Work In Progress : dedicated server @ kimsufi.com

Published on: 2 Feb 2015 @ 15:53

Quick update on security :

I’ve decided to postpone a bit my current projects and focus on one major subject which is security. Since I do want to make this right, I need some more time to collect and digest information on security. I already bookmarked tons of links about security :

Despite there is a default security protection on my dedicated server, this is hightime for me to learn more about serious security concepts.

As a result, I stopped every server that wasn’t necessary at the moment : vsftpd, apache2 and mysql for instance. I might even reinstall a fresh debian when I’ll be done reading and then I’ll configure properly what needs to be protected prior the DAMP (Debian Apache MySQL PHP) installation.
Once all of the above will work OK with sufficient security, I’ll install ownCloud.

Stay tuned ^^

 

 


Published on: 1 Feb 2015 @ 21:53

Even though I’ve been buzy IRL (In Real Life) lately, I’m still working on this ownCloud project of mine =)

Right now, I’m getting more used to the Kimsufi dedicated server (KDS) and in order to own the ‘Beast’, I’m exploring the file system and I also set up some procedures, like changing the .profile, etc.

In the meanwhile, I’m also reading loads of documents about VSFTPD to set this application right. I guess I’d need some SSL functionality and thus work my way through openssl too =)
Once VSFTPD will be correctly configured and securized, I’ll be able to upload files to my KDS. Then, installing ownCloud looks like a walk in the park :

ownCloud

Afterwards, I’ll be working on the web hosting functionality I want to provide to my friends, and why not, future clients. This whole thing is mainly for testing and playing around with a dedicated server but who knows ^^
Thus the apache configuration needs to be modified (especially the virtualhosts directive) and, while I’m at it, I’ll finely tune everything I can =)

More later ^^

 


Published on: 28 Jan 2015 @ 23:00

I managed to properly configure a web server on my debian dedicated server! I installed the following applications :

  1. apache2
  2. php5
  3. MySQL
  4. php5-mysql
  5. PhpMyAdmin (see picture below)
  6. bin9 was already installed
  7. Postfix
  8. VSFTPD

Right now I’m configuring Apache2 (virtualhosts especially) then I’ll configure the FTP and Postfix and I guess I’ll be almost done. Afterwards, I’ll run some tests and see how I can improve this base, but it’s going pretty well ^^

 

image of the default index (of course, I coudn’t resist to personalize it =)

screenshot-37 187 116 168 2015-01-28 21-35-22

image of phpMyAdmin (PHP_test = OK, MySQL_test = OK)

screenshot-37-187-116-168-2015-01-28-21-36-50

 


Published on: 27 Jan 2015 @ 15:18

The reason why I’ve published just a few articles lately is that I was searching for a solution for personal cloud : I wanted something I could entirely manage, i.e. my ownCloud.

After a few talks with the OVH’s commercial support (awesome thanks Alexis M.) I decided to buy a dedicated server at kimsufi.com

I will keep my OVH account for now and once I’ll be done sorting what I really want to keep and the tons of websites I used to play with, I’ll make a decision about migrating everything on Kimsufi or keeping my OVH account (FYI, I formerly bought cybermaohi.com and a OVH account 15ish years ago – which was discontinued when I was in French Polynesia from 2006 to 2008, though)

First and foremost, I’ll have to migrate this blog contents to another wordpress I will create from scratch today.
Lazy as I am, I didn’t foresee how efficient and huge this blog would be and I just hit the “create a blog in one click” button. I must admit this OVH feature is a real great opportunity for people who have no-to-very-few technical knowledge, but now I need to modify scripts and finely tune my blog so it can be a lot more awesome than it is right now. (done @ 2015-01-27-17h58m)

Secondly, I’ll start to play with my dedicated server and figure out what I would need to install ownCloud. Cool thing is that I will be able to host stuff from friends, like files with my perso cloud, but also websites!
I’m guessing I’ll need a LAMP first : its quite a tough task, especially for me who is not a shell guru bit nothing’s impossible when it comes to a challenge =)

Stay tuned!

 

 

Below, some pics of what I’ve done this early morning :

screenshot-www-kimsufi-com-2015-01-27-01-46-49

login test with Putty : w00t it r000xXXX!!!

putty

 

Comparatif international des modes de recrutement: le réseau tout puissant

Comment recrute-t-on à l’étranger ? Job boards, réseaux sociaux, cabinets de recrutement ou sim­ple bouche-à-oreille : quels sont les outils privilégiés par les employeurs américains, chinois, allemands ? Si les jeunes diplômés sont de plus en plus mobiles et prêts à franchir les frontières, la recherche d’un travail à l’étranger nécessite parfois de connaître certaines subtilités des relations candidat-employeur.

