Sujata Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in computer security

Next year Microsoft is releasing its new operating system and its next Windows iteration will not be Windows 9 or Windows 8.2. Instead it has skipping straight to 10. A lot of people are making fun of this. People like order, and skipping numbers bothers the kindergartner in all of us.

According to me some plausible reasons for skipping directly to 10 might be:-

  1. Christening new windows OS as windows 9 will send the message that it is merely upgrade of windows 8.1 and there is nothing new in it
  2. In June 2015 Apple is going to launch IOS 9 and MS just to prove its superiority, jumped to number 10.
  3. The Japanese consider 9 to be an unlucky number because it sounds similar to the Japanese word for pain. What's Mr. T's prediction for Windows 9?

Anyways let’s see some salient features of windows 10.After using Windows 10 for almost a week, I’ve discovered some neat little changes and features that Microsoft hasn’t yet discussed — smart tweaks that, if you’re a mouse-and-keyboard user looking for a reason to upgrade from Windows 7/8.1, you will be very pleased with. Let’s dive straight in with my favorite secret/hidden features of Windows 10.

Explorer now has a “Home” tab

In the last few versions of Windows, opening My Computer or a new Explorer window would
show you your computer’s various storage locations and shortcuts to default folders like
Documents and My Pictures. In Windows 10, you now end up in a new view called Home, which
shows Favorites, Frequent Folders, and Recent Files.

You can finally put the Recycle Bin on the taskbar Rather than having to poke around Explorer or minimize everything and find the Recycle Bin icon on the Desktop, in Windows 10 you can now add the Recycle Bin to both the taskbar and the Start menu. Yes, that is the sound of many brains exploding as they catastrophically realize the enormity of this change

The Windows 10 Start menu is resizable

This one is a bit odd: You can make the Windows 10 Start menu as tall or as wide as you like. If
you want to have a Start menu that takes up the entire left side of your screen, or a narrow strip
across the taskbar, then that’s now possible. The taskbar itself is also resizable, which means you can do weird stuffs. I am not sure if this is second bit is intentional or not. A resizable Start menu is quite cool, though! Cortana is almost definitely coming to Windows 10

After a little bit of poking around (searching for “Cortana” in Explorer) I found a lot of references to Cortana in Windows 10 Technical Preview; there’s even aWindows.Cortana.dll, just sitting there in the System32 directory. You also get a bunch of Cortana-related hits if you search for “Cortana” within the Registry Editor.None of this is to say that Cortana is definitely coming to Windows 10 — there are lots of other reasons for those files/registry entries being there, such as the ghost of an early internal test — but I’d say it’s pretty likely. We should hopefully see Cortana in the next beta of Windows 10.

Notifications and toasts in Windows 10
While Windows 10′s rumored Notification Tray isn’t yet in the Technical Preview, there are some new pretty toasts/notifications that pop up in the top right corner of the screen. These notifications appear to replace the speech bubbles that used to pop out of the system tray (the bottom right corner of the taskbar, unless you’re one of those heathens who has moved the taskbar to a non-standard location).

The Command Prompt is getting so much more than just Ctrl-V
Somewhat unbelievably, despite the Windows 10 unveil event being only 40 minutes long, Microsoft actually dedicated a couple of minutes to Windows 10′s Command Prompt (cmd). At the time, Joe Belfiore told that Command Prompt is finally gaining the ability to paste with Ctrl-V (previously, you had to right click > paste). It turns out, there’s a lot more, too. If you right click Command Prompt’s title bar and head to Properties then Experimental, you get a bunch of new options (see above). In fact, you have to turn on the experimental options before you can use Ctrl-V to paste. With experimental options turned on, you can also use Shift-arrow keys to mark text (for copying and pasting with Ctrl-C/Ctrl-V). The other options are mostly self-explanatory, though I am still trying to discover what the “extended edit keys” are (let me know in the comments if you’ve found some!)

Windows 10 keyboard shortcuts for virtual desktops, improved snapping, task view
One of Windows 10′s bigger new features is virtual desktops — additional instances of the Desktop that you can use to better organize your workspace. There’s also improved snapping, and a new view called Task View that’s kind of like Alt-Tab, but it incorporates your virtual desktops as well. All of these new features have associated keyboard shortcuts to make using them a cinch.
Task View is opened up with Windows Key-Tab. It looks very like the new Alt-Tab interface, but it stays open after you let go of the keys. You can also add, remove, and manage virtual desktops from this interface.
Windows Key-Ctrl-Arrow (left or right) switches you to the next virtual desktop on the left or right.
Windows Key-Ctrl-D creates a new virtual desktop. Windows Key-Ctrl-F4 closes the current virtual desktop.
Windows Key-Up arrow and Windows Key-Down arrow can now be used to snap the current app to the top or bottom of the screen (this is in addition to Win-Left and Win-Right for snapping to the left and right of the screen). Tapping these shortcuts multiple times creates different effects: Tapping Win-Up once maximizes an app; twice snaps it to the top. Win-Down once snaps to the bottom; twice minimizes it. You can also use Win-Left/Right to move apps incrementally across a multi-monitor setup.

