Teldata.Wordpress.com | ParagonHost.com

October 3, 2009

Free Resolving Name Servers

Filed under: Internet, Networks, Technology — paragon @ 9:46 pm

http://www.resolvingnameserver.com/freerns.html

Need a resolving name server fast?
Use our free public resolving name servers!

Who can use these servers:
These servers can be used by users that need a resolving name server for normal “end user” functionality. “End User” fucntionality includes web surfing and normail email sending (via an email client). These can also be used by ISPs to give to their clients as the resolving name servers (that do not need to run enterprise services).

Who should not use these free servers:
Any system that serves an enterprise functionality. This includes email servers, web servers, etc. For services for enterprise functionality please contact our sales team. If a mail server uses these servers you may get incorrect results.

Our current set of name servers that you can use are:

  • 205.234.170.215
  • 205.234.170.217

Notifications of all changes of IPs will be received by subscribers to our mailing list. You can subscribe to our list by sending an email to freepublicdns-subscribe@resolvingnameserver.com and following the instructions in the reply.

October 2, 2009

Caution about FortiClient free Download

Filed under: Uncategorized — paragon @ 1:21 pm

Before you grab  and install the FortiNet Client (FortiClient) Free Download client…

Check this link – Interesting Read

Review on FortiClient Endpoint Security Suite Standard Edition, the FREE Antivirus by Fortinet

September 25, 2009

SIP Trunking Provider – CudaTel TrixBox Asterisk !

Filed under: Uncategorized — paragon @ 11:48 pm

TalkinIP enables you to make calls at the absolute lowest rates. You can use software on your computer or a SIP enabled device (Asterisk, Trixbox, SIP Gateways, IAD, IP PBX) to place calls using the internet.

TalkinIP provides you outbound calling to any destination within the continental USA for only 1.5 cents per minute and Canada for only 2.3 cents per minute.  Get started for as little as $15 prepaid credit.  Your credit will never expire, so you can make calls next week or next year.

So what’s the catch? There are none. No tricks and no commitments. You enjoy low cost calling at the industries lowest rates.

Are you a business? You can use TalkinIP for SIP Trunking (termination) to place calls worldwide from any SIP based IP PBX or gateway. For Inbound SIP services, including unlmited inbound calling, and SIP delivered DIDs from locations worldwide checkout www.ipcomms.net.

Highlights
• Account balance never expires

• No setup or cancellation fees

• No activation fees or hidden charges

• Recharge your account 24/7 online
• Track your usage and manage your account online.

http://www.talkinip.net/enduser/talkinfo.html

September 24, 2009

TrixBox.com and HUD Videos

Filed under: Uncategorized — paragon @ 9:02 pm

The name of the product is trixbox PRO and you can see it’s general details at its website here: www.trixbox.com.  Trixbox PRO is an advanced IP PBX solution focused on the SME market although it’s also perfectly happy addressing Enterprise clients. The Fonality trixbox Pro IP PBX is a Hybrid Hosted™

architecture, which allows for Anywhere Management™, and creates the reliability and quality of a premise-based system with the convenience and cost benefits of a hosted system.

 

Trixbox PRO is comprised of two key integral parts which makes it a unique offering in the market:

 

  1. The Control Panel which can be accessed via any web enabled interface and provides the ability to manage, configure and do any necessary changes to the system in minutes from anywhere.  This is where you can manage company extensions, call routing, auto attendants, phone numbers and much more.  Here is where you can also have Access to real time monitoring of analog lines, T-1/E-1 interfaces and unlimited SIP Providers.

 

  1. HUD (Heads Up Display) is an award-winning employee presence and communication management application that comes free with all versions of trixbox. HUD empowers its users with company-wide visibility and information on the “presence” of every colleague, making it easy to interact with one another via a single, simple interface.

 

You can view the different versions and features of trixbox PRO (Standard, Enterprise & Call Center) by clicking here and the different versions and features of HUD by clicking here.  Finally you can see the latest video demos of HUD that clearly outline its siginifcant impact on productivity and value for any enterprise using it on a daily basis:

 

HUD Demo Videos

 

 

As a quick reference, the company behind trixbox PRO is Fonality. Fonality has been in the market for many years and has over 250 employees.  It’s solid and backed by large investors such as INTEL.  They have won numerous awards for their technology and are DELL’s key partner for IP PBX solutions.   I am attaching a general brochure on trixbox for your reference as well.