Aux Etats-Unis, une personne à la recherche d’un emploi n’hésitera pas à demander à l’un de ses contacts LinkedIn ou Facebook de la recommander pour un poste dans l’entreprise où il travaille. Le groupe Accenture a même créé une application permettant aux candidats externes de trouver, dans leur carnet d’adresses, les employés susceptibles de les aider à postuler. « Les recommandations sont à l’origine de 20 % à 30 % des recrutements aux Etats-Unis. Cela peut aller jusqu’à 50% pour des entreprises qui ont un programme performant, avec des outils technologiques et des gratifications adaptées », indique Gerry Crispin, fondateur du cabinet de conseil et d’analyse CareerXRoads.

L’enquête annuelle menée par ce dernier auprès de 250 grandes entreprises place les recommandations à la première place des sources de recrutement outre-Atlantique, juste devant les candidatures déposées sur les sites carrière des entreprises et les job boards comme Monster ou Careerbuilder. « Un candidat recommandé a quatorze fois plus de chances d’être recruté qu’un autre. On recommande moins facilement quelqu’un de sa famille qu’en Europe et plus facilement des gens que l’on a connus à l’université ou au cours de sa carrière, souligne Gerry Crispin. Les réseaux sociaux sont un outil formidable pour cela. »

2 % des recrutements

En 2013, 78 % des recruteurs américains déclaraient avoir déjà effectué un recrutement sur les réseaux sociaux, selon un sondage de la plate-forme de recrutement Jobvite, contre seulement 32 % en France, d’après une enquête de RégionsJob.

« Les réseaux sociaux donnent accès à de bons candidats mais il faut beaucoup de temps pour les identifier et il est souvent difficile de les faire postuler », souligne Stéphane Wajskop, PDG du cabinet de recrutement 2.0 Careers International. Les employeurs européens y consacrent en moyenne moins de temps que leurs homologues américains. D’après une étude du cabinet Stepstone portant sur sept pays (Autriche, Belgique, Danemark, France, Allemagne, Suède et Royaume-Uni), en 2013, seulement 2 % des recrutements se sont faits sur les réseaux sociaux.

Ces derniers arrivent loin derrière les job boards (21% des recrutements), les services publics de l’emploi ou même les offres d’emploi publiées dans la presse (10 %). Or le « recrutement social » correspond beaucoup plus aux attentes des jeunes diplômés, selon M. Wajskop. « Les nouvelles générations veulent aller au-delà du marketing traditionnel qui met en avant la marque, de belles images, des valeurs politiquement correctes. Avant de postuler pour un job, ils veulent pouvoir se faire une idée du travail et échanger avec leurs futurs collègues et managers. C’est particulièrement vrai pour ceux dont le profil est recherché comme les ingénieurs. »

Les outils varient entre les marchés sous tension et les autres

Si elles sont moins actives sur les réseaux sociaux que leurs homologues américaines, les entreprises européennes savent en revanche tirer parti de leur propre réseau. « Près d’un quart (24 %) des recrutements se fait via des sources internes : mobilité interne, candidatures reçues sur le site carrière de l’entreprise, cooptation et activation des réseaux du recruteur », affirme Stepstone. Mais l’usage de ces outils varie selon les pays.

« Il y a une grosse différence entre les marchés sous tension et les autres », souligne François de Boutray, PDG d’Aktor Interactive, une agence lyonnaise de communication en ressources humaines. En Allemagne, la pénurie d’ingénieurs dans un certain nombre de secteurs conduit les entreprises à être plus proactives sur les réseaux sociaux où elles espèrent dénicher la perle rare.

