Mac Security Camera Viewer Software for iDVR-PRO CCTV DVRs

The new IDVR Pro video surveillance DVRs areMac compatible.

Macintosh users can log in to view their security cameras remotely viaweb browser or via the Mac DVR viewer software.

In this video, I'll demonstrate the live remotecamera viewing capability from a Mac using the DVR viewer software that is included.

First thing I'm going to do is click the connect button in the upper left to connect the DVRthat's at our office.

This bottom window here, this DVR log, I can click this arrow to collapsethat out of view to get a bigger camera view and I'm also going to collapse the PTZ andthe DVR list so I get a full screen view of just cameras.

I'll switch to some of the other views just so you can see what the different grid viewslook like.

There's the 9 camera view.

Then I'll switch to the 16 camera view.

The softwarealso supports 25 cameras and 36 camera view on a single screen that requires multipleDVRs.

This is just 1 DVR, so there's only 16 cameras on it.

I'm going to bring the PTZ controls back out.

Camera 1 actually is a PTZ camera.

I'll justshow you real quick, the PTZ controls from the Mac software.

I'll zoom in on this carthat's parked in front of our warehouse.

It'll take a second for the focus to adjust.

Whenyou do a big zoom like that, it takes a second or 2.

There you go.

That's a clear view rightthere.

Then I'll zoom back out.

I'll bring the bottom DVR log window backup and then switch back to the 4 camera grid view.

When I want to disconnect, I just clickthe disconnect button in the upper left and then we disconnect from that DVR.

The outstanding support for Mac is just 1 of the reasons that I love the new IDVR Promodels.

These DVRs can also be accessed remotely from iPhone, iPad, and Android mobile devicesand of course, remote viewing is also available from Window PCs.

The user interface of IDVRPro is one of the most intuitive and easy to use interfaces that I've ever tested ona stand alone CCTV DVR.

If you'd like to learn more about the IDVRPro or would like to log into a demo unit at CCTV Camera Pro Warehouse using IOS, Android,Mac, or Windows please visit www.

Idvrpro.

Com.

Thank you for watching.

Source: Youtube

UW Bothell Master of Science in Cyber Security Engineering

[Michael]Cyber security is a part of our critical infrastructure.

It permeates everything, even if we’re notaware of it.

[Geethapriya]There is such a huge demand for cyber security professionals all over the country and allover the world.

There are all these critical infrastructures that's identified by the government,and every infrastructure – health care sector, industrial sector, banking sector, every energypower grid – every sector needs security professionals.

[Michael]This program fills a critical need in our nation for cyber security professionals, andI think that we’ve developed a curriculum here that is unique for the Pacific Northwestand quite likely for the entire West coast.

[Geethapriya]The curriculum here at UW Bothell in Cyber Security Engineering focuses on three differentthings: protection, detection and correction.

[Brent]The curriculum is really designed to cover a large number of aspects of cyber security.

There's elements of public policy and legal aspects that we cover.

There's a very strongtechnical component where we talk about, you know, how, we talk about network security,cryptography – all the really hard technical sides of it.

[Geethapriya]So the program here, Cyber Security Engineering, has a significant focus on what we call asecure development life cycle, so, or what's called as SDL, so which means from the timeyou start a product, whatever it is – software or any kind of development – from its initiationphase to the termination phase, there is security addressed at every step of it.

[Michael]Our master’s degree culminates in a capstone experience where students will be developing,going through the entire secure development life cycle and developing a real project.

And that project may be something that coordinates with faculty research or it may be somethingthat is a real project brought from industry for them to work on.

[Brent]And so, one of the advantages of doing this is you're putting something on your resumeor your CV that nobody else is going to have.

[Michael]UW Bothell CSS has a set of faculty who are at the forefront of the computing profession.

We have faculty who are from research labs, government labs, industry, who have been steepedin academia for a long period of time and are doing cutting-edge research in a widerange of fields –– including a wide range of fields that hinge on cyber security.

