<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Internet Secuirty &#8211; AgileOps</title>
	<atom:link href="https://agileops.co.uk/category/internet-secuirty/feed/" rel="self" type="application/rss+xml" />
	<link>https://agileops.co.uk</link>
	<description>Virtualization made simple for Everyone.</description>
	<lastBuildDate>Thu, 23 Apr 2020 18:09:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://agileops.co.uk/wp-content/uploads/2017/10/favicon-01-50x50.png</url>
	<title>Internet Secuirty &#8211; AgileOps</title>
	<link>https://agileops.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">194680508</site>	<item>
		<title>Consolidating IT Infrastructure by Virtualization</title>
		<link>https://agileops.co.uk/virtualization/</link>
					<comments>https://agileops.co.uk/virtualization/#respond</comments>
		
		<dc:creator><![CDATA[Ibrahim Quraishi]]></dc:creator>
		<pubDate>Tue, 12 Jun 2012 05:02:48 +0000</pubDate>
				<category><![CDATA[Full Virtualization]]></category>
		<category><![CDATA[Hardware Assisted)]]></category>
		<category><![CDATA[Hosted Virtualization]]></category>
		<category><![CDATA[Hyper-V]]></category>
		<category><![CDATA[Information]]></category>
		<category><![CDATA[Internet Secuirty]]></category>
		<category><![CDATA[Network Virtualization]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[P2V]]></category>
		<category><![CDATA[Paravirtualization]]></category>
		<category><![CDATA[physical to virtual converter]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[virtualized]]></category>
		<category><![CDATA[Vm ware converter]]></category>
		<category><![CDATA[Vmware]]></category>
		<guid isPermaLink="false">https://quraishi.wordpress.com/?p=422</guid>

					<description><![CDATA[
				<![CDATA[]]>		]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper"><p><![CDATA[As we all know today the main priority is cost savings in every organizations. Keeping this in mind majority of companies are seeking alternative method of saving cost.

One of the way which has become most popular today is consolidating IT infrastructure.   That is by getting rid of old, crapey hardware that has been running for donkeys years!  which keeps braking every fortnight.  Also another concerning factor is space in the Data Center are already filled up, and companies cannot invest in setting up a new data centres, as it will involve huge investments.

So, most of the companys are looking into different types of virtualizations. They are 3 types of virtualizations which are avalable today.

<strong]]&gt;Full Virtualization</p>
<ul>
<li>Hypervisor contains the Virtual Machine Monitor (VMM)</li>
<li>Guest OS unchanged, Host can be any kind of hardware</li>
<li>Guest uses generic device drivers</li>
</ul>
<p><strong>Hardware Virtualization (a.k.a. Hardware Assisted)</strong></p>
<ul>
<li>VMM moved to hardware</li>
<li>Requires VT hardware</li>
<li>Guest OS unchanged, uses generic device drivers<span id="more-422"></span></li>
</ul>
<p><strong>Paravirtualization<a href="httpss://quraishi.files.wordpress.com/2012/06/products_esx_diagram.gif"><img decoding="async" class="alignright size-full wp-image-424" title="products_esx_diagram" src="httpss://quraishi.files.wordpress.com/2012/06/products_esx_diagram.gif" alt="" width="212" height="200" /></a></strong></p>
<ul>
<li>Guest OS requires <em>paravirtualized</em> drivers</li>
<li>Thin layer for hypervisor, guest has access to Host hardware</li>
<li>Host any kind of hardware</li>
</ul>
<p>in gernal we have two famous methods of Virtualizaiton : <strong>Hosted Virtualization</strong> ( installing the virtualization software VMM on a host server ie. Windows Server 2008 or Linux etc. <strong>Bare Metal Virtualization</strong> ( installing the virtualization software on physical machine directly which gives super performance eg. VMware vSphear) aka <em>Hardware emulation</em> Further we can classify the virtualization in three important categories <strong><em>Storage Virtualization:</em></strong> This is achieved by consolidating all the storage in a single location which makes the network admins to easily manage the storage resource. <strong><em>Network Virtualization</em></strong> This is accomplished by combining all the network bandwidth and then splitting it into channels for users. this allows the Administrator allow resources as and when they require. This allows each user to access all of the network resources, which can be files and folders on the computer, printers or hard drives etc. This streamlined approach makes the life of the network administrator much easier. <strong><em>Server Virtualization</em></strong> This is the most popular virtualization method used today to consolidate multiple virtual machines on a single high spec physical server, This will save processing power , space in DC and more importantly cost.</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>


<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="407" data-attachment-id="15826" data-permalink="https://agileops.co.uk/virtualization/type1andtype2hypervisor-2/" data-orig-file="https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor.png" data-orig-size="1360,540" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Type1andType2Hypervisor" data-image-description="" data-image-caption="" data-medium-file="https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-300x119.png" data-large-file="https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-1024x407.png" tabindex="0" role="button" src="https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-1024x407.png" alt="" class="wp-image-15826" srcset="https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-1024x407.png 1024w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-300x119.png 300w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-768x305.png 768w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-700x278.png 700w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-466x185.png 466w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-933x370.png 933w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor-350x139.png 350w, https://agileops.co.uk/wp-content/uploads/2020/04/Type1andType2Hypervisor.png 1360w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<ol><li> Virtualization of old physical servers to a virtual server  also known as P2V (Physical to Virtual)</li><li>Setup new servers only on virtual infrastructure (unless there is a mandatory requirement of having a physical server )</li></ol>



<p></p>



<p>Although there are a lot of products available in the market to achieve this the ones that are hugely popular is VMware and Hyper –V. both of the software does the job although there is always a big debate on which is better one. I have always been a big supporter of VMware products, with their new range of products complementing one and other. I will dig these two deeper on my next post &#8230; Thanks for reading. </p>



<p>Sources : VMware: https://www.vmware.com/files/pdf/VMware_paravirtualization.pdf </p>



<p>Dell: https://www.dell.com/downloads/global/power/ps3q05-20050191-Abels.pdf </p>



<p>Microsoft: https://www.microsoft.com/en-us/server-cloud/hyper-v-server/benefits.aspx]]&gt;</p>
</div><!-- .vgblk-rw-wrapper -->]]></content:encoded>
					
					<wfw:commentRss>https://agileops.co.uk/virtualization/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">422</post-id>	</item>
		<item>
		<title>Are you Secure when you browse the web ?</title>
		<link>https://agileops.co.uk/are-you-secure-when-you-browse-the-web/</link>
					<comments>https://agileops.co.uk/are-you-secure-when-you-browse-the-web/#comments</comments>
		
		<dc:creator><![CDATA[Ibrahim Quraishi]]></dc:creator>
		<pubDate>Thu, 11 Nov 2010 01:26:51 +0000</pubDate>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[How to secure a wireless network]]></category>
		<category><![CDATA[Internet Secuirty]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Vmware]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows Server 2003]]></category>
		<category><![CDATA[Windows XP]]></category>
		<category><![CDATA[Windows XP Professional]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[wireless network]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://quraishi.wordpress.com/?p=373</guid>

					<description><![CDATA[
				<![CDATA[]]>		]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">
				<![CDATA[Hi All,

I have a question today?

How fussy are you to which Wi-Fi signal you connect?  i.e., connecting to an open or a secure Wi-Fi connection.

As we know that most of the Coffey shops and pubs allow you to use the free Wi-Fi open connections. Do you even think twice before connecting to a open Wi-Fi signal?

Please put some time to understand what is the risk involved in using an open Wi-Fi connection.

I know getting internet connectivity when your out and about will look like a blessing. However all your data and your laptop itself can be compromised by anyone connecting to open Wi-Fi connections.

Some people think that having a Anti-Virus program or an Firewall enabled laptop will keep them safe, what they don’t know is when they setup the connection with an open Wi-Fi connection they have already established a trust relation with that router.

Windows 7 gives warning to the user that its very risky to connect to a Open and un-secure Wi-Fi networks yet most of the people I know still connect anyway.

Moreover I know a couple of friends who bought a wireless router and started using it without setting up of security key or changing the default admin password.<span id="more-373"></span>

Eventually someone else started using their network; they only realized this after they felt that their connection became slow.

This could have been worst as people can capture all the packets and get the critical information like online banking information, CC numbers etc.

The truth is even if your using secure Wi-Fi connection, wireless technology can still be very easy to compromised, how ?

Check out for yourself Googleit  &#8211;  how to crack Wi-Fi network and you will get the answer.

However we can avoid this just by making sure we do not use simple name or dictionary words as a passphrase.

Always use complex passphrase /WEP/WPA2 keys and make sure you have a key which is at least 10 to 12 characters long.

Now let’s get to the point<strong><em> How to secure Your wireless network ?</em></strong>

<strong><em>Change Your network name and  Your router login information</em></strong>

Simple job just login to the router using the details from Manufacture. Usually found at the back on the router long and change the Name of the network and login information or at least the password.

<strong><em>Secure Your Wi-Fi network:</em></strong>

If you do not secure your network it will be open for anyone who can get your wireless signal.

<strong>WEP</strong> (Wire Enabled Protection) this should only be used if you have old laptop that does not support the advanced encryption. If you are using this make sure you use 128 bit encryption.

<strong>WPA 2</strong> encryption is the best so far, However I suggest you keep a long passphrase and complex at the same time.

<strong><em>Hide Your network name (SSID) </em></strong>

Although most people don’t do this, but I strongly suggest you to hide the SSID. Simple logic if they can’t find your Wi-Fi signal  you will be less vulnerable to get hacked.

<strong><em>Enable Software and Hardware Firewall:</em></strong>

Let me explain Software firewall is the firewall built into the Operating System i.e., Windows Vista or Windows 7 just enable it.

Hardware firewall  ah might be new to some of us,  but most of the routers built today even the cheapest one has a firewall program built into them.  So all you got to do is login to the router using your admin login and enable it.

Hope you find this post useful feel free to comment if you ever used open / un-secure Wi=Fi.]]&gt;		</div>
<p><!-- .vgblk-rw-wrapper --></p>
]]></content:encoded>
					
					<wfw:commentRss>https://agileops.co.uk/are-you-secure-when-you-browse-the-web/feed/</wfw:commentRss>
			<slash:comments>47</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">373</post-id>	</item>
	</channel>
</rss>