FOR ANY QUERIES PLEASE CONTACT ME ON [email protected]
or +919850712300

Thanks
Pushkar Nath

Hits: 1582
0

UTM (Unified Threat Management)

UTM represents a significant shift in the evolution of network security technology and equipment. UTM generally refers to a security appliance that consolidates a wide range of essential network security functions into a single device, including next-generation firewall technologies like application control.
As network threats evolve and new threats emerge, network security must change and adapt to protect against such threats. This adaptability can make UTM difficult to define because the technologies included can vary from vendor to vendor. Over time, however, the collection of capabilities associated with UTM has consistently expanded, and this trend shows no sign of tapering off.
As we write this, the best UTM solutions for networks include the following core security functions in their arsenals.

  • Network firewalls perform state full packet inspection.
  • IPS detects and blocks intrusions and certain attacks.
  • Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  • Support for virtualized environments, both virtual domains and virtual appliances.

indexThey also include additional security technologies that organizations can choose to deploy, including

  • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  • Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks
  • Endpoint control that enforces corporate security policies with remote users and devices.
  • Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.
  • Gartner has once again positioned Fortinet as a leader in the Unified Threat Management (UTM) Magic Quadrant for 2014.
  • According to Gartner, “The Leaders quadrant contains vendors at the forefront of making and selling UTM products” and “Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens.”
  • Of course, the FortiGate Connected UTM platform supports the comprehensive set of security features you would expect from a market leading UTM solution: Firewall, VPN, IPS, Anti-malware, URL and Application control. But Fortinet’s relentless commitment to innovation takes the FortiGate Connected UTM to the next level. Integrated High-Density Switching (including PoE) and Wireless LAN eliminates the need to deploy standalone switches or wireless controllers, further simplifying your network deployment and reducing management costs
  • Sujata Computers Pvt. Ltd is the Value added Distributor for the Fortinet.
  • I would be glad to answer your queries, you can leave your comments or write to me at [email protected]
  • Warm regards

fortinet-gartner-sujata-computers-pvt-ltd

Dinesh
Sujata Computers Pvt Ltd
Fortinet Partner & Sub-Distributor

Hits: 1609
0

Dear Sir/Madam,

Starting July 14, 2015, Microsoft will end all support and updates for Windows Server 2003.

As your trusted advisor and partner, we’re hosting an exclusive series of webinars to help you with a smooth transition from Windows Server 2003. The last webinar focused on the process of migration.

The upcoming webinar, to be held on February 19, 2015 will detail out the practical considerations and best practices of migration from Windows Server 2003. We will also take you through the licensing options available.

Register for the webinar now and stay ahead in the game.

Regards,
Microsoft Team

Hits: 985
0

Hi!

This is Pushkar Nath, Sujata's Data Security Specialist. This blog is for CXOs in Manufacturing Industry to understand what data security threats are around us and how to keep the data safe from the threats.

In today’s tech savvy world, where systems are getting automated, it is leaving vulnerable points which render an organization prone to data leak. We will do critical analysis sector wise to pinpoint the leak points and ways to plug them. Today I am picking up manufacturing sector for critical analysis

End Users – It can be anyone designing team, people from R&D department, data entry executive, receptionist etc. There is possibility of malware infection through internet and spreading it in local area network and crashing down the entire network. Apart from that it might be possible that they might try to send documents or critical organization data through USB, mails or web. This can be prevented by using Antiviruses, data loss prevention, web and Messaging gateway protection. Hard disc, file and folder and removable USB level Encryption

Accounts/Finance Department – This department handles one of the most critical assignments of an organization and that is to manage the entire financial dealing and transactions. Any leakage of financial details might prove detrimental to the organization. This department is prone to phishing attack. . Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  endpoint to endpoint encryption with two factor authentication will provide adequate security to this department.

Human Resource department – Human resource department has under its possession entire record of the employees. As manufacturing sector is labour intensive sector so every company has long list of labours doing blue collar and white collar jobs.  Companies doling out financial services are always on prowl for these type of database.  Security becomes necessary. Antiviruses, data loss prevention, messaging gateway protection, hard disc, file and folder and removable USB level Encryption becomes critical necessity of this department.

Sales and marketing Dept. – This department generates revenue for an organization. They have data of their clients and their requirements. As personals from this department remains mobile. So BYOD is gaining currency among them. . Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  , gateway to end point mail  encryption , mobile device management, mobile application management coupled with two factor authentication will provide adequate protection to the devices, application and data.

IT Department – This department manages the entire IT infrastructure of an organization. It has to manage server infrastructure, networking, end points of the users.  Its role becomes critical in the sense that if it gets down then functioning of the entire organization will come down to notch. The first product which is of extreme importance for them is back up software for end points and servers. Second is archiving and third is solution for hardware and software inventory management.

Top Management – This level of management is privy to secrets of all the above mentioned departments. Any IT admin can’t stop them from accessing there date/mails etc from their own device or from home. Security becomes critical as any intentional or unintentional loss of data, documents can have a devastating effect on the entire organization. Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  endpoint  to end point  mail  encryption , mobile device management, mobile application management coupled with two factor authentication will provide adequate protection to the devices, applications and data.

Let me know if you have any concerns around the data security or you can get a free check up of your IT infrastructure and processes set for accessing the critical data within your organization from me and my team in Sujata.

Regards,
Pushkar Nath

Hits: 1203
0

Contact Us

Email: [email protected]

India: +91-20-40100300

US: +1-7323195103