Wenatchee Valley College - CTS Discussion Board

You are not logged in. Would you like to login or register?

CTS 232 - Network Design - Winter Quarter » Software Deployment - Using GPO » 2/04/2020 10:41 am

krich2737
Replies: 9

Go to post

Using Group Policy to Deploy Software Packages (MSI, MST, EXE)

Outline of the article: 

1. Deploy Windows MSI or MST package Using Group Policy Software Installation
     1.1 Create a distribution point
     1.2 Create a Group Policy Object
     1.3 Assign an MSI package
     1.4 Publish an MSI package
     1.5 Redeploy an MSI package
     1.6 Remove an MSI package 

2. Deploy Software using Startup script via GPO
     2.1 Create the Organizational Unit (OU) for each script.
     2.2 Create a Group Policy Object (GPO) for the newly created OU.
     2.3 To add the per-computer startup scripts
     2.4 To deploy Software using Startup Script for Windows per-computer
     2.5 To remove Software for Windows per-computer

https://blog.51sec.org/2019/05/using-group-policy-to-deploy.html

- Kayla R.

Security Class » Article #8 - Due Monday 25th of November » 11/25/2019 11:45 am

krich2737
Replies: 17

Go to post

Roll20 and Stronghold Kingdoms Subject to Security Breach
This article is from Feb. 2019, but I thought I would share it this week since I got an alert recently on my CreditWise app (free account with my credit card). The alert was that my email address had been "compromised" by some online game I barely remember playing: Stronghold Kingdoms. The app listed Oct. 29th 2019 as the day my info was found on the "dark web". 

I haven't had any unusual activity on my email account, but i assume this could have been a problem if I had reused the same PW for my email and the game account.

The player information that was stolen includes player usernames, email addresses, and hashed passwords. An individual "hacker" seems to have hit over a dozen websites, getting hundreds of millions of account emails/passwords. The unknown hacker was then trying to sell the identifying data online..

https://techraptor.net/tabletop-gaming/news/roll20-and-stronghold-kingdoms-subject-to-security-breach

The Tech Crunch article referenced in this article:

https://techcrunch.com/2019/02/14/hacker-strikes-again/

If you want to check an email address to see if it's been compromised, you can use the site 
https://haveibeenpwned.com/

Also, here is a list of all the websites that have been uploaded to haveibeenpwned.com if you want to search by website instead:
https://haveibeenpwned.com/PwnedWebsites

-Kayla R.

Security Class » Article #7 Post a new article - Maybe on encryption? Due Monday 18th » 11/13/2019 12:01 pm

krich2737
Replies: 17

Go to post

Court rules against warrantless searches of phones, laptops

A federal court in Boston recently ruled that warrantless U.S. government searches of international travelers' phones and laptops at U.S. airports and other ports of entry, violate the Fourth Amendment. 

The ruling came in a lawsuit filed by the ACLU (American Civil Liberties Union) and the Electronic Frontier Foundation, on behalf of 11 people whose smartphones and laptops were searched without individualized suspicion.

ACLU attorney Esha Bhandari says border officers must now demonstrate individualized suspicion of contraband before they can search a traveler's device.

Jessie Rossman, a staff attorney at ACLU's Massachusetts chapter, said the ruling is a victory for constitutional protections against unreasonable searches and seizures. Rossman said two of the plaintiffs were stopped as they tried to re-enter the U.S. after a visit to Canada. Both are U.S. citizens and live in Massachusetts.

https://www.baltimoresun.com/sns-bc-us--government-searches-electronic-devices-20191112-story.html

-Kayla R.

Security Class » Security Class Article #6 Due Wednesday November 13th. » 11/13/2019 12:01 pm

krich2737
Replies: 18

Go to post

Britain's Labour Party suffers second cyber attack in two days

The political party was targeted by a "sophisticated and large-scale" DDoS attack twice in two days, the second attack this last Tuesday 11/12/19.

The party has not said who it suspects is behind the attacks, but said it was confident there was no data breach. They have not said which digital platforms were targeted, but it is understood some were election and campaign tools, which would contain details about voters.

https://www.theguardian.com/politics/2019/nov/12/labour-reveals-large-scale-cyber-attack-on-digital-platforms

-Kayla R.
 

Security Class » Security Class Article #5 Due November 4th » 11/04/2019 10:51 am

krich2737
Replies: 20

Go to post

Seattle-based angel investor Gregg Bennett is suing Bittrex, a crytpocurrency exchange, for allegedly violating its own security standards, allowing hackers to steal 100 Bitcoin using a SIM-swap back in April 2019.

Bennet also says he thinks staff at At&T were involved, since his account PIN and SSN had been changed.