Alongwith our colleagues at the Seattle and Tacoma campuses, we’re working to develop the Universityof Washington to be the premier center for cyber security education in the American West.

Source: Youtube

Introducing Kaspersky Security for Mobile – 2014 – Mobile Device Management (MDM) Software

Transcript | Introducing Kaspersky Securityfor Mobile >>Introduction: Thank you for watching Kaspersky Lab’s video on Security for Mobile >>Text: Introducing Kaspersky Security for Mobile >>Tom Fitzpatrick: Mobile devices have transformedthe way we work and live.

>>Tom Fitzpatrick: And the average personnow uses three or more devices when they're out and about! >>Tom Fitzpatrick: Unfortunately, though,they have also extended the necessary security perimeter beyond your office and out intothe airport lounges and coffee shops of the world.

>>Tom Fitzpatrick: This, along with the BringYour Own Device trend, is creating new and complex security challenges for administratorslike you.

>>Tom Fitzpatrick: Case in point how manyof your employees consider your security polices when they're choosing a mobile devices? >>Tom Fitzpatrick: Probably not many! >>Tom Fitzpatrick: When employees are using mobile devices the business of course sees increased productivity, cost-efficiency andflexibility.

>>Tom Fitzpatrick: But you see something else another attack vector another opportunity for data loss and another bunch of devicesto manage.

>>Tom Fitzpatrick: Suddenly BYOD and mobility has become your problem.

>>Tom Fitzpatrick: Kaspersky Security forMobile combines a mobile security agent with mobile device management capabilities.

>>Tom Fitzpatrick: It gives you increasedvisibility and deeper security for mobile endpoints without the complexity of separate solutions.

>>Tom Fitzpatrick: The key features include support for both tablets and smartphones MDM for the administrator including over the airprovisioning and agent-based mobile security for the device.

>>Text: Mobile device management (MDM) >>Tom Fitzpatrick: MDM allows administrators to securely configure and deploy smartphones and tablets in a similar way to PCs, laptopsand other IT assets.

>>Tom Fitzpatrick: You can extend your wired security strategy and policies to your mobile devices, where ever they happen to be.

>>Tom Fitzpatrick: As the administrator, using our integrated console you can automate management and control tasks such as device configuration software updates and backup and restore.

>>Tom Fitzpatrick: You can define policiesin a granular, flexible way, right down to the device itself.

>>Tom Fitzpatrick: For example, jailbrokenor otherwise compromised devices can be blocked from your network, remotely locked, or even wiped.

>>Tom Fitzpatrick: You'll also receive a notification whenever one of these devices tries to connect, so you can track down rogue devices.

>>Tom Fitzpatrick: And with over the air provisioning, you can configure and control devices remotely, simply by sending a text message or an email.

>>Tom Fitzpatrick: From there, users are directed to a captive portal where your applications and your preconfigured settings are downloaded.

>>Tom Fitzpatrick: This means you don't have to physically handle the device to provision and control it.

>>Text: BYOD made easy >>Tom Fitzpatrick: Because mobility and BYOD can create a gaping hole in your security posture, you should apply tough restrictions on all devices including those that are employee owned.

>>Tom Fitzpatrick: One such technology that you should plan on implementing is Containerization.

>>Tom Fitzpatrick: It's a simple solutionthat completely separates personal and business content on a device.

>>Tom Fitzpatrick: If the phone gets lost,the administrator can enable a remote lock or delete the business content.

>>Tom Fitzpatrick: This is important if theemployee leaves the company and wishes to take their own device with them.

>>Tom Fitzpatrick: For additional security,Kaspersky makes it easy to enable the encryption of sensitive data within the container, which reduces the impact of a lost or stolen device.

>>Text: Kaspersky Lab's Mobile Device Managementand Mobile security >>Tom Fitzpatrick: Because MDM is a managed component of the Kaspersky Security Center, you won't need additional training to beginsecuring your mobile deployments.

