Glume cu Chuck Noris la refresh

Un sistem de interfata spre o baza de date plina de glume cu Chuck noris este la

Exista si un sistem aleator (random) de obtinere a glumei:

Chuck Norris’ cellphone number is: 1
No one has ever pair-programmed with Chuck Norris and lived to tell about it.

… si tot asa.

Amprenta de carbon (CO2) consumata de un videoclip Youtube

Există un lanț de consum până la rezultatul final: vizualizare unui videoclip de câteva minute pe Youtube. Recunosc că lucrez ascultând muzică de pe Youtube, dar după ce am citit articolul Why Irish data centre boom is complicating climate efforts, mi-am dat seama că poluez.

Au măsurat consumul și 4 milioane de vizualizări înseamnă consumul de curent a 40 de mii de case din America timp de 1 an de zile.

The cloud can create carbon: it is estimated that when the music video Despacito reached 5bn streamed YouTube views in 2018, the energy consumption was equivalent to powering 40,000 US homes a year (it has now exceeded 6.5bn views)

Până la urmă orice electronică, orice Internet, orice telefon mobil consumă o energie de undeva: din rețea, din baterii, acestea trebuie reîncărcate cumva. Produsul cu care consumi a produs la rândul său resurse: extractie de materiale, comerț, logistică, fabricație și desfacere.

Rămâne de gândit.

Securing Network Infrastructure Devices – Sfaturi de securizare

Network infrastructure devices are ideal targets for malicious cyber actors. Most or all organizational and customer traffic must traverse these critical devices.

  • An attacker with presence on an organization’s gateway router can monitor, modify, and deny traffic to and from the organization.
  • An attacker with presence on an organization’s internal routing and switching infrastructure can monitor, modify, and deny traffic to and from key hosts inside the network and leverage trust relationships to conduct lateral movement to other hosts.

Organizations and individuals that use legacy, unencrypted protocols to manage hosts and services, make successful credential harvesting easy for these malicious cyber actors. Whoever controls the routing infrastructure of a network essentially controls the data flowing through the network.

What are network infrastructure devices?

Network infrastructure devices are the physical components of a network that transport communications needed for data, applications, services, and multi-media. These devices include routers, firewalls, switches, servers, load-balancers, intrusion detection systems, domain name systems, and storage area networks.

What security threats are associated with network infrastructure devices?

Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices:

  • Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts.
  • Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance.
  • Owners and operators of network devices often don’t change vendor default settings, harden them for operations, or perform regular patching.
  • Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor.
  • Owners and operators often overlook network devices when they investigate, look for intruders, and restore general-purpose hosts after cyber intrusions.


How can you improve the security of network infrastructure devices?

NCCIC encourages users and network administrators to implement the following recommendations to better secure their network infrastructure:

  • Segment and segregate networks and functions.
  • Limit unnecessary lateral communications.
  • Harden network devices.
  • Secure access to infrastructure devices.
  • Perform Out-of-Band network management.
  • Validate integrity of hardware and software.

Segment and Segregate Networks and Functions

Security architects must consider the overall infrastructure layout, including segmentation and segregation. Proper network segmentation is an effective security mechanism to prevent an intruder from propagating exploits or laterally moving around an internal network. On a poorly segmented network, intruders are able to extend their impact to control critical devices or gain access to sensitive data and intellectual property. Segregation separates network segments based on role and functionality. A securely segregated network can contain malicious occurrences, reducing the impact from intruders in the event that they have gained a foothold somewhere inside the network.

Physical Separation of Sensitive Information

Traditional network devices, such as routers, can separate local area network (LAN) segments. Organizations can place routers between networks to create boundaries, increase the number of broadcast domains, and effectively filter users’ broadcast traffic. Organizations can use these boundaries to contain security breaches by restricting traffic to separate segments and can even shut down segments of the network during an intrusion, restricting adversary access.


  • Implement principles of least privilege and need-to-know when designing network segments.
  • Separate sensitive information and security requirements into network segments.
  • Apply security recommendations and secure configurations to all network segments and network layers.