-Kayla R.

https://www.coindesk.com/bittrex-target-of-latest-1-million-crypto-sim-hack-lawsuit

https://thenextweb.com/hardfork/2019/11/04/bittrex-sim-swap-hack-cryptocurrency-blockchain-exchange-att/

Security Class » Security Class Article #4 - Due October 28th » 10/28/2019 9:52 am

krich2737
Replies: 17

Go to post

Ransomware's mounting toll: Delayed surgeries and school closures

This is a general, not-techie article about Ransomewares' affect on services like healthcare. Ransomware has impacted at least 621 entities this year through September. The targets include hospitals, health care centers, school districts and cities. The total cost so far this year could be about $186 million, based on the publicly disclosed costs of ransomware attacks


https://www.cbsnews.com/news/ransomware-attack-621-hospitals-cities-and-schools-hit-so-far-in-2019/

-Kayla Rich

Security Class » Security Class Article #3 - Due Monday October 21st.... » 10/21/2019 9:45 am

krich2737
Replies: 20

Go to post

Avast target of cyber-security attack, company and Czech counterintelligence say

Czech-based Avast and Czech counterintelligence service BIS detected a network attack. BIS suspects the attack originated in China, but Avast is saying they don't know who was behind the attack.

The company found suspicious behavior on its network Sept. 23, and opened an investigation with the BIS, Czech police, and an external forensics team.

BIS said their investigation suggests the threat came from China and was targeting the tool CCleaner to take control of users' computers.

Avast's CISO said the intruder used compromised credentials through a temporary VPN to access the network, and there were several attempts between May 14th and Oct. 4th. They kept the VPN profile open to track the intruder. The company says no malicious changes were made to previous releases and they stopped new updates, pushing a "clean" update to users on Oct. 15 and revoked a previous certificate

[url=Avast target of cyber-security attack, company and Czech counterintelligence say  Czech-based Avast and Czech counterintelligence service BIS detected a network attack. BIS suspects the attack originated in China, but Avast is saying they don't know who was behind the attack.  The company found suspicious behavior on its network Sept. 23, and opened an investigation with the BIS, Czech police, and an external forensics team.  BIS said their investigation suggests the threat came from China and was targeting the tool CCleaner to take control of users' computers.  Avast's CISO said the intruder used compromised credentials through a temporary VPN to access the network, and there were several attempts between May 14th and Oct. 4th. They kept the VPN profile open to track the intruder. The company says no malicious changes were made to previous releases and they stopped new updates, pushing a "clean" update to users on Oct. 15 and revoked a previous certificate  https://www.reuters.com/a

Security Class » Security Class Article #2 - Due Monday October 14th --REPLY HERE » 10/14/2019 9:53 am

krich2737
Replies: 18

Go to post

Google announces new USB-C Titan Security Key

Today Google announced they are releasing a new version of the Titan Security key. It is a USB-C second-factor security key that is part of Google's Advanced Protection program. It is manufactured by Yubico, and based on FIDO open standards that Google helped develop with Yubico. The devices are built with a hardware secure element chip that includes firmware to verify the key's integrity. Google says this device is one of the best ways to protect Google accounts from hacking and fishing, especially high-value accounts that are frequently attacked.

https://www.zdnet.com/article/google-announces-new-usb-c-titan-security-key/

-Kayla R.
 

Linux Class » Last Article! Due March 11th -- Happy Last Week » 3/11/2019 8:01 am

krich2737
Replies: 17

Go to post

This article goes over many commands that save time when using Bash. Commands include a few regarding history, like ctrl + r to reverse search, or !! to rerun your last command used. It also lists a few file/navigation commands. There are also a few commands listed to help add color to Bash. There are many shortcuts listed, like shopt -s cdspell to correct typos, ctrl + t to swap 2 characters, and ctrl + x + ctrl + e to open the command string in an editor so that you can edit it before it runs.

https://opensource.com/article/18/5/bash-tricks

Kayla R
 

Linux Class » Article #8 - Due March 5th - no class March 4th » 3/04/2019 9:00 pm

krich2737
Replies: 20

Go to post

"8 Deadly Commands You Should Never Run On Linux"

This article highlights a few commands that damage or erase data on the hard drive.

The first 3 items on the list include some we have seen before,like the rm -rf/ command, and a disguised hex version of the rm -rf/ command, and the Fork Bomb command. The next 5 commands listed were new to me. One formats a hard drive, another writes directly to a hard drive, and the 7th command listed writes junk onto a hard drive. The final command listed moves your home directory to a "black hole", so to speak.

The other "deadly" commands 
https://www.howtogeek.com/125157/8-deadly-commands-you-should-never-run-on-linux/
-Kayla R.

Board footera

 

Powered by Boardhost. Create a Free Forum