Showing posts with label Microsoft. Show all posts
Showing posts with label Microsoft. Show all posts

Tuesday, March 3, 2020

Multi-platformsko programiranje za Windows, Linux i macOS

https://wiki.freepascal.org/Multiplatform_Programming_Guide


********************
Microsoft Windows 20
MORE TIPS:

http://cegui.org.uk/features

http://vclua.luaforge.net/#Downloads

https://forum.cockos.com/showthread.php?t=176662

http://tset.de/mini_utf8/index.html

https://www.beamng.com/threads/lua-tutorial-how-to-create-in-game-gui.3953/

https://blog.emsisoft.com/en/34083/how-to-protect-your-companys-backups-from-ransomware/

First thing: ransomware doesn't really "hide" per se. If you get hit with cryto, believe me, you'll know it because your employees will definitely tell you. If you don't have data services watching your files and alerting you to sudden unexpected changes, the employees will be your canary in the coal mine; throwing loud and apocalyptic sounding fits when they suddenly can't access their work.

The whole idea of ransomware is to separate your company from its own data and to hold that data hostage until the author gets paid. Databases, Office documents, email OST and PST files, multimedia files, etc. will more or less suddenly become unreachable because the infection will encrypt those files and, often, even change the file-types on them in order to make them doubly hard to access. Most infections will even be so kind as to leave a ransom note in each folder that it has touched, with instructions on how to pay up in order to get the decryption key.

The good news is that, at least in my experience (yeah, I've been through a crypto attack and not only lived to tell the tale, but got all my company's data back without paying the ransom, thanks to copious backups), crypto won't usually go after your backups unless the drives that those backups are on are mapped on patient zero. If you're backing up to tape, even better.

You see, 99 times out of 100, the infection will come as an email to one of your users. In typical ID-10-T user fashion, they'll click a link without bothering to verify it, or open and execute an attachment, even though they don't know who it's coming from. As soon as they execute such a nasty piece of work, it will, almost invariably, go to work immediately, like PAC-MAN, on your data. So, if your backups are separated from your users, themselves, they - the backups - will be safe from all but the most sophisticated of attacks. You have to remember what these guys are after: they want to get paid - as often and as quickly as possible. It would be against their best interests to create a time bomb variant that sits on your backups and hits you at some later date. Something like that would be more in line with targeted state cyber warfare or industrial espionage than your run of the mill ransomware attack.

As said before, keep your AV and whatever other security schemes you have in place updated and running, don't map drives on your users' machines that you're too afraid of losing if you can help it, and keep a weather eye out for odd behavior on your data drives. Then you should be ok. If you suddenly find that files and folders have become unreachable due to being changed en-mass, find patient-zero - should be easy because they'll be the first to alert you that they can't do their work - then nuke their machine, administer some "wall-to-wall counseling" to said ID-10-T user, and then go to your backups from before the incident started. It really is as simple as that.

https://www.infopackets.com/news/10422/8-ways-protect-your-backups-ransomware

https://www.acronis.com/en-eu/ransomware-protection/


https://redmondmag.com/articles/2019/10/22/how-to-ransomware-proof-your-backups.aspx

https://www.synology.com/en-global/solution/ransomware

https://www.itsmdaily.com/8-ways-to-protect-your-backups-from-ransomware/

https://www.pcmag.com/picks/the-best-ransomware-protection

Crucial practices against ransomware attacks on your PC 
Ransomware has become a growing threat to home users and small offices with less sophisticated defense systems. Put an end to malware infections, here are some tips and tricks to avoid becoming another victim of ransomware.

Update your operating system
Outdated computer systems are relatively more vulnerable to ransomware attacks. This is why it is essential to perform regular software and operating system updates to improve the security of your computer.

Install a reputable security suite
Install a good antivirus software or a reputable security suite to help you detect and fight off malicious threats, giving you an extra form of protection.

Avoid suspicious files
Stay on guard and think twice before opening email attachments or clicking files from unknown sources. Watch out for suspicious files with hidden file-extensions such as “.pdf.exe”

Disable remote access
Malware often targets computers using RDP (Remote Desktop Protocol). Keep RDP disabled if you do not require remote access.

Multi-version backup, your best weapon against ransomware 
Encryption-based ransomware is getting sophisticated and may not be detected by anti-malware software in time. Once infected, you will be locked out from your own data and there is still no guarantee you can retrieve your data even after paying the ransom! It is highly recommended to perform routine backups to restore infected files and minimize damage. Take advantage of multi-version backup — a robust backup solution allowing you to restore previous versions of the infected files.

Back up your computer data to NAS
Create a multi-version backup for point-in-time recovery to avoid paying a hefty ransom to unlock your data. Synology Drive Client is the perfect solution to backing up data stored on your computer to Synology NAS servers. You can retain up to 32 historical versions of a single file – kept safe from folder encryption. Learn more about Synology Drive Client

Back up NAS data to other destinations
Backing up locally just might not be enough should a more destructive ransomware attack shared folders on your NAS server through accessing file services on your PC. The best way to prevent this is to add another layer of protection by having uninfected backup versions stored in an offsite location. If you fall victim of ransomware, you can still access data stored at different locations.

