- Teaming Agreement (TA) for joint ventures
- Subcontractor Agreement (SA) for services one partner will provide another
- Master Services Agreement (MSA) for setting terms of future transactions
- Reseller Agreement for allowing one partner to resell products/services of the other partner
- JHC Technology, Inc.
- JHC Technology is a Service Disabled, Veteran-Owned, Small Business based in the Washington, DC Metro area. Our primary focus is to offer customized solutions and IT consulting to our Commercial and Government clients. Our experts have a broad experience delivering and managing Microsoft Enterprise applications and Cloud and Virtualization Solutions, as well as mobilizing Enterprise data.
Friday, June 28, 2013
Wednesday, June 26, 2013
This service is available at the Windows Server 2008 and up. This type of encryption protects the data at volume level
· Minimum impact on disk read/write
· Volume level encryption protects system data
· Backups and Logs are not encrypted
· Logs are not encrypted
File Level Encryption
This service is available at the Windows Server platform. This type of encryption protects the database files. It specifically uses NTFS.
· Easier to implement since it leverages NFTS platform.
· Leverages Windows key management store
· Backups and Logs are not encrypted
· Logs are not encrypted.
· Need OS level administrative access on the server
· Async I/O can experience slowness
Cell Level Encryption
This is the legacy encryption method from SQL Server 2005. This type of encryption protects at the field level for the database. SharePoint databases cannot benefit from this type of encryption due to schema restrictions.
· Cannot use with SharePoint
Full Database Level Encryption
This is new service called TDE (Transparent Data Encryption) that is introduced in SQL Server 2008. All the data get encrypted in the database mdf and ldf files. Only time the data is decrypted is when the information is read and display at the application level.
· Full database backup
· Backups are encrypted
· Transaction Logs are encrypted
· TempDB is encrypted
· Encryption puts extra load on the system
· Application independent. The application is not affected by encryption
· Data in transit is not encrypted. SSL can leverage to mitigate data in transit
Another level of security can be added to the SharePoint application by leverages Kerberos and SSL authentication. Kerberos and SSL help create a secure communication channel between the server and client. Kerberos authentication is a protocol in establishing trust and provides authentication. Both provide secure communication between the server and client.Kerberos is available under the Windows platform and is mostly installed on a domain controller. Once the SharePoint architecture is associated to the domain, Kerberos authentication can be activated to provide centralized authentication and ticket granting service. Kerberos authentication adds another layer for protection to the SharePoint environment. Some of the benefits of implementing Kerberos are following:
- Double hop authentication using delegation.
- Tickets are renewed after a certain time which reduces roundtrips to domain controller. Improves performance
- Authentication at the Server Level
Friday, June 21, 2013
OK, so let's narrow the scope down to smartphones and tablets. The top 4 popular operating systems on these devices are Android, Windows Mobile, Blackberry and Apple iOS. I have used all 4 on some sort of device (smartphone or tablet or both) and one thing that has stood out like a sore "security" thumb was when it came to managing wireless (WiFi) profiles. How many of you know how to get to your wireless configuration settings to add and remove specific wireless profiles?
For example, last year I traveled to a foreign country by plane. While I was in a DC airport waiting to board, I decided to connect to an airport pay-for-service WiFi on my iPad. I filled out the form and I was up and surfing. After a while it came time to finally board my flight and head off to my destination, but I had a 3-hour layover at another airport. So I decided to get on the Internet again, but this time it was a different service. However, this time it was free. So I decided to hook up all my other devices, such as Blackberry and Android tablets. So there I was, multitasking with all my electronics, until my next flight boarded. After a long day of traveling, I finally got to my destination, and like any electronic device driven person this day in age, I connected ALL my devices to the Internet before I even unpacked the rest of my bags.
After 10 days of fun I came back home and it was time to get back into the groove of things, work, 2+ hours commute and every-day life activities. While my vacation was now a memory relived through pictures, conversations and random thoughts, my devices had not been purged clean since they were holding onto the trip information still.
The good thing is that these "virtual" memories can easily be deleted. In fact, I highly recommend that you be paranoid and actively delete these memories from your devices. The main reason is in regards to wireless security, as related in my last blog.
Previously, I mentioned that your devices always beacon out looking for previous wireless connections that are in your device profiles. Well in this story, I created extra wireless profiles on my iPad and on 2 other devices. Fortunately, I can delete these profiles on every device one at a time, except the Apple device. I have many profiles on my devices and don't want to delete my home WiFi, my work WiFi or any other previously created WiFi profile on my devices. I just want to remove the ones that I know I will not use again.