 

Servers and Implementation:

 

Regarding the implementation, as you may already know trixbox PRO can be easily downloaded (software only) and installed on any of many certified servers from Dell and HP.  Alternatively we can integrate the software into an integrated trixbox PRO appliance (brochure attached) depending on your customers needs.  

 

IP Phones & Telephony Cards:

 

Trixbox Pro Works easily with almost any SIP based IP Phone.  Most of our clients use IP phones from Polycom but some also use phones from other providers like Grandstream, Astra, Linksys and SNOM.  We are authorized resellers for all of those and can offer a fully integrated solution with 12 month advance replacement warranty on all IP phones.  On the telephony cards, we recommend and have certified the SANGOMA brand and can integrate analog and digital cards easily depending on your client’s requirements.

 

For your reference attached I am sending you the following:

 

a)      Price list for trixbox PRO and Reseller options/levels. We typically start all our partners (assuming they will work independently) at the highest tier of Certified and do an evaluation every 6 months to see if it makes sense to continue at that level.

b)      Official trixbox PRO agreement to legally be able to use trixbox PRO logo’s and collateral.

c)       General trixbox PRO Brochure

d)      General brochure for trixbox PRO appliance. 

 

Take a look at the details and let me know should you have any questions.  If you have an immediate opportunity that we can help with let me know and I can walk you through the process. The next step would be to setup a quick web demo so I can walk you through the details of trixbox PRO.

July 27, 2009

New Social Network (3Echo.com)

Filed under: Uncategorized — paragon @ 4:54 am

New Social Network for Musicans, Artists, Models, Photographers and Entertainment – Follow us and get it on our beta release! ( 3Echo.com )

Coming Soon

http://www.3Echo.com


July 15, 2009

Facebook Spammer Charged

Filed under: Uncategorized — paragon @ 8:38 pm

(WEB HOST INDUSTRY REVIEW) — A longtime spammer may potentially serve jail time in relation to a Facebook lawsuit after a California judge ordered him to appear in front of the US Attorney General’s Office for criminal proceedings.

The case follows another Facebook spamming case last November, when the company won a $873 million ruling against a Montreal spammer that flooded members’ inboxes with sexually explicit messages.

Judge Jeremy Fogel of the US District Court for the Northern District of California referred Sanford Wallace to the US Attorney General’s Office to undergo criminal proceedings for allegedly violating a court order that prevented him from accessing Facebook.

In February, Facebook filed a lawsuit against Wallace, Adam Arzoomanian and Scott Shaw for allegedly spamming and phishing the website.

The three men were issued a temporary restraining order prohibiting them from accessing Facebook’s network.

Facebook released this statement via company spokesman Barry Schnitt addressing the ruling:

“We see Fogel’s ruling as a strong deterrent against spammers. Spammers feel that they are immune from criminal prosecution. Fogel’s ruling demonstrates that judges will enforce restraining orders and spammers who violate them will face criminal prosecution.”

The ruling on the social network community’s civil lawsuit against Wallace stalled after the defendent filed for bankruptcy.

Wallace has had a long history of spamming that dates back to the 1990s.

He started his spamming career with fax spamming, where he sent out thousands of unsolicited offers for timeshares, insurance policies, and foreclosed real estate deals to fax machines.

Last May, a federal judge ruled in favor of MySpace after Wallace and another defendent failed to show up to a hearing.

The two men were ordered to pay $230 million for phishing and spamming MySpace users with links to gambling and pornography websites.

July 10, 2009

Network Notepad creates quick diagrams and flow charts

Filed under: Networks, Software, Technology, Telecom, Tools — paragon @ 6:42 pm

Filed under: Business, Utilities, Windows, Productivity, Freeware

 

Network Notepad creates quick diagrams and flow charts

Windowsby Lee Mathews Oct 31st 2008 at 10:00AM

While network planning and design isn’t usually part of my job, I do sometimes need to put together a quick sketch of a client’s systems to help me oragnize a plan of attack.

Network Notepad is exactly what I was looking for – a small, free app that lets me lay out network devices, servers, printers, and workstations quickly and easily. It’s a great tool for documenting sites in case another tech has to attend to a call in my absence. Once you’ve set IP addresses, you’re able to use the F1-F6 keys as hotkeys to ping, surf, or telnet to a device.

Don’t be fooled by the Notepad in the name, though. This app is full-featured enough to tackle complicated networks. Be sure to download the Cisco-created object libraries and hub/switch pack, as they provide several icons that aren’t included in the default set.