>>Tom Fitzpatrick: And because our award-winning anti-malware technology sits at the core you can rest assured that your devices are protected from an ever-growing number of mobile threats.

>>Tom Fitzpatrick: There are plenty of otherfeatures that Kaspersky Security for Mobile enables, such as GPS find, forced passwords, and SIM watch, which will notify you if a SIM card has been changed.

>>Tom Fitzpatrick: By simplifying and automating the secure configuration of multiple devices you're not only reduce your administrativeburden, but you're also supporting better mobile security practices.

>>Text: Kaspersky >>Text: Get started now: Free 30 Day Trial>>Text: Register at kas.

Pr/business-trial >>Text: Join the conversation #securebiz.

Source: Youtube

Networking Security Intro – Georgia Tech – Software Defined Networking

To see how see how a DNS cache poisoning attack works, consider a network where a stub resolver issues a query to its recursive resolver, and the recursive resolver in turn sends that A record query to the start of authority for that domain.

Now, in an ideal world, the authoritative name server for that domain Would reply with the correct IP address.

If an attacker guesses that a recursive resolver might eventually need to issue a query for say, www.

Google.

Com.

The attacker can simply reply with multiple, specially crafted.

Replies each with different id's.

Although this query has some query id, the attacker doesn't need to see that query because the attacker can simply flood the recursive resolver with a bunch of bogus replies and one of them, in this case the response with id3 will match.

As long as this bogus response reaches the recursive resolver before the legitimate response does, the recursive resolver will accept this bogus message.

And worse, it caches the bogus message.

And DNS, unfortunately, has no way to expunge.

A message once it has been cached.

So now this reclusive resolver will continue to send bogus A record responses for any query for this particular domain name until that entry expires from the cache.

Now there's several defenses against DNS cache poisoning, and we've already seen one, which is the query ID.

But of course, the query ID can be guessed.

The next defense is to randomize the ID so rather than having a resolver, end queries where the ID's increment in sequence, the resolver can pick a random ID.

This makes the ID tougher to guess, but still, the query ID is only 16 bits, which still makes it possible for an attacker to flood the recursive resolver with many possible responses.

And, it's likely that, with relatively few responses, One of these bogus responses will match the ID for the real query.

Due to the birthday paradox, the success probability for achieving a collision between the query ID of the query ,and of the response actually only requires sending hundreds of replies, not a complete 32,000.

Due to the birthday paradox, The probability that such an attack will succeed, using only a few hundreds of replies, is relatively close to one.

The attacker does not need to send replies with all two to the 16th possible IDs.

The success of a DNS cache poisoning attack not only depends on the ability to reply to a query with a correct matching ID, but it also depends on winning this race.

That is, the attacker must reply to that query before the legitimate authoritative name server replies.

If the bad guy, or the attacker, loses the race, then the attacker has to wait for that correct cached entry to expire, before trying again, however the attacker can generate his own DNS query.

For example, he could query one.

Google.

Com, two.

Google.

Com and so forth.

Each one of these bogus queries will generate a new race.

And eventually the attacker will win one of these races for an A record query.

But who cares? Nobody necessarily cares to own one.

Google.

Com, or google.

Com.

The attacker really wants to own the entire zone.

Well the trick here is that instead of just simply responding with A records in the bogus replies.

The attacker can also respond with NS records for the entire zone of google.

Com.

So by creating one of these races, using an A record query, and then responding not only with the A record response, but also with the authoritative of the NS record,for the entire zone.

The attacker can in fact own the entire zone.

This idea of generating extreme of A record queries to generate a bunch of races and then stuffing the A record responses for each of these with a bogus authoritative NS record for the entire zone.

Is what's called the Kaminsky Attack, after Dan Kaminsky, who discovered the attack.

The defenses of picking a query ID and randomizing the ID, help, but remember the randomization is only 16 bits, so let's think about other possible defenses.

Source: Youtube