So what I do is open my configuration settings on my devices and pick one profile at a time and delete it. I do this on my Blackberry and my Android. However, the Apple device does not give me that option. The only option Apple devices give me is all or none...unless you are within range of said WiFi and the iPad (Apple device) detects the WiFi signal, at which point you can tell your Apple device to "Forget it" within your wireless configurations. So your only option if you use Apple device is to delete all the profiles. It is not so horrible, but just a burden and a best practice in order to keep maintain the security of your device.
So how many people do you think purge or clean their devices after they were done with an Internet connection they will probably not use again? I believe there are many people who don't want to deal with it, let it be and continue collecting WiFi profiles on their devices. I say to those people: Beware!
You really need to do a little cleanup with your devices every now and then and reduce your chances of getting owned.
Wednesday, June 19, 2013
Caller: Yes, I deleted all of my files. Can you restore them for me immediately?
Helpdesk: Possibly. Do you know when the files were deleted?
Caller: Yes, about a month ago.
Helpdesk: The storage tapes containing those files are offsite. It will take at least a day to bring them back.
Caller: But I need the files today. I have presentation to do in an hour. Is there any way around this process?
Helpdesk: Unfortunately no, but we will work as quickly as possible to retrieve your data.
Caller: Well, how long do you think this process will take?
Helpdesk: At the least a day or two. At the most maybe one week. It all depends on how fast we can have the media containing the data returned to us and placed inside the storage device that needs to retrieve the data.
Caller: Gosh, I may as well just recreate them. Still, do what you can. That’s an awful lot of data to attempt to recreate in a day.
Helpdesk: Alright. I will open a ticket to have the process to restore your files started.
Monday, June 17, 2013
Friday, June 14, 2013
- If you make a call while connected with a Free Wi-Fi hotspot stay put until you are done talking. Once you move away from the Wi-Fi hotspot your call will drop.
- Before you travel internationally contact your carrier to ask “What is covered and what is NOT” while roaming. This could include your Internet email (Gmail, Yahoo and more). This is considered data when roaming. You are charged for roaming data even if you do not open the email account on your device.
- Ask about the cost to add International Data Roaming for one month, it may very well be worth the fee versus the surprise charges to your account afterwards.
- Find out the fee for Instant messaging, SMS chat.
- BlackBerry Messenger and Pin to Pin are both FREE
- From the Home screen,
- Locate and click the Manage Connections icon (For many mobile devices, this may be located in the Settings)
- Depending on the mobile device you will need to check the box for Wi-Fi and uncheck Mobile Network
- Your device will show a list of wi-fi networks, just click on the one you want to connect.
- If security key is required, you will be automatically prompted to enter it.
- Select Set Up Wi-Fi Network > Other Ways to Connect > Manually Connect to Network.
- Type a profile name in the SSID field, type the name of the Wi-Fi network, Click Next.
- In the Security Type field, click the Wi-Fi network security type or credentials you have been provided.
- Click Save and Connect.
Tuesday, June 11, 2013
- .NET Framework 4.5
- Windows Management Framework 3.0 (CTP2) – PowerShell 3.0
- Microsoft SQL Server 2008 r2 Native Client
- Windows Identity Foundation (KB974405)
- Microsoft Sync Framework Runtime v1.0 SP1 (x64)
- Windows Server AppFabric
- Windows Identity Extensions
- Microsoft Information Protection and Control Client
- Microsoft WCF Data Services 5.0
- CU Package 1 for Microsoft AppFabric 1.1 for Windows Server (KB2671763)
2. Create a subfolder named “PrerequisiteInstallerFiles” and copy all the prerequisites that you downloaded into there.
3. Create a subfolder under PrerequisiteInstallerFiles named “NET35″ and copy the contents of the Windows Server 2012 ISO \sources\sxs there.
- DC1 Active Directory Domain Services and DNS roles
- SP_CAS_13 SharePoint 2013 running Central Administration Server
- SPSQL SQL Server 2012 hosting the SharePoint 2013 databases
- Log onto your SQL Server 2012 VM.
- Connect the SQL Server 2012 ISO image to the VM and run the setup.exe file located in the root folder. I did not change any of the defaults. For “Feature Selection” I enabled/installed ”Database Engine Services” and “Management Tools – Complete”.
- Create a login for your SharePoint setup account and grant the account db creator and db owner rights.
Install SharePoint Pre-Reqs
- Attach the SharePoint Server 2013 ISO to the VM
- If performing an online (download everything from the internet) setup, launch the PrerequisiteInstaller.exe from the root of the SharePoint installation media/ISO
Now it’s time to install SharePoint! Perform the following on the CA Virtual Machine:
- Log onto the CA VM using the SharePoint Setup Account
- Attach the SharePoint ISO
- Run splash.hta from the root of the SharePoint ISO and select the “Install SharePoint” option
- “Create a new farm”
- For the database settings, enter the name of the SharePoint SQL VM
- When installation completes, launch Central Administration