templates, and baselining put on the finishing touches to attain that bullet- proof system. Virtualization Technology: This section delves into virtual machines and other virtual implementations with an eye on applying real- world virtualization scenarios. This chapter covers a portion of the Comp. TIA Security+ SY0- 4. Imagine a computer with a freshly installed server operating system (OS) placed on the Internet or on a DMZ that went live without any updating, service packs, or hotfixes. How long do you think it would take for this computer to be compromised? It depends on the size and popularity of the organization, but it won’t take long for a nonhardened server to be compromised. And it’s not just servers! Workstations, routers, switches: You name it; they all need to be updated regularly, or they will fall victim to attack. By updating systems frequently and by employing other methods such as group policies and baselining, we are hardening the system, making it tough enough to withstand the pounding that it will probably take from today’s technology.. Another way to create a secure environment is to run operating systems virtually. Virtual systems allow for a high degree of security, portability, and ease of use. However, they are resource- intensive, so a balance needs to be found, and virtualization needs to be used according to the level of resources in an organization. Of course, these systems need to be maintained and updated (hardened) as well. By utilizing virtualization properly and by implementing an intelligent update plan, operating systems, and the relationships between operating systems, can be more secure and last a long time. Hardening Operating Systems. An operating system, or OS, that has been installed out- of- the- box is inherently insecure. This can be attributed to several things, including initial code issues and backdoors, the age of the product, and the fact that most systems start off with a basic and insecure set of rules and policies. How many times have you heard of a default OS installation where the controlling user account was easily accessible and had no password? Although these types of oversights are constantly being improved upon, making an out- of- the- box experience more pleasant, new applications and new technologies offer new security implications as well. So regardless of the product, we must try to protect it after the installation is complete. Hardening of the OS is the act of configuring an OS securely, updating it, creating rules and policies to help govern the system in a secure manner, and removing unnecessary applications and services. This is done to minimize OS exposure to threats and to mitigate possible risk. Although it is impossible to reduce risk to zero, I’ll show some tips and tricks that can enable you to diminish current and future risk to an acceptable level. This section demonstrates how to harden the OS through the use of service packs, patches and patch management, hotfixes, group policies, security templates, and configuration baselines. We then discuss a little bit about how to secure the file system and hard drives. But first, let’s discuss how to analyze the system and decide which applications and services are unnecessary, and then remove them. Removing Unnecessary Applications and Services. Unnecessary applications and services use valuable hard drive space and processing power. Plus, they can be vulnerabilities to an operating system. For example, instant messaging programs might be fun for a user but usually are not productive in the workplace (to put it nicely); plus, they often have backdoors that are easily accessible to attackers. They should be discouraged or disallowed by rules and policies. Be proactive when it comes to these types of programs. If users can’t install an IM program on their computer, you will never have to remove it from the system. But if you do have to remove an application like this, be sure to remove all traces that it ever existed. Make sure that related services are turned off and disabled. Then verify that their inbound ports are no longer functional, and that they are closed and secured. For example, AOL Instant Messenger (AIM) uses inbound port 5. IM programs, such as ICQ or Trillian. Confirm that any shares created by an application are disabled as well. Basically, remove all instances of the application or, if necessary, re- image the computer! That is just one example of many, but it can be applied to most superfluous programs. Another type of program you should watch out for are remote control programs. Applications that enable remote control of a computer should be avoided if possible. Personally, I use a lot of programs. But over time, some of them fall by the wayside and are replaced by better programs. The best procedure is to check a system periodically for any unnecessary programs. For example, in Windows 7 we can look at the list of installed programs by going to the Control Panel > Programs > Programs and Features, as shown in Figure 3- 1. Notice in the figure that Camtasia Studio 5 is installed. This is an older version of the program. If in the future I decide to install the latest version of Camtasia, or use another program, such as Adobe Captivate or something similar, and Camtasia 5 is no longer necessary, then it should be removed. This can be done by right- clicking the application and selecting Uninstall. Or an application might have an uninstall feature built into the Start menu that you can use. Programs such as this can use up to 5. MB, 1. 00 MB, and possibly much more, so it makes sense to remove them to conserve hard drive space. This becomes more important when you deal with audio/video departments that would use an application such as Camtasia, and most likely many others like it. The applications are always battling for hard drive space, and it can get ugly! Not only that, but many applications place a piece of themselves in the Notification Area in Windows. So, a part of the program is actually running behind the scenes using processor/RAM resources. If the application is necessary, there are often ways to eliminate it from the Notification Area, either by right- clicking it and accessing its properties, or by turning it off with a configuration program such as the System Configuration Utility in Windows (which can be executed by going to Start > Run and typing msconfig). Consider also that apps like this might also attempt to communicate with the Internet in an attempt to download updates, or for other reasons. It makes this issue not only a resource problem, but also a security concern, so it should be removed if it is unused. Only software deemed necessary should be installed in the future. Now, uninstalling applications on a few computers is feasible, but what if you have a larger network? Say, one with 1,0. You can’t expect yourself or your computer techs to go to each and every computer locally and remove applications. That’s when centrally administered management systems come into play. Examples of these include Microsoft’s System Center Configuration Manager (SCCM), and the variety of mobile device management suites available. These programs allow a security administrator to manage lots of computers’ software, configurations, and policies, all from the local workstation. Of course, it can still be difficult to remove all the superfluous applications from every end- user computer on the network. What’s important to realize here is that applications are at their most dangerous when actually being used by a person. Given this mindset, you should consider the concept of application whitelisting and blacklisting. Application whitelisting, as mentioned in Chapter 2, “Computer Systems Security,” is when you set a policy that allows only certain applications to run on client computers (such as Microsoft Word and Internet Explorer). Any other application will be denied to the user. This works well in that it eliminates any possibility (excluding hacking) of another program being opened by an end user, but it can cause productivity problems. When an end user really needs another application, an exception would have to be made to the rule for that user, which takes time, and possibly permission from management. Application blacklisting, on the other hand, is when individual applications are disallowed. This can be a more useful (and more efficient) solution if your end users work with, and frequently add, a lot of applications. In this scenario, an individual application (say a social media or chat program) is disabled across the network. This and whitelisting are often performed from centralized management systems mentioned previously, and through the use of policies, which we discuss more later in this chapter (and later in the book). Services are used by applications and the OS. They too can be a burden on system resources and pose security concerns. Examine Figure 3- 2 and note the highlighted service. The OS shown in Figure 3- 2 is Windows XP. Normally, I wouldn’t use Windows XP as an example given its age (and the fact that Microsoft will not support it anymore), but in this case I must because of the insecure nature of Telnet and the numerous systems that will probably continue to run Windows XP for some time. Windows XP was the last Microsoft OS to have Telnet installed by default, even though it was already well known that Telnet was a security risk. This is an example of an out- of- the- box security risk. But to make matters worse, the Telnet service in the figure is started!
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2017
Categories |