Hyper Backup  
Hyper Backup lets you enjoy a full range of multi-version backup destinations from local shared folders, expansion units, and external hard drives, to network shared folders, rsync server, and public cloud services.

Hyper Backup also offers solid protection for local backup. You can isolate data from internet threats by configuring your PCs' access privilege to certain shared folders on Synology NAS to further prevent outside forces from accessing critical backup data stored in your NAS shared folder. Learn more about Hyper Backup

Snapshot Replication 
The cutting-edge Btrfs file system supports state-of-the-art snapshot technology on select NAS models. Snapshot Replication allows you to replicate data from a primary site to an offsite location up to every 5 minutes and 15 minutes for LUNs, ensuring all your critical data in shared folders or virtual machines in iSCSI LUNs can be recovered quickly in the event of disaster.




Friday, November 16, 2018

Još koristite Windows XP Pro SP3, onda pročitajte ovaj tekst

Imate veliku korporativnu mrežu starih kompjutera sa Windows XP u 2018. godini:
*instalirajte dodatni najnoviji sigurnosni pach zaWindows XP SP3 verziju:

https://www.catalog.update.microsoft.com/search.aspx?q=4500331

https://www.avg.com/en-us/windows-xp-antivirus

https://www.avast.com/windows-xp-antivirus


AVG i Avast još uvek zvanično podržavaju Windows XP iako je 2018. godina. AVG tvrdi da pokriva sve sigurnosne rupe koje vremešni Windows XP ima, kao i da obezbedjuje najbolju i najoptimalniju zaštitu od virusa, spyware-a, malware-a i ostalih modernih pošasti.

MORE TIPS:

Imate jedan kompjuter na LAN-u viška, onda instalirajte:


SecurityOnion Linux i imate IDS za zaštitu svoje mreže.

Kodovi za mobilni:

Kod *#21#

Kada ukucate ovaj kod možete otkriti da li su vaši pozivi i poruke preusmereni. Status svake informacije će biti prikazan na ekranu. Ovu funkciju često koriste oni koji sumnjaju da ih partner vara, ili roditelji koji se staraju o bezbednosti svoje dece.

Kod *#62#

Ovaj kod upotrebljava se kada korisnik želi da sazna gde se preusmeravaju pozivi, poruke i podaci za koje vam se čini da do njih niko ne može da dopre.
Kod *#06#
Koristi se kada želite da saznate svoj IMEI broj. Ako znate ovaj broj, možete da pronađete svoj telefon kada ga neko ukrade. Kada je uključen, njegova lokacija se direktno prenosi na mrežu operatera, pa čak u slučaju da je ubačena druga kartica.

Kod 002#

Reč je o univerzalnom kodu koji služi za isključivanje bilo kakve vrste preusmeravanja na vašem telefonu. Dobra ideja da ovo uradite pre nego što otputujete u inostranstvo gde koristite usluge rominga. Pomoću ovog koda obezbedićete se od troškova za pozive koji bi bili preusmereni na vašu govornu poštu.



MREŽNA OPREMA KOJA TREBA SVAKOJ FIRMI KOJA DRŽI DO SEBE:

1) FIREWALL:

https://www.alibaba.com/product-detail/Cisco-5500-series-Firewall-ASA5525-K9_60794373485.html?spm=a2700.7735675.normalList.6.rdzjvG&s=p


Original and Brand New  Cisco Firewall ASA5525-K9:  ASA 5500 Edition Bundle ASA5525-K9 ASA 5525-X with SW, 8GE Data, 1GE Mgmt, AC, 3DES/AES


Product CodeASA5525-K9
Interfaces8 copper GE ports
1 copper GE management port,
1 expansion slot
Stateful inspection throughput (maximum)2 Gbps
3DES/AES VPN throughput300 Mbps
IPsec VPN peers750
Virtual interfaces (VLANs)200
Memory8 GB
Flash8 GB
Height (rack units)1 RU
Dimensions (D x H x W)4.45 x 20.04 x 36.2 cm
Package Weight13.1 Kg

2) SWITCH:

https://www.alibaba.com/product-detail/Cisco-Catalyst-2960-48-Port-Network_60769435692.html?spm=a2700.7735675.normalList.28.BrqMvb&s=p

WS-C2960-48TT-L Specification

Specifications
TypeFixed
TopologyEthernet (10/100BaseTX)
Ethernet (10/100/1000BaseT)
Maximum Port density48 10/100 ports
Uplinks2 10/100/1000 ports
Modular/Expansion Slotsn/a
ArchitectureLayer 2 Switching (basic connectivity), Layer 2 Switching (intelligent services), Voice Enabled
Form FactorFixed, Rack Mountable, Standalone/Clustering
Dimensions1.73 x 17.5 x 9.3 in.
DRAM64 MB


3) ROUTER:

https://www.alibaba.com/product-detail/Original-CISCO1921-SEC-K9-Ethernet-LAN_60768449210.html?spm=a2700.7735675.normalList.6.5G8m3i&s=p