There’s even a flow chart icon pack which turns Notepad into a kind of poor man’s Visio (if you’re looking for a Visio clone, try the open source Dia). You can’t argue with the price, and the feature set is impressive for such a small download.

Tags: diagram, diagramming, flow chart, flowchart, networking

June 24, 2009

Building on the Cloud

Filed under: Uncategorized — paragon @ 5:32 pm

Salesforce.com has helped build a group of certified Force.com developers on oDesk, making our marketplace one of the best resources for buyers looking to use Salesforce.com CRM solutions on the Force.com platform. And we’re hearing from the providers offering Force.com skills that being part of this latest certified group on oDesk is paying off as “cloud computing” reaches new heights.

Rakesh Aggarwal - Salesforce GroupRakesh Aggarwal is a salesforce.com-certified developer in India who says demand for Force.com implementations has brought him a steady stream of customers since a buyer brought him onto oDesk last summer.

“I was already developing applications on salesforce.com when one of my clients insisted on working through oDesk,” he says. “After my first successful job through oDesk—now I insist that my clients work through oDesk!”

In its first three weeks, the salesforce.com/Force.com group on oDesk has grown to about 60 programmers. Jobs were already on the rise—a year ago, about 10 jobs involving Salesforce CRM were being posted each month on oDesk. Today it’s between 40 and 50. Rakesh says the technology has a lot of appeal. “I knew this was the future of technology because it’s the fastest, most trusted and most complete platform for building and delivering applications in the cloud.”

The cloud idea is simple—offering the full software platform as a service, so that the applications and data reside on the Internet (conceptualized as a cloud of servers), where a business can access them. This keeps in-house IT costs down and allows more flexibility and faster rollout of new services. Rakesh says a wide range of companies are taking advantage of the concept. “I’ve worked with individual developers who wanted to push their applications to Appexchange, and also with companies with more than 200 licenses, where they wanted to extend their business processes within salesforce.com.”

Rakesh has been working with salesforce.com technology for three years, since before the Force.com offering launched. He says that Force.com and oDesk have been a powerful combination for his business. oDesk lets him focus on his work as a developer, rather than on the hassles of being a one-man small business.

“I can manage my work much easier now,” he says. Which is good, because there’s more of it. “I had to go about searching for work earlier, but after couple of jobs here, I have been constantly getting work through oDesk.”

He says he’s even busier since joining the new salesforce.com certified users group. “It’s a great initiative, and it’s great to be part of this group,” he says. “After joining this group, the number of leads for salesforce.com projects has increased for me.”

While his profile offers other skills besides his salesforce.com expertise, Rakesh sees the Force.com platform as the critical focus, for himself and the buyers he’s serving.

“Cloud computing is a simple idea,” he says, “but it can have a huge impact on your business.”

Click here to see salesforce.com certified providers.
Click here to see all of oDesk’s sponsored groups.

One Response to “ Building on the Cloud ”

June 18, 2009

Ex-Googlers behind new security service that flags

Filed under: Uncategorized — paragon @ 12:45 am
This story appeared on Network World at
http://www.networkworld.com/news/2009/061509-security-service-malware.html 

Ex-Googlers behind new security service that flags

malware on Web sites

By Ellen Messmer , Network World , 06/16/2009

Sponsored by:

Security start-up Dasient debuted Tuesday with a cloud-based service designed to detect malware on Web sites and quarantine it away from visitors prior to it being removed.

Dasient’s three co-founders include two former Google employees, Neil Daswani, previously Google’s security product manager, and software engineer Shariq Rizvi, along with Ameet Ranadive, whose background includes stints at consultancy McKinsey & Co. and HP. (The new company doesn’t use job titles.)

How next-gen browsers tackle security

The Web Anti-Malware service that Dasient is announcing today makes use of Web crawlers and heuristics to automatically detect code that cyber-criminals have loaded onto legitimate Web sites in order to download malware or push visitors to fraudulent sites. As a consequence, victimized sites infected by malware often end up on “blacklists” of suspected dangerous sites compiled by Google as well as security firms, including McAfee, Symantec and WebSense, that have ways to watch for compromised sites.

It’s “a challenging engineering problem,” says Daswani of performing diagnostics on malware-infected sites and quarantining code without disrupting site use. The Dasient Web Anti-Malware service, which starts from $50 per month, is still in an “alpha” stage in some respects, especially the malware-quarantining capability, Dasient’s co-founders acknowledge. The malware quarantining feature requires a Dasient software module to be installed on a Web server for protection.