Virtual Separation of Sensitive Information

As technologies change, new strategies are developed to improve information technology efficiencies and network security controls. Virtual separation is the logical isolation of networks on the same physical network. Virtual segmentation uses the same design principles as physical segmentation but requires no additional hardware. Existing technologies can be used to prevent an intruder from breaching other internal network segments.


  • Use private virtual LANs to isolate a user from the rest of the broadcast domains.
  • Use virtual routing and forwarding (VRF) technology to segment network traffic over multiple routing tables simultaneously on a single router.
  • Use virtual private networks (VPNs) to securely extend a host/network by tunneling through public or private networks.

Limit Unnecessary Lateral Communications

Allowing unfiltered peer-to-peer communications, including workstation-to-workstation, creates serious vulnerabilities and can allow a network intruder’s access to spread easily to multiple systems. Once an intruder establishes an effective beachhead within the network, unfiltered lateral communications allow the intruder to create backdoors throughout the network. Backdoors help the intruder maintain persistence within the network and hinder defenders’ efforts to contain and eradicate the intruder.


  • Restrict communications using host-based firewall rules to deny the flow of packets from other hosts in the network. The firewall rules can be created to filter on a host device, user, program, or internet protocol (IP) address to limit access from services and systems.
  • Implement a VLAN Access Control List (VACL), a filter that controls access to and from VLANs. VACL filters should be created to deny packets the ability to flow to other VLANs.
  • Logically segregate the network using physical or virtual separation, allowing network administrators to isolate critical devices onto network segments.

Harden Network Devices

A fundamental way to enhance network infrastructure security is to safeguard networking devices with secure configurations. Government agencies, organizations, and vendors supply a wide range of guidance to administrators—including benchmarks and best practices—on how to harden network devices. Administrators should implement the following recommendations in conjunction with laws, regulations, site security policies, standards, and industry best practices.


  • Disable unencrypted remote admin protocols used to manage network infrastructure (e.g., Telnet, File Transfer Protocol [FTP]).
  • Disable unnecessary services (e.g., discovery protocols, source routing, Hypertext Transfer Protocol, Simple Network Management Protocol [SNMP], Bootstrap Protocol).
  • Use SNMPv3 (or subsequent version), but do not use SNMP community strings.
  • Secure access to the console, auxiliary, and virtual terminal lines.
  • Implement robust password policies, and use the strongest password encryption available.
  • Protect routers and switches by controlling access lists for remote administration.
  • Restrict physical access to routers and switches.
  • Back up configurations and store them offline. Use the latest version of the network device operating system and keep it updated with all patches.
  • Periodically test security configurations against security requirements.
  • Protect configuration files with encryption or access controls when sending, storing, and backing up files.

Secure Access to Infrastructure Devices

Administrative privileges can be granted to allow users access to resources that are not widely available. Limiting administrative privileges for infrastructure devices is crucial to security because intruders can exploit administrative privileges that are improperly authorized, granted widely, or not closely audited. Adversaries can use these compromised privileges to traverse a network, expand access, and take full control of the infrastructure backbone. Organizations can mitigate unauthorized infrastructure access by implementing secure access policies and procedures.


  • Implement multi-factor authentication (MFA). Authentication is a process used to validate a user’s identity. Attackers commonly exploit weak authentication processes. MFA uses at least two identity components to authenticate a user’s identity. Identity components include
    • something the user knows (e.g., password),
    • an object the user has possession of (e.g., token), and
    • a trait unique to the user (e.g., fingerprint).
  • Manage privileged access. Use a server that provides authentication, authorization, and accounting (AAA) services to store access information for network device management. An AAA server will enable network administrators to assign different privilege levels to users based on the principle of least privilege. When a user tries to execute an unauthorized command, it will be rejected. If possible, implement a hard-token authentication server in addition to using the AAA server. Using MFA makes it more difficult for intruders to steal and reuse credentials to gain access to network devices.
  • Manage administrative credentials. Take these actions if your system cannot meet the MFA best practice:
    • Change default passwords.
    • Recommend passwords to be at least 8 characters long, and allow passwords as long as 64 characters (or greater), in accordance with the National Institute of Standards and Technology’s SP 800-63B Digital Identity Guidelines and Canada’s User Authentication Guidance for Information Technology Systems ITSP.30.031 V3.
    • Check passwords against blacklists of unacceptable values, such as commonly used, expected, or compromised passwords.
    • Ensure all stored passwords are salted and hashed.
    • Keep passwords stored for emergency access in a protected off-network location, such as a safe.