Here is the Details of  Router CISCO1921/K9
Device TypeRouter
Enclosure TypeDesktop, rack-mountable - modular - 1U
Data Link ProtocolEthernet, Fast Ethernet, Gigabit Ethernet
Network / Transport ProtocolIPSec, L2TPv3
Routing ProtocolOSPF, IS-IS, BGP, EIGRP, DVMRP, PIM-SM, static IP routing, IGMPv3, GRE, PIM-SSM, static IPv4 routing, static IPv6 routing, policy-based routing (PBR), MPLS
Remote Management ProtocolSNMP, RMON
FeaturesFirewall protection, VPN support, MPLS support, VLAN support, Syslog support, IPv6 support, Class-Based Weighted Fair Queuing (CBWFQ), Weighted Random Early Detection (WRED), Quality of Service (QoS), Web Services Management Agent (WSMA), TR-069 Agent, NetFlow
Compliant StandardsIEEE 802.3ah, IEEE 802.1ah, IEEE 802.1ag

Interfaces2 x 10Base-T/100Base-TX/1000Base-T - RJ-45
Serial : 1 x console
Management : 1 x console - mini-USB Type B
Serial : 1 x auxiliary
USB 2.0 : 1 x 4 pin USB Type A
Expansion Slots2 (total) / 2 (free) x EHWIC

NASTAVAK....... CONTINUE-----------------

Friday, April 28, 2017

Koja je brzina tvog servera ? PHP

Koja je brzina tvog servera ?

<?phpif (isset($_GET['source']))
{
    
highlight_file($_SERVER['SCRIPT_FILENAME']);
    exit;
}
$maxNumKB 4096;$defNumKB 512;
if (!isset(
$_GET['numKB']) || intval($_GET['numKB']) > $maxNumKB)
{
    
header("Location: http://{$_SERVER['HTTP_HOST']}{$_SERVER['PHP_SELF']}?numKB=$defNumKB");
    exit;
}
$numKB intval($_GET['numKB']);?><!DOCTYPE html 
     PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
    <title>Jan! &raquo; PHP &raquo; speed test</title>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <style type="text/css">
    <!--
    html
    {
        font-family: sans-serif;
        color: #000;
        background: #fff;
    }
    *
    {
        font-size: medium;
    }
    #wait
    {
        border-bottom: thin dotted black;
    }
    #wait abbr
    {
        border: none;
    }
    #done
    {
        font-weight: bold;
    }
    #benchmark
    {
        padding: 1em;
        border: 1px solid black;
        background: #ffe;
        color: #000;
    }
    //-->
    </style>
</head>
<body>
<div id="benchmark">
<p>
    <strong>This not a script to benchmark or determine the execution speed
    of PHP scripts.</strong> If you're looking for one, check out the PEAR
    <a href="http://pear.php.net/package/Benchmark">Benchmark package</a>.
</p>
<p>
    This script sends <?php echo $numKB?> <abbr title="kilobyte">KB</abbr>
    of HTML comments to your client. Parsing that HTML may add to the total
    transfer time, so don't take this as your raw download speed.
</p>
</div>
<h1>Please wait</h1>
<p>
    <a href="<?php echo "http://{$_SERVER['HTTP_HOST']}{$_SERVER['PHP_SELF']}?source=1"?>">(Show source)</a>
</p>
<p id="wait">
    Transferring <?php echo $numKB?> <abbr title="kilobyte">KB</abbr>
</p>
<!--
<?phpfunction getmicrotime()
{
    list(
$usec$sec) = explode(" "microtime());
    return ((float)
$usec + (float)$sec);
}
flush();$timeStart getmicrotime();$nlLength strlen("\n");
for (
$i 0$i $numKB$i++)
{
    echo 
str_pad(''1024 $nlLength'/*\\*') . "\n";
    
flush();
}
$timeEnd getmicrotime();$timeDiff round($timeEnd $timeStart3);?>-->
<p id="done">
    <?php
        
echo "Transferred {$numKB} <abbr title=\"kilobyte\">KB</abbr> in {$timeDiff} seconds, " .
             (
$timeDiff <= "more than {$numKB}round($numKB $timeDiff3)) .
             
' <abbr title="kilobytes per second">KB/s</abbr>';
    
?></p>
</body>
</html>

Tuesday, April 25, 2017

VBS dovoljan za skoro sve

___________________
File: tuta.vbs
Author: v$
________________


Option Explicit
Dim result, objFSO, outFile, objFile 
result = InputBox("zapisi ovo:", "title", "default unos", 100, 100)
WScript.Echo result  

'Set objFSO = CreateObject("Scripting.FileSystemObject")

' How to write file
'outFile="c:\test\probator.txt"
'Set objFile = objFSO.CreateTextFile(outFile,True)
'objFile.Write "test string: " & result & vbCrLf
'objFile.Close


Dim objStream
Set objStream = CreateObject("ADODB.Stream")
objStream.CharSet = "utf-8"
objStream.Open
objStream.WriteText result
objStream.SaveToFile "c:\test\probator.txt", 2



WScript.Echo "totovo"