Networking

95K

Solutions

68K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

Today is the last day to enroll in the free course of the month! Premium members, Team account members, and Qualified Experts can enroll in the CompTIA A+ course as part of their membership. Once you enroll you have 30 days to complete the course. Take advantage of this month's course today!

7
LVL 29

Expert Comment

by:Andrew Leniart
Not meaning to be pedantic, but you actually get 31 days to complete the course :)  I've just gone through the first section myself and can highly recommend this course. The instructor and content is excellent. Very informative.
4
LVL 17

Expert Comment

by:Spike99
Cool, I'll try it. Thanks for the head's up.
1
"IT Certifications are a concrete representation of continual learning on the part of the candidate." If you're looking to get certified, now is the perfect time. Premium and team accounts can enroll in the CompTIA A+ course for free during the month of May. Click here to enroll!

https://www.experts-exchange.com/articles/29383/Should-I-pursue-an-IT-certification.html
4
We are invested in giving our community the opportunity to continue their education! May's Course of the Month is available for 13 more days. Premium Members, Team Account members, and Qualified Experts can enroll the CompTIA A+ course until May 31st for free and have 30 days to complete the course. Get started today!

https://www.experts-exchange.com/courses/1001/CompTIA-A-220-901-220-902.html?cid=Social_OnsiteEE_PostCourseOfTheMonth_May_19
7
The Federal Communications Commission voted 2-1 today to start the process of eliminating net neutrality rules and the classification of home and mobile Internet service providers as common carriers under Title II of the Communications Act.

https://arstechnica.com/tech-policy/2017/05/net-neutrality-goes-down-in-flames-as-fcc-votes-to-kill-title-ii-rules/
3
LVL 21

Expert Comment

by:Lucas Bishop
net neutrality office space
1
Using 2003 or XP?  Something older?  I have little sympathy for you.  Things get old.  Software is constantly evolving and those creating it utilize new features and capabilities that (in theory) bring you more capabilities and ease of use.  It's impossible for any software developer to support everything they've ever created indefinitely.  Their abilities to continue innovating would grind to a halt.  Even for the largest of companies, like Microsoft.  They MUST cut off support at some point.  Microsoft has, it would seem, set this standard to 10 years.  Given how long that is and the advancements that can be done in 10 years, in my opinion, that is reasonable.  XP and Server 2003 are now 14+ years old.  WELL BEYOND their support life.  

Now I'm confident Microsoft doesn't actively seek to "break" their newer products ability to connect to the older, now unsupported ones, but I would say it's reasonable to EXPECT they no longer test and see if a Windows 10 computer can connect to a 2003 domain.  They MAY, at points, decide to remove functionality from 10 but I'm confident they do so to improve security.  And if that aspect that is removed happens to be the "main" way something was done in an older version that is no longer supported? Well, they warned you!

Ten years is a reasonable time frame.  If you're using what is now antiquated technology, I have little sympathy.

"Fine Lee, but what about me - I use a program that controls a device that requires it run on …
3
LVL 62

Expert Comment

by:Jim Dettman (EE MVE)
I suppose in the end that what it boils down to is whether you consider safety a function of software or not.  I would say not.  

 But if you do, the problem is in measuring how safe it is and I don't think you ever can.   You can throw a battery of tests at it, but what's safe today may not be safe tomorrow.

 On the flip side, upgrading is no guarantee of being safe either.   To use your car analogy, if my new vehicle uses a Takata air big, then I'm not very safe am I despite that I now have an air bag.  

 So do I use "safety" as a measure in the decision to upgrade or not?   I don't see how you can.

 One could even make the argument in general that by upgrading into a situation with more complexity then what I currently have, I will probably be less safe than I am now (more complexity = more potential holes).    So in regards to safety, not upgrading may be a better choice.    Sometimes, the Devil you know is better than the one you don't.  

 To wrap this up,  I don't think there are any simple answers here of course, but I don't hold it against people for not wanting to upgrade.  I also don't think software vendors should sunset support for products they release.    If someone calls me on something I wrote 15 years ago, I'm not going to say "sorry, can't support that" just because it's old and they decided to keep it.
0
LVL 100

Author Comment

by:Lee W, MVP
Funny, as I was formulating my response to you yesterday, I was going to include a reference to the Takata airbag thing - any time you add new capabilities, you get more complicated and though overall safety can improve, it can also, in some circumstances, become less safe.  I believe there is a net benefit (both with airbags and with new software's increasing complexity).

I guess it depends on how you value things.  To me, safety (security) is extremely important.  And I think most people should feel that way.  As such, people need to take responsibility for their continued existence and accept how technology generally (and technology companies) generally work and the economics attached to it.
0
What have we learnt today about the WannaCry ransomware attack, what you should do.

1. do not block the URL KILLSWITCH - This will stop the spread in your network.

2. Make sure your Anti-Virus Definitions are up to date. 30% of Vendors had definitions updated by end of play Friday 15th May. This will stop trojan exeuting.

3. Patch Risky OS first e.g. Windows 2003 and XP, there are PATCHES available! - This will stop the payload exploit getting into the server.

4. Patch Windows 7, 8, 10, 2008, 2012 and 2016.  Check for a Security Rollup since March 2017.
5
4
To submit complaints about the FCC getting rid of Net Neutrality, you can go here, then click "+Express" and fill out the form. (Thanks for sharing, Doug.)

http://www.gofccyourself.com/
4
To submit complaints about the FCC getting rid of Net Neutrality, you can go here, then click "+Express" and fill out the form.

http://www.gofccyourself.com/
4
LVL 19

Expert Comment

by:Kyle Santos
Cool thank you
1
LVL 5

Expert Comment

by:Juana Villa
Done :D
1
10
Quickbooks Scam

I had a client ask about using Quickbooks in multiple locations. My suggestion is to use the web version for eas of use and you get at least 3 user accounts vs having to buy multiple licensees for the desktop version.  

Just as I walked into the office I was told Quickbooks had already called in and was remoting in and working on it.  I asked my client which version and he was not sure.  I went to the computer and saw a big string of pings going through the command prompt.  Suspiciously, I  Jumped on the Teamviewer chat and asked if they are migrating to the web version or using the desktop. The "tech" asked if he could call me directly.  His voice was very hurried with a heavy accent and said if we went to the web version, payroll wouldn't work.  I know that is not correct and this didn't feel right and I asked if I could call him right back at the same time I ended the TV session.

Called into Intuit to verify and at the same time saw two payments from some electronic payment company that was not Intuit. One for $449.99 the other $999.99.  Both were for "Tech support" and not an actual product.  

I explained to my client he had been scammed.  In his email, I saw there was a password recovery. I asked if he gave out his password to the "tech".  Of course he did.  I had him change his password for his email account and quickbooks.  Next call was to the credit card company.  Right away there is a recording, "It looks like there are fraudulent …
3
LVL 7

Expert Comment

by:Brian Matis
Ugh... That sucks. Glad you were able to help them catch the problem quick. Nice work and thanks for sharing the head's up about this kind of thing.
0

Expert Comment

by:Daniella Barion
Thanks for sharing.  Unfortunately, these fraud events happen more than we can imagine.  We need to be always on alert.
1
Well now... That's an interesting security issue... These inmates could potentially have a future in IT work though!
3

Networking

95K

Solutions

68K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.