Perform Out-of-Band Management

Out-of-Band (OoB) management uses alternate communication paths to remotely manage network infrastructure devices. These dedicated communication paths can vary in configuration to include anything from virtual tunneling to physical separation. Using OoB access to manage the network infrastructure will strengthen security by limiting access and separating user traffic from network management traffic. OoB management provides security monitoring and can perform corrective actions without allowing the adversary (even one who has already compromised a portion of the network) to observe these changes.

OoB management can be implemented physically, virtually, or through a hybrid of the two. Although additional physical network infrastructure additional infrastructure can be very expensive to implement and maintain, it is the most secure option for network managers to adopt. Virtual implementation is less costly but still requires significant configuration changes and administration. In some situations, such as access to remote locations, virtual encrypted tunnels may be the only viable option.


  • Segregate standard network traffic from management traffic.
  • Ensure that management traffic on devices comes only from OoB.
  • Apply encryption to all management channels.
  • Encrypt all remote access to infrastructure devices such as terminal or dial-in servers.
  • Manage all administrative functions from a dedicated, fully patched host over a secure channel, preferably on OoB.
  • Harden network management devices by testing patches, turning off unnecessary services on routers and switches, and enforcing strong password policies. Monitor the network and review logs. Implement access controls that only permit required administrative or management services (e.g., SNMP, Network Time Protocol, Secure Shell, FTP, Trivial File Transfer Protocol, RDP, SMB).

Validate Integrity of Hardware and Software

Products purchased through unauthorized channels are often counterfeit, secondary, or grey market devices. Numerous media reports have described the introduction of grey market hardware and software into the marketplace. Illegitimate hardware and software present a serious risk to users’ information and the overall integrity of the network environment. Grey market products can introduce risks to the network because they have not been thoroughly tested to meet quality standards. Purchasing products from the secondary market carries the risk of acquiring counterfeit, stolen, or second-hand devices because of supply chain breaches. Furthermore, breaches in the supply chain provide an opportunity for malicious software and hardware to be installed on the equipment. Compromised hardware and software can affect network performance and compromise the confidentiality, integrity, or availability of network assets. Finally, unauthorized or malicious software can be loaded onto a device after it is in operational use, so organizations should regularly check the integrity of software.


  • Maintain strict control of the supply chain and purchase only from authorized resellers.
  • Require resellers to enforce integrity checks of the supply chain to validate hardware and software authenticity.
  • Upon installation, inspect all devices for signs of tampering.
  • Validate serial numbers from multiple sources.
  • Download software, updates, patches, and upgrades from validated sources.
  • Perform hash verification, and compare values against the vendor’s database to detect unauthorized modification to the firmware.
  • Monitor and log devices—verifying network configurations of devices—on a regular schedule.
  • Train network owners, administrators, and procurement personnel to increase awareness of grey market devices.

Continue reading

Password spraying – aplicare de cosmetice in calculatoare

In a traditional brute-force attack, a malicious actor attempts to gain unauthorized access to a single account by guessing the password. This can quickly result in a targeted account getting locked-out, as commonly used account-lockout policies allow 3-to-5 bad attempts during a set period of time. During a password-spray attack (also known as the low-and-slow method), the malicious actor attempts a single password against many accounts before moving on to attempt a second password, and so on. This technique allows the actor to remain undetected by avoiding rapid or frequent account lockouts.

Password spray campaigns typically target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols. An actor may target this specific protocol because federated authentication can help mask malicious traffic. Additionally, by targeting SSO applications, malicious actors hope to maximize access to intellectual property during a successful compromise.