The goal, the co-founders say, is to assist Web site managers in finding out where the malware problems are before they’re on blacklists or to help them get off the blacklists, which disrupt business and drive customers away. The Dasient service can also be used by Web hosting providers to assist their customers.

There are millions of Web sites compromised each year. Family Communications, the Pittsburgh-based children’s media non-profit founded by Fred Rogers, found out how devastating it can be to end up on a blacklist because of infected Web pages.

“Four or five months ago we were alerted to the fact that Google results was saying your Web site may have malicious code,” says Kevin Morrison, COO at Family Communications, who said Google did send out an e-mail notice but didn’t seem to be in a position to do much more than that.

The phone started ringing off the hook with callers asking what was going on, and Morrison says his Web site hosting provider couldn’t really tell. Around the same time, Dasient contacted Family Communications to say it knew the site had been flagged by Google, they could help, and they did, showing exactly where bad code was embedded in Web pages, says Morrison.

“It had been hacked obviously,” Morrison says. “We got the malicious code out of the way and suddenly we’re OK on Google again,” says Morrison, who adds his company has continued to be an early user of Dasient’s Web Anti-Malware, though no more incidents have cropped up since.

Dasient retains close ties with Google — which itself faces many Web attacks daily, says Daswani — but the co-founders declined to provide more detail.

The start-up has received $2 million in funding from Maples Investment, Radar Partners, Stratton Sclavos and Eric Benhamou.

May 13, 2009

Two New Zero Day Adobe Reader Exploits

Filed under: Internet, Networks, Security Focus, Technology — paragon @ 10:51 pm
 

 

Update: Two New Zero Day Adobe Reader Exploits

Adobe Releases Updates for Reader and Acrobat

Severity: High

12 May, 2009

Update:

On 28 April, 2009, we alerted LiveSecurity subscribers about two zero day vulnerabilities in Adobe Reader which attackers could exploit to execute code on your machine, potentially gaining complete control of it. When we first reported this issue, a greyhat security researcher had already released Proof-of-Concept (PoC) exploits that leveraged these flaws to the public. We promised to update our alert when Adobe released a patch for this issue. Today they did.

Adobe’s security bulletin announces the release of Reader 9.1.1, which fixes both security vulnerabilities (one of them only affects Reader on UNIX systems). They also announce updates for Acrobat, which also suffers from these vulnerabilities. Adobe’s bulletin does not describe the flaws in any technical detail. However, they do describe their impact. If an attacker can entice one of your users into downloading and opening a maliciously crafted PDF document (.pdf), he can exploit these vulnerabilities to execute code on that user’s computer, with that user’s privileges. If your user has local administrative privileges, the attacker gains full control of the user’s machine. 

If you use Adobe Reader or Acrobat on any platform, we recommend you download and install Adobe’s updates as soon as you can. See below for details.

Solution Path:

Adobe has released Reader 9.1.1, Acrobat 8.1.5 and Acrobat, 7.1.2 to fix these vulnerabilities. You should download, test, and deploy the appropriate updates throughout your network as soon as you can:

Note: If you use Adobe Updater, it may automatically install the corresponding updates for you.

For All WatchGuard Users:

If you previously customized your Firebox’s proxy policies to temporarily block PDF documents (.pdf), you may want to remove those customizations after applying Adobe’s patch. This will allow your users to download legitimate PDF documents again.

For additional details about the vulnerability, and as a convenient reference, we reproduce our original 28 April alert below. You can also find it in the LiveSecurity Latest Broadcasts archive.


Summary:

  • This vulnerability affects: Adobe Reader and Acrobat 9.1 and earlier, on Windows, Mac, *nix computers
  • How an attacker exploits it: By enticing your users into viewing a maliciously crafted PDF document
  • Impact: An attacker can execute code on your computer, potentially gaining control of it
  • What to do: Implement the workarounds described in the Solutions section of this alert

Exposure:

Yesterday, SecurityFocus released an advisory describing a new zero day Adobe Reader exploit they found in the wild. The Proof of Concept (PoC) exploit —  written by some calling himself “Arr1val” — seems to leverage a flaw in the Adobe Reader function called “getAnnots()”. As it turns out, Arr1val released two new zero day exploits. The second exploit leverages another Adobe Reader function called “spell.customDictionaryOpen().” Arr1val’s code suggests he confirmed these flaws using Adobe Reader 9.1 and 8.1.4 for Linux. However, we suspect the flaws may affect all current versions of Reader running on any platform.