« Non seulement elles n’attendent pas que le poisson morde à une offre d’emploi mais elles vont souvent chercher des candidats à l’étranger, en Espagne, en Grèce ou même en France. Cependant, les entretiens restent très importants et passent à la loupe le parcours professionnel d’un candidat », dit M. de Boutray, qui ajoute que la Suisse aussi est à la recherche de talents : « Il n’y a pratiquement pas de marché caché, la plupart des emplois disponibles sont publiés via les job boards, explique-t-il. A l’inverse, l’Italie est beaucoup plus friande du recrutement relationnel. Ce qui empêche les personnes n’ayant pas de réseau sur place d’avoir accès à une grande partie des opportunités. »

Priorité aux job boards chez les émergents

Dans les pays émergents, l’accès aux emplois disponibles est également assez facile, d’après les spécialistes du recrutement. Cela s’explique, d’une part, par la difficulté pour les entreprises de trouver de nouveaux talents en interne, d’autre part par l’adoption récente des outils de diffusion d’offres d’emploi en ligne. « En Inde, les job boards surpassent largement les autres sources de recrutement avec un volume d’embauche supérieur de 50% aux cabinets de recrutement ou au bouche-à-oreille », affirme le groupe britannique de recrutement digital Evenbase.

En Chine, l’essor des réseaux sociaux professionnels, parmi lesquels le français Viadeo (20 millions de membres en Chine), promet de révolutionner le marché du recrutement. « Le réseautage est un aspect fondamental de la culture professionnelle chinoise. Par conséquent, les réseaux sociaux ont un gros potentiel », y compris en matière de recrutement, souligne Evenbase dans une étude intitulée « Digital Recruitment, The Hottest Markets in 2020 ».

Cette étude indique aussi qu’un quart des consultants en recrutement au Brésil sont âgés de moins de 21 ans et donc plus sensibles à l’usage des réseaux sociaux. « Le modèle des job boards, s’il est un peu moins en forme en Europe et dans les pays anglo-saxons, reste très utilisé dans les pays émergents », note toutefois François de Boutray. Sur tous les continents, il n’y a, selon lui, que deux outils indispensables pour trouver un emploi : le CV et la lettre de motivation.

(Semestriel Le Monde « Campus », novembre 2014).


{{ source }}

mobile device security

Security measures designed to protect the sensitive information stored on and transmitted by smartphones, tablets, laptops and other mobile devices. Mobile device security spans the gamut from user authentication measures and mobile security best practices for protecting against compromised data in the event of unauthorized access or accidental loss of the mobile device to combat malware, spyware and other mobile security threats that can expose a mobile device’s data to hackers.

Most mobile devices feature mobile operating systems with built-in mobile device security features, including iOS for iPhones and iPads, Google’s Android platform and Microsoft’s Windows Phone. Additionally, a variety of third-party mobile device security solutions are available for providing an additional layer of protection for mobile devices.


{{ source }}

10 Mobile Security Best Practices

Mobile security best practices are recommended guidelines and safeguards for protecting mobile devices and the sensitive data contained on them. Mobile security best practices apply to mobile devices used in business environments as well as for personal use, and the guidelines are largely the same in either scenario.

10 Mobile Security Best Practices

Some of the most common mobile security best practices include:

Raspberry Pi 2 Model B Introduced, Promises 6x Better Performance!

The Raspberry Pi Foundation is ready with a huge surprise as they are all set to release Raspberry Pi 2 Model B, which is a turbocharged version of the B+. The latest version has a new Broadcom BCM2836 900MHz quad-core system-on-chip with 1GB of RAM, which means it will work six times faster than the B+ model.

Foundation head Eben Upton spoke to The Register last week and he said the PC is ready to be used now. From the outward design, the Pi 2 cannot be much differentiated from the Pi 1 Model B+. The BCM2836 SoC is being under development for two years now, as Upton has revealed. He also said it’s quite similar to its predecessor, BCM2835 but it has four cores and little tweak which will boost the RAM performance.

D6D_pi_boardThe new BCM2836 contains four ARMv7 Cortex-A7 cores with 1GB RAM. Upton, who is a chip architect at Broadcom, said the latest SoC can run applications faster and even if a multi-threaded benchmark is not run on it, it still can deliver three times better performance on just a single core. With the faster running device, people can benefit a lot with image processing kind of stuff. Upton explained further people who want to do computer vision things like OpenCV, they can be better performed on this Pi 2.

56B_pi_board_03The Pi 2 will be sold at the same price like the B+, $35. Upton has further told that they have sold 60,000-70,000 fresh B+ models since its launch and they have been quite popular among industrial customers. The Pi 2 goes on sale from today, but as Upton thinks migration to the newer model will be slow as customers prefer to stick to the already existing models more.


{{ source }}

mobile security threats

Mobile security threats include both physical and software-based threats that can compromise the data on smartphones, tablets and similar mobile devices. Mobile security threats include everything from mobile forms of malware and spyware to the potential for unauthorized access to a device’s data, particularly in the case of accidental loss or theft of the device.

Mobile malware and spyware security threats can access a device’s private data without a user’s knowledge or consent and can also perform malicious actions without the user knowing, including transferring control of the device to a hacker, sending unsolicited messages to the device’s contacts, making expensive phone calls on smartphones, and more.

Physical Mobile Security Threats and Other Types of Threats

When it comes to physical mobile security threats, phones that lack passwords, screen locks or other forms of authentication are vulnerable to unauthorized access, which can compromise sensitive information stored on the mobile device. And if the device gets lost or stolen, hackers can bypass many forms of authentication in order to gain access to the device’s sensitive information.

Additional types of mobile security threats include applications that take advantage of vulnerabilities in the mobile operating system or a mobile application to gain access and/or control of the device, phishing scams, Web browser and network-based exploits, Wi-Fi packet sniffing for accessing mobile device data in transit, and more.


{{ source }}

mobile device management – MDM

MDM is short for mobile device management.

What is Mobile Device Management (MDM)?

Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization. Mobile device management software is often combined with additional security services and tools to create a complete mobile device and security Enterprise Mobility Management solution.

The Gartner research firm defines mobile device management as “a range of products and services that enables organizations to deploy and support corporate applications to mobile devices, such as smartphones and tablets, possibly for personal use — enforcing policies and maintaining the desired level of IT control across multiple platforms.”

Mobile Device Management Solutions

Most mobile device management solutions provide organizations with end-to-end security — meaning the mobile apps, network and data used by the mobile device (in addition to the mobile device itself) are managed by an organization’s IT department with a single mobile device software product.

Some enterprise MDM solutions combine mobile security and expense management in a single product. Depending on the vendor and what specific features it supports, you can typically expect mobile device management software to contain some or all of the following features: management and support of mobile applications, mobile policy management, inventory management, security management and telecom service management.

BYOD and Mobile Device Management

The widespread proliferation of consumerization of IT means more personal consumer computing devices — such as smartphones, laptops and tablets — are brought to the workplace by employees for use and connectivity on the corporate network. The phrase BYOD (bring your own device) has become widely adopted to refer to these employees. Today’s category of mobile device management software is one way that an organization can deliver secure mobile solutions to its BYOD workforce.

Recommended Reading: Webopedia’s BYOD, consumerization of IT and security software definitions.

MDM is also short for master data management.


consumerization of IT

Consumerization of IT (“consumerization”) is a phrase used to describe the cycle of information technology (IT) emerging in the consumer market, then spreading to business and government organizations, largely because employees are using the popular “consumer market” technologies and devices at home and then introducing them in the workplace.

Consumerization of IT Security Concerns

Consumerization of IT not only refers to the use of personal consumer electronics at work — like iPhones and tablet PCs — but also online services, including online data storage, Web-based email services (“web mail“), and social media or social networking sites like Facebook and Twitter.

Consumerization of IT is driven by employees who buy their own devices, use their own personal online service accounts, install their own applications and then connect to the corporate network with the device, often without the organization’s knowledge or approval.

For small business, corporate and government organizations, the biggest challenge for IT is that employees using unapproved technologies and devices at work is a network security risk, but even with that understanding is the knowledge that these devices will still come in to the workplace and be used by employees, even if corporate security policies are in place.

Companies Embrace Consumerization of IT

Many companies today have realized that by embracing the consumerization of IT, this will not only save money and increase business agility, but also improve employee productivity.

One popular initiative is called BYOD (“bring your own device”). This phrase has become widely adopted to refer to mobile workers bringing their own mobile devices, such as smartphones, laptops and PDAs, into the workplace for use and connectivity on the corporate network.

Instead of fighting employees who want to BYOD to work, many corporations allow employees to use their own mobile devices at work and implement a “BYOD policy” to help IT better manage these devices and ensure network security is not compromised.

Learn How to Embrace the Consumerization of IT in this CIO Update article.


security software

A general phrase used to describe any software that provides security for a computer or network. There are many types of security software including antivirus software, encryption software, firewall software and spyware removal software. Additionally, many operating systems also come preloaded with security software and tools. The two most common types of security software used for personal computer security are antivirus software (virus protection software) and antispyware software (spyware removal software).


sources :