Email applications are also a target. In those instances, malicious actors would have the ability to utilize inbox synchronization to (1) obtain unauthorized access to the organization’s email directly from the cloud, (2) subsequently download user mail to locally stored email files, (3) identify the entire companys email address list, and/or (4) surreptitiously implements inbox rules for the forwarding of sent and received messages.

Technical Details

Traditional tactics, techniques, and procedures (TTPs) for conducting the password-spray attacks are as follows:

  • Use social engineering tactics to perform online research (i.e., Google search, LinkedIn, etc.) to identify target organizations and specific user accounts for initial password spray
  • Using easy-to-guess passwords (e.g., Winter2018, Password123!) and publicly available tools, execute a password spray attack against targeted accounts by utilizing the identified SSO or web-based application and federated authentication method
  • Leveraging the initial group of compromised accounts, download the Global Address List (GAL) from a targets email client, and perform a larger password spray against legitimate accounts
  • Using the compromised access, malicious actors attempt to expand laterally (e.g., via Remote Desktop Protocol) within the network, and perform mass data exfiltration using File Transfer Protocol tools such as FileZilla

Indicators of a password spray attack include:

  • A massive spike in attempted logons against the enterprise SSO Portal or web-based application. Using automated tools, malicious actors attempt thousands of logons, in rapid succession, against multiple user accounts at a victim enterprise, originating from a single IP address and computer (e.g., a common User Agent String). Attacks have been seen to run for over two hours
  • Employee logons from IP addresses resolving to locations inconsistent with their normal locations

Typical Victim Environment

The vast majority of known password spray victims share some of the following characteristics [1] [ ][2] [ ]:

* Use SSO or web-based applications with federated authentication method
* Lack multifactor authentication (MFA)
* Allow easy-to-guess passwords (e.g., Winter2018, Password123!)
* Use inbox synchronization allowing email to be pulled from cloud environments to remote devices
* Allow email forwarding to be setup at the user level
* Limited logging setup creating difficulty during post-event investigations


A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include:

* Temporary or permanent loss of sensitive or proprietary information
* Disruption to regular operations
* Financial losses incurred to restore systems and files
* Potential harm to an organizations reputation


Recommended Mitigations

To help deter this style of attack, the following steps should be taken:
* Enable MFA and review MFA settings to ensure coverage over all active, internet facing protocols
* Review password policies to ensure they align with the latest NIST guidelines and deter the use of easy-to-guess passwords
* Review IT Helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT Helpdesk password procedures may not align to company policy, creating an exploitable security gap
* In addition, many companies offer additional assistance and tools the can help detect and prevent password spray attacks, such as the Microsoft blog released on March 5, 2018 (link below):

TA18-086A: Brute Force Attacks Conducted by Cyber Actors
U.S. Department of Homeland Security US-CERT

Salesforce Einstein, the #1 CRM becomes the World’s Smartest CRM

Salesforce EinsteinWe live in a hyperconnected world. Artificial Intelligence and Machine Learning have replaced Big Data as the buzzwords of 2016. If I hear AI I think of movies like “HER” or “Moon” or “2001: A Space Odyssey”. But, AI is reaching a tipping point from being the focus of clever movie plots to a tangible business reality. This is thanks to the access and the ability to crunch petabytes of data and the low cost of high power cloud computing. Gartner already predicted last year that “by 2018, 20% of all business content will be authored by machines”.

What does Einstein mean for our customers?

Powered by advanced machine learning, deep learning, predictive analytics, natural language processing and smart data discovery, Einstein’s models will be automatically customised for every single customer. It will learn, self-tune and get smarter with every interaction and additional piece of data. And most importantly, Einstein’s intelligence will be embedded within the context of business, automatically discovering relevant insights, predicting future behavior, proactively recommending best next actions and even automating tasks.