By enticing one of your users into downloading and opening a malicious PDF document, an attacker could exploit either of these unpatched Reader vulnerabilities to execute code on your user’s computer, with that user’s privileges. If the user had root or local administrator privileges, the attacker would gain complete control of that user’s machine.

Adobe has responded to this incident in a short blog post, saying they are investigating the issue. Since exploit code is widely available and Adobe hasn’t had time to patch yet, these flaws pose a serious risk to Adobe Reader users. We recommend you implement the workarounds described below to mitigate the risk of these dangerous zero day exploits.

Solution Path

Adobe has not had time to release a patch for these zero day vulnerabilities. However, the workarounds described below should mitigate the risk posed by the exploits currently circulating in the wild.

  • Inform your users of this vulnerability. Advise them to remain wary of unsolicited PDF documents arriving via email. If they don’t absolutely need the document, and don’t trust the entity it came from, they should avoid opening it until you patch Adobe Reader.
  • Use antivirus (AV) software and make sure it’s up to date. AV vendors will release signatures for these new exploits, so make sure to keep your AV software up to date.
  • Disable JavaScript in Adobe Reader. Disabling JavaScript in Adobe Reader could prevent these exploits from succeeding. To disable JavaScript in Adobe Reader, click Edit => Preferences => JavaScript and then uncheck Enable Acrobat JavaScript. Keep in mind, this prevents JavaScript from running in legitimate PDF documents as well.
  • Use a gateway device, like your Firebox, to block PDF files. If your users can’t download PDF files, these exploits won’t affect them. Unfortunately, doing this blocks legitimate PDF files as well. Nonetheless, depending on your business needs, you may still want to block PDF files until Adobe releases a patch.
  • Use an alternative PDF reader. You can mitigate the risk of these Adobe Reader vulnerabilities by using an alternative PDF reader. Keep in mind, other PDF readers may also suffer security vulnerabilities. However, attackers seem to primarily target the popular Adobe Reader. If it meets your business needs, you may try to adopt one of the alternative PDF readers listed on this site.

We will update this alert when Adobe releases a patch.

For All WatchGuard Users:

Many of WatchGuard’s Firebox models can block incoming PDF files. However, most administrators prefer to allow these file types for business purposes. Nonetheless, if PDF files are not absolutely necessary to your business, you may consider blocking them using the Firebox’s HTTP and SMTP proxy until Adobe patches.

If you decide you want to block PDF documents, follow the links below for video instructions on using your Firebox proxy’s content blocking features to block .pdf files by their file extension:

Status:

We will update you when Adobe releases a patch. Until then, implement the workarounds described above.

References:

This alert was researched and written by Corey Nachreiner, CISSP.


What did you think of this alert? Let us know at your.opinion.matters@watchguard.com.

More alerts and articles: log into the LiveSecurity Archive.

 

NOTE:
This e-mail was sent from an unattended mailbox. Please do not reply.

ABOUT Questiva/TailoredMail:
WatchGuard has contracted with Questiva/TailoredMail, an industry leading vendor of trusted email services, to send these emails and maintain a record of your preferences confidentially. Personal information about you is not sold or rented to Questiva/TailoredMail or to other companies. Both WatchGuard and Questiva/TailoredMail are fully committed to your privacy, as detailed in WatchGuard’s privacy policy.

TO UNSUBSCRIBE: You received this e-mail because you subscribed to the WatchGuard LiveSecurity Service, which advises about virus alerts, security best practices, new hacking exploits, and more. If you no longer wish to be advised of these things, please let us know.
On the Web: Unsubscribe (credentials required)
By E-mail: Unsubscribe

This email was sent to: sales@guardsite.com

No express or implied warranties are provided for herein.  All specifications are subject to change and any expected future products, features or functionality will be provided on an if and when available basis.

Copyright 2009 WatchGuard Technologies, Incorporated. All Rights Reserved. WatchGuard, LiveSecurity and Firebox, and any other word listed as a trademark in the “Terms of Use” portion of the WatchGuard Web site that is used herein, are registered trademarks or trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. You may not modify, reproduce, republish, post, transmit, or distribute this content except as expressly permitted in writing by WatchGuard Technologies, Inc.

Virtual Graffiti
http://www.VirtualGraffiti.com
“Your Technology and Network Solution Provider”

ParagonHost
http://www.ParagonHost.com
“World Class Internet Servies”

« Newer PostsOlder Posts »

Blog at WordPress.com.