Feed aggregator

IBM Power Systems SR-IOV: Technical Overview and Introduction

IBM News Feed - Tue, 07/29/2014 - 13:30
Redpaper, published: Tue, 29 Jul 2014

- See how SR-IOV minimizes contention with CPU and memory resources
- Explore powerful adapter-based virtualization for logical partitions
- Learn about industry standard PCI specification

This IBM® Redpaper™ publication describes the adapter-based virtualization capabilities that are being deployed in high-end IBM POWER7+™ processor-based servers.

IBM Power Systems S814 and S824 Technical Overview and Introduction

IBM News Feed - Tue, 07/22/2014 - 13:30
Draft Redpaper, last updated: Tue, 22 Jul 2014

- Outstanding performance based on POWER8 processor technology
- 4U scale-out desktop and rack-mount server
- Improved reliability, availability, and serviceability features

This IBM® Redpaper™ publication is a comprehensive guide covering the IBM Power System S814 (8286-41A) and IBM Power System S824 (8286-42A) servers that support IBM AIX®, IBM i, and Linux operating systems.

DS8000 Thin Provisioning

IBM News Feed - Thu, 07/03/2014 - 13:30
Redpaper, published: Thu, 3 Jul 2014

- Avoid allocating unused capacity
- Read about new ESE repository capability and new controls
- Understand applications and OS implications

Ever-increasing storage demands have a negative impact on an organization's IT budget and complicate the overall storage infrastructure and management.

Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between

IBM News Feed - Fri, 06/27/2014 - 13:30
Redbook, published: Fri, 27 Jun 2014

- Learn about preferred practices for modern development
- Use modern tools for a modern world
- Incorporate data-centric programming for success

This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization.

TA14-150A: GameOver Zeus P2P Malware

US Cert latest breaches - Mon, 06/02/2014 - 12:15
Original release date: June 02, 2014 | Last revised: June 06, 2014
Systems Affected
  • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
  • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
Overview

GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.

Description

GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. [2] Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks. 

Prior variants of the Zeus malware utilized a centralized command and control (C2) botnet infrastructure to execute commands. Centralized C2 servers are routinely tracked and blocked by the security community. [1] GOZ, however, utilizes a P2P network of infected hosts to communicate and distribute data, and employs encryption to evade detection. These peers act as a massive proxy network that is used to propagate binary updates, distribute configuration files, and to send stolen data. [3] Without a single point of failure, the resiliency of GOZ’s P2P infrastructure makes takedown efforts more difficult. [1]

Impact

A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users' credentials for online services, including banking services.

Solution

Users are recommended to take the following actions to remediate GOZ infections:

  • Use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
  • Change your passwords - Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
  • Keep your operating system and application software up-to-date - Install software patches so that attackers can't take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
  • Use anti-malware tools - Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of GOZ from your system.
F-Secure       

http://www.f-secure.com/en/web/home_global/online-scanner (Windows Vista, 7 and 8) 

http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142 (Windows XP)

Heimdal

http://goz.heimdalsecurity.com/ (Microsoft Windows XP, Vista, 7, 8 and 8.1)   

McAfee

www.mcafee.com/stinger (Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7 and 8)

Microsoft

http://www.microsoft.com/security/scanner/en-us/default.aspx (Windows 8.1, Windows 8, Windows 7, Windows Vista, and Windows XP) 

Sophos

http://www.sophos.com/VirusRemoval (Windows XP (SP2) and above) 

Symantec

http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network (Windows XP, Windows Vista and Windows 7)

Trend Micro

http://www.trendmicro.com/threatdetector (Windows XP, Windows Vista, Windows 7, Windows 8/8.1, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2)

The above are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.

 

References Revision History
  • Initial Publication - June 2, 2014
  • Added McAfee - June 6, 2014

This product is provided subject to this Notification and this Privacy & Use policy.


Live Partition Mobility Preparation Checklist

IBM News Feed - Sat, 05/24/2014 - 13:30
Web Doc, published: Sat, 24 May 2014

When attempting to do Live Partition Mobility (LPM) in your environment, use the Live Partition Mobility Preparation Checklist.

Live Partition Mobility Setup Checklist

IBM News Feed - Sat, 05/24/2014 - 13:30
Web Doc, published: Sat, 24 May 2014

When setting up Live Partition Mobility (LPM) for the first time in your environment, use the Live Partition Mobility Setup Checklist.

IBM PowerVM Enhancements What is New in VIOS 2.2.3

IBM News Feed - Thu, 05/22/2014 - 13:30
Redbook, published: Thu, 22 May 2014

- PowerVP and mobile CoD activations explained
- Shared Storage Pool enhancements explained
- Power Integrated Facility for Linux described

IBM® Power Systems™ servers coupled with IBM PowerVM® technology are designed to help clients build a dynamic infrastructure, helping to reduce costs, manage risk, and improve service levels.

IBM Power Systems SR-IOV: Technical Overview and Introduction

IBM News Feed - Tue, 05/20/2014 - 13:30
Draft Redpaper, last updated: Tue, 20 May 2014

- See how SR-IOV minimizes contention with CPU and memory resources
- Explore powerful adapter-based virtualization for logical partitions
- Learn about industry standard PCI specificationt

This IBM® Redpaper™ publication describes the adapter-based virtualization capabilities that are being deployed in high-end IBM POWER7+™ processor-based servers.

IBM i and IBM Storwize Family: A Practical Guide to Usage Scenarios

IBM News Feed - Tue, 04/22/2014 - 13:30
Redbook, published: Tue, 22 Apr 2014

- Explaining VIOS from an IBM i perspective
- Using PowerHA together with IBM Storwize Familyy
- Configuring BRMS in a high available solution

The use of external storage and the benefits of virtualization became a topic of discussion in the IBM® i area during the last several years.

DS8000 Thin Provisioning

IBM News Feed - Wed, 04/16/2014 - 13:30
Draft Redpaper, last updated: Wed, 16 Apr 2014

- Avoid allocating unused capacity
- Read about new ESE repository capability and new controls
- Understand applications and OS implications

Ever-increasing storage demands have a negative impact on an organization's IT budget and complicate the overall storage infrastructure and management.

IBM PowerVC Version 1.2 Introduction and Configuration

IBM News Feed - Wed, 04/16/2014 - 13:30
Draft Redbook, last updated: Wed, 16 Apr 2014

- Just 20 minutes to get a virtual machine up and running
- Deep integration with PowerVM virtualization technologies
- Intelligent virtual machine deployment

IBM PowerVC is an advanced enterprise virtualization management offering for IBM Power Systems based on the OpenStack technology.

Syndicate content