(Blog Salesforce, 12/12/2016)

Oda Bucuriei

“Taie-le rădăcinile, acoperă-le cerul, distruge-le tradițiile, dezbină-i, fă-i să se rușineze de ceea ce sunt! Astfel, nu va trebui să lupți pentru a-i cuceri, pentru că, speriați de ceea ce vor fi devenit, te vor implora pe tine să vii și să-i salvezi de ei înșiși.” – Sun Tzu


Stând de vorba cu mai multă lume, mi-am dat seama că am trecut în altă grupă a societății: a celor ce înțeleg lumea într-un mod neînțeles ne total minus unu sau doi. Unul sunt eu, sunt optimist că voi mai gasi unul diferit de “eu”, dar în aceeași grupare cu mine. Altul care va putea să zică “Da” fără să contra-argumenteze sau să zică altă propoziție la care eu să zic “Da”.

Ce este cu Sun Tzu pe aici. Azi discutam despre fondurile europene și îmi expuneam ideile cu motivul pentru care uniunea suportă cu bani repararea și construirea în România. Managerul de cofetărie cu care discutam, era de acord în mare parte cu mine. Ne-am despărțit prietenește, eu ducându-mă spre bancă, să-mi plătesc ratele la credite. Mai am un pic și scap de ele. Azi mi-au redus dobânda de la 8,8% la 8,7%. Bla bla, nu duce nicăieri logoorea aceasta scrisă. Nici nu nimic important de concluzionat.

Doar mă simt rănit că România e rănită și nu are cine să o facă bine.

Rugaciuni pentru stingerea focului din insula Thassos

Incendiu Thassos - Fire thassos september 2016Mulți români își petrec vacanța în Grecia, în Insula Thassos. În 10 septembrie 2016 a izbucnit un incendiu în pădurile de pe dealurile din Prinos. La ora 6 de dimineața au fost niște fulgere mari, dar fără ploaie. Vegetația uscată a luat foc și incendiul s-a răspândit. Din ce am citit în presa online greacă, pădurile acestea de pini erau tinere, după un incendiu din anii 80, totul a fost reîmpădurit.

Film din 11/09, focul inca nu e stins:

Zonele cu incendiu in 10 septembrie 2016
Zonele cu incendiu in Thassos 10 septembrie 2016

Rugăciune pentru Thassos

Megalo KazavitiFac un apel la rugăciune pentru stingerea focurilor din insula Thassos. Fac un apel și la partajare (share) pe rețele sociale (Facebook etc.). De ce? Pentru că mi se pare normal ca să te rogi pentru binele oamenilor din acele zone. Satele Megalo Kazaviti si Megalo Prinos au fost evacuate, alt sat a fost și el evacuat. Flăcările erau imense din ce am văzut de pe drumul de coastă. In portul Skala Prinou apa mării fierbea și nu pleca nici un feribot spre Kavala. Noi tocmai plecam cu o zi mai devreme, deci nu fugeam de foc, doar s-a nimerit să fim martori la începutul acestei calamnități.

img_1425De ce românii ar trebui să se gândească prin rugăciune la greci, la protejarea caselor lor și la stingerea focului?

  • e uman să îți dorești ca acei oameni să fie bine
  • e fain să mergi la ei în vacanță și să mănânci roadele pământurilor lor
  • tot uman este să ai gănduri de mulțumire pentru tot ce ai primit, chiar dacă ai dat niște hârtii colorate pentru produse
  • azi e duminică (data articolului) și poate mergeți la biserică

Ajută-i Doamne să stingă focul și să le protejeze familiile si casele.

Portul Skala Prinou in furtuna

Instalare Php 5.6 pe un Max OsX El Capitan

os_x_el_capitan_roundupDaca intelegi titlul, inseamna ca poate te intereseaza acest articol. Versiunea El Capitan de sistem de operare pentru calculatoare Apple, vine cu o versiune de webserver instalata in sistem, adica un Apache cu PHP. Versiunea de PHP este 5.5.x. Unele aplicatii, de exemlpu PHPUnit sau Composer, au nevoie de o versiune mai mare, minim 5.6.x.

Sunt destule articole despre acest upgrade: