<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Telecom, Security and P2P</title>
	<atom:link href="https://hi2005.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://hi2005.wordpress.com</link>
	<description>News and comments at Telecom, Security and P2P, bridging china security to the world!</description>
	<lastBuildDate>Sun, 22 Jan 2017 04:59:35 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">492</site><cloud domain='hi2005.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://s2.wp.com/i/webclip.png</url>
		<title>Telecom, Security and P2P</title>
		<link>https://hi2005.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://hi2005.wordpress.com/osd.xml" title="Telecom, Security and P2P" />
	<atom:link rel='hub' href='https://hi2005.wordpress.com/?pushpress=hub'/>
	<item>
		<title>10 YEARS, HOW TIME FLYING!</title>
		<link>https://hi2005.wordpress.com/2017/01/22/10-years-how-time-flying/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Sun, 22 Jan 2017 04:58:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Misc]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/?p=267</guid>

					<description><![CDATA[10 years! A lot of things happened, a lot of things past. Thank you very much, WordPress and WordPress.com!]]></description>
										<content:encoded><![CDATA[<p>10 years! A lot of things happened, a lot of things past.</p>
<p>Thank you very much, WordPress and WordPress.com!</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">267</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>My new blog at sbin.cn</title>
		<link>https://hi2005.wordpress.com/2007/01/30/my-new-blog-at-sbincn/</link>
					<comments>https://hi2005.wordpress.com/2007/01/30/my-new-blog-at-sbincn/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Mon, 29 Jan 2007 22:19:29 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[BS7799]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[ITIL]]></category>
		<category><![CDATA[Misc]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[P2P]]></category>
		<category><![CDATA[Rails]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[SOX]]></category>
		<category><![CDATA[SVM]]></category>
		<category><![CDATA[Telecom]]></category>
		<category><![CDATA[UTM]]></category>
		<category><![CDATA[VoIP]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2007/01/30/my-new-blog-at-sbincn/</guid>

					<description><![CDATA[Due to the publicly known reasons, this blog at wordpress.com has been not accessible at China for a long time till last Spring festival (Feb.2006). It&#8217;s very difficult for me to update and manage this blog, while most of my readers from mainland can not read it since then. So I decide move it to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Due to the publicly known reasons, this blog at wordpress.com has been not accessible at China for a long time till last Spring festival (Feb.2006). It&#8217;s very difficult for me to update and manage this blog, while most of my readers from mainland can not read it since then. So I decide move it to a new site with good performance.</p>
<ul>
<li>New site URL:  <a href="http://sbin.cn/blog" title="Telecom,Security and P2P">Http://sbin.cn/blog </a></li>
<li>New site RSS:  <a href="http://feeds.feedburner.com/sbindotcn" title="my feed">Http://feeds.feedburner.com/sbindotcn</a></li>
</ul>
<p>Hope you guys can change your bookmark and RSS feeds. I am sorry for the unconvenience for this move. Thanks for the great pleasure WP community gave me.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2007/01/30/my-new-blog-at-sbincn/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">265</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>Security 2.0, Security 1.0 SP2 &#8230; Web 3.0 &#8230;</title>
		<link>https://hi2005.wordpress.com/2006/11/17/security-20-security-10-sp2-web-30/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Fri, 17 Nov 2006 05:18:46 +0000</pubDate>
				<category><![CDATA[Comments]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/17/security-20-security-10-sp2-web-30/</guid>

					<description><![CDATA[Feld expressed his dislike to those fashion words in his famous blog:  I’m personally going to boycott the phrase “Web 3.0” since “Web 2.0” makes me tired enough.  There have been some great quips going around the system about this, including Gordon Weakliem’s “I haven’t even gotten around to upgrading to Web 1.0 Service Pack [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Feld expressed his dislike to those fashion words in his <a href="http://www.feld.com/blog/archives/002058.html" title="Web3.0">famous blog</a>:</p>
<blockquote><p> I’m personally going to boycott the phrase “<em>Web 3.0</em>” since “<em>Web 2.0</em>” makes me tired enough.  There have been some great quips going around the system about this, including Gordon Weakliem’s “I haven’t even gotten around to upgrading to <em>Web 1.0 Service Pack 2</em>”, Michael Parekh’s “<em>Web 2007 versions</em>”, Peter Rip’s “<em>Web 2.0 + 1</em>”, and Nick Bradbury’s “<em>Web 3.0 Does Not Validate</em>.”  While I recognize the inevitability of the newest increment of the Web x.0 label, I don’t have to like it.</p></blockquote>
<p>My points is that they are interesting stuff. Some guys like to use fashion words to attract eyeballs. As long as they can illustrate the essential points, just let it be.</p>
<p>I use Security 2.0 to describe the new trends in network security area, e.g. internal control, identity and access management, and etc. That differentiate themselves from the original anti-virus plus firewall plus IDS. No matter what you call them, they just exist there. right?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">264</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>SANS Top 20 Internet Security Attack Target List for 2006 includes VoIP for the first time</title>
		<link>https://hi2005.wordpress.com/2006/11/16/sans-top-20-internet-security-attack-target-list-for-2006-includes-voip-for-the-first-time/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Thu, 16 Nov 2006 04:34:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[SVM]]></category>
		<category><![CDATA[Telecom]]></category>
		<category><![CDATA[VoIP]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/16/sans-top-20-internet-security-attack-target-list-for-2006-includes-voip-for-the-first-time/</guid>

					<description><![CDATA[Today SANS announced the 2006 version of their annual “Top-20 Internet Security Attack Targets” and for the first time, VoIP is included as one of the threats. It was listed as N1:  N1.1 Description VoIP technology has seen rapid adoption during the past year. At the same time, there has been an increase in security [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today SANS <a href="http://www.sans.org/top20/2006/press_release.pdf">announced the 2006 version</a> of their annual “<a href="http://www.sans.org/top20/">Top-20 Internet Security Attack Targets</a>” and for the first time, VoIP is included as one of the threats. It was listed as <a href="http://www.sans.org/top20/#n1">N1</a>:</p>
<blockquote><p> N1.1 Description</p>
<p>VoIP technology has seen rapid adoption during the past year. At the same time, there has been an increase in security scrutiny of typical components of a VoIP network such as the call proxy and media servers and the VoIP phones themselves. Various products such as Cisco Unified Call Manager , Asterisk and a number of VoIP phones from various vendors have been found to contain vulnerabilities that can either lead to a crash or a complete control over the vulnerable server/device. By gaining a control over the VoIP server and phones, an attacker could carry out VoIP phishing scams, eavesdropping, toll fraud or denial-of-service attacks.</p>
<p>Since many VoIP servers especially the ones at VoIP service providers are an interface between SS7 (traditional phone signaling) and IP networks, an attacker capable of compromising a vulnerable VoIP server could even potentially manipulate the SS7 signaling interconnection to disrupt services on the Public Switched Telephone Network (PSTN).</p></blockquote>
<p>See more comments and report at <a href="http://voipsa.org/blog/2006/11/15/sans-top-20-internet-security-attack-target-list-for-2006-includes-voip-for-the-first-time/">VoIPsa blog</a>.</p>
<blockquote></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">262</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>China Mobile say no to 802.11i</title>
		<link>https://hi2005.wordpress.com/2006/11/16/china-mobile-say-no-to-80211i/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Thu, 16 Nov 2006 04:20:19 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SVM]]></category>
		<category><![CDATA[Telecom]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/16/china-mobile-say-no-to-80211i/</guid>

					<description><![CDATA[China has adopted WAPI as its national wireless access standard in 2003, instead of  802.11i, which lead to furious debate at that time.  3 years passed. According to a report by Xinhua agency, the largest mobile operator in China &#8211; China Mobile has conducted a security testing to 802.11i and found security vulnerabilities in it. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>China has adopted WAPI as its national wireless access standard in 2003, instead of  802.11i, which lead to furious debate at that time.  3 years passed. According to a report by Xinhua agency, the largest mobile operator in China &#8211; China Mobile has conducted a security testing to 802.11i and found security vulnerabilities in it.</p>
<blockquote><p>Test results to date show that the current WLAN technology 802.11i has big security loopholes and is easy to attack, said Ma Benteng, senior engineer with China Mobile.</p>
<p>The Beijing Olympics will be the first to use WLAN in the Games&#8217; history. Journalists would be major users of the networks.</p>
<p>At a meeting held by China Mobile recently, media users were skeptical about the safety of the current WLAN technology.</p>
<p>Results from more than a month of tests carried out by the national safety research center on information project show that 802.11i has serious technological defects and safety risks, said Ma, who is in charge of mobile planning for the 2008 Olympics.</p>
<p>Researchers said that articles on the technological defects of 802.11i were freely available on the internet, as well as tools for exploiting the defects. The internet also provides methods for decoding the technology.</p>
<p>Anybody who can connect to the Internet could download the software and steal private information from others, said Ma.</p></blockquote>
<p>See the <a href="http://en.chinabroadcast.cn/3130/2006/11/09/481@160917.htm" title="802.11i is not safe" target="_blank">original report&#8230;</a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">261</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>A whitepaper on audit of SSH and RDP</title>
		<link>https://hi2005.wordpress.com/2006/11/14/a-whitepaper-on-audit-of-ssh-and-rdp/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Tue, 14 Nov 2006 02:34:09 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[BS7799]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SOX]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/14/a-whitepaper-on-audit-of-ssh-and-rdp/</guid>

					<description><![CDATA[A startup at China, BMST, is exploring a new field in security audit by rolling out their ground-breaking product &#8211; Session-Auditor.  That&#8217;s good pitch in the hot compliance trends. Compared against those tradional host based audit systems and SPAN-sniffer like audit systems, SA can audit those encrypted protocols transparently, without necessity to install expensive agents [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://hi2005.wordpress.com/wp-content/uploads/2006/11/bm_logo_final_middle.jpg" title="BMST SA"><img src="https://hi2005.wordpress.com/wp-content/uploads/2006/11/bm_logo_final_middle.jpg?w=450" alt="BMST SA" align="right" border="0" hspace="5" vspace="5" /></a>A startup at China, BMST, is exploring a new field in security audit by rolling out their <a href="https://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/" title="Audit SSH and RDP" target="_blank">ground-breaking product &#8211; Session-Auditor</a>.  That&#8217;s good pitch in the hot compliance trends. Compared against those tradional host based audit systems and SPAN-sniffer like audit systems, SA can audit those encrypted protocols transparently, without necessity to install expensive agents at hosts. Another plus of this product is its built-in access control capability. That means you don&#8217;t need intranet firewalls to protect your mission critical servers from operation and administration terminals. Just use Session-Auditor.</p>
<p>More technical information are available at the new whitepaper at their website. <a href="http://www.bmst.net/wp/bmst_sa_wp_en.pdf" title="bmst sa wp" target="_blank">Click here to download</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">259</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/11/bm_logo_final_middle.jpg" medium="image">
			<media:title type="html">BMST SA</media:title>
		</media:content>
	</item>
		<item>
		<title>It&#8217;s Cool. Go to Yahoo Mail Beta</title>
		<link>https://hi2005.wordpress.com/2006/11/13/its-cool-go-to-yahoo-mail-beta/</link>
					<comments>https://hi2005.wordpress.com/2006/11/13/its-cool-go-to-yahoo-mail-beta/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Mon, 13 Nov 2006 09:34:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Misc]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/13/its-cool-go-to-yahoo-mail-beta/</guid>

					<description><![CDATA[I have a Yahoo Mail account to receive some mailing lists. For a long time I didnot login to check those messages. Today I found it changed outlook greatly, giving me a big surprise. Yahoo Mail Beta, very cool interface. See the below screenshot. I had very different experience with Live Mail beta from Microsoft, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I have a Yahoo Mail account to receive some mailing lists. For a long time I didnot login to check those messages. Today I found it changed outlook greatly, giving me a big surprise. Yahoo Mail Beta, very cool interface. See the below screenshot.</p>
<p><a href="https://hi2005.wordpress.com/wp-content/uploads/2006/11/yahoo_mail_beta.png" title="Yahoo Mail Beta"><img src="https://hi2005.wordpress.com/wp-content/uploads/2006/11/yahoo_mail_beta.thumbnail.png?w=450" alt="Yahoo Mail Beta" /></a></p>
<p>I had very different experience with Live Mail beta from Microsoft, slow response, bad interaction, &#8230; I felt very upset with it and changed back to the previous hotmail interface. Now go to Yahoo Mail beta. It&#8217;s cool.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/11/13/its-cool-go-to-yahoo-mail-beta/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">258</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/11/yahoo_mail_beta.thumbnail.png" medium="image">
			<media:title type="html">Yahoo Mail Beta</media:title>
		</media:content>
	</item>
		<item>
		<title>The pain of patch management</title>
		<link>https://hi2005.wordpress.com/2006/11/08/the-pain-of-patch-management/</link>
					<comments>https://hi2005.wordpress.com/2006/11/08/the-pain-of-patch-management/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Wed, 08 Nov 2006 05:53:18 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[BS7799]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[SVM]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/11/08/the-pain-of-patch-management/</guid>

					<description><![CDATA[There are always more and more vulnerabilities and patches in our IT life. It has become one part of our job. Isn&#8217;t it? What&#8217;s the biggest pain in your mind? If you said &#8220;why patch management? just go &#8216;windows update'&#8221;, then you must be a individual computer user, not an administrator. 😉 The hardest is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There are always more and more vulnerabilities and patches in our IT life. It has become one part of our job. Isn&#8217;t it?  What&#8217;s the biggest pain in your mind?</p>
<p>If you said &#8220;why patch management? just go &#8216;windows update'&#8221;, then you must be a individual computer user, not an administrator. <img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>The hardest is to balance the risk of hacking due to not to patch and   system unstability or even crash due to new patch.  According to common practice, security manager should have a process in place to test patches, with the help from system and application managers.  The balance point is decided together. [<a href="http://blog.zhaol.cn/Article_46689" title="Chinese comment" target="_blank">My comment in Chinese</a>]. See the below report by  Roger&#8230;<span id="more-256"></span></p>
<p><a href="http://www.networksasia.net/ena/article/articleDetail.jsp?id=382478" rel="nofollow">http://www.networksasia.net/ena/article/articleDetail.jsp?id=382478</a><br />
To patch or not to patch<br />
Oct 30, 2006<br />
By Roger A. Grimes, InfoWorld (US) &#8211; Issue #44</p>
<p>Microsoft Internet Explorer and Microsoft Office have been under a zero-day attack barrage for the last few months. In what is becoming a familiar cycle, Microsoft releases its new monthly patches on &#8220;Patch Tuesday,&#8221; only to have a handful of new zero-day public exploits announced a few days before or after. The hackers want to maximize the time their zero-day exploits exist in the wild before Microsoft has a patch for it.</p>
<p>Microsoft, using customer feedback, automated tools, and its participation in an anti-virus consortium, measures how widespread each new zero-day attack is. If the attack is truly widespread, Microsoft rushes the normal patch cycle and delivers the fix before the next Patch Tuesday release. If the exploitation is not widespread, which has often been the case, Microsoft waits until the normal Patch Tuesday cycle. Taking its normal time to create and test a patch normally means more stable patches (it&#8217;s even been a tough road there for Microsoft lately (<a href="http://weblog.infoworld.com/techwatch/archives/007569.html" rel="nofollow">http://weblog.infoworld.com/techwatch/archives/007569.html</a>) &#8230;but that&#8217;s another story).</p>
<p>Microsoft gets a lot of grief when it decides to wait until the normal Patch Tuesday cycle to patch a new zero-day exploit that is loose in the wild. The press is all over the latest bug, self-feeding on the hype. Even one of my favorite sites, dshield.org (<a href="http://www.dshield.org/" rel="nofollow">http://www.dshield.org/</a>) , gets on the bandwagon prematurely, dogging Microsoft for not delivering instant patches while millions of malicious exploits are supposedly spreading. In most of these recent cases, the &#8220;millions of malicious exploits&#8221; turned out to be fewer than 100 in the wild.</p>
<p>But perception is reality, and Microsoft takes it on the chin while the latest patches are being debugged. Whether or not the threats do become moderately widespread, consumers are left hanging in the wind until an official patch is deployed or some other offsetting protection (such as setting an applet kill bit) can be advertised and deployed. Most consumers never deploy alternate protections, so they remain unprotected until the official patch is deployed.</p>
<p>Because of this, several third parties have begun releasing protective patches to close holes until the official patches are released. Central to this phenomenon is the new Zeroday Emergency Response Team (<a href="http://isotf.org/zert" rel="nofollow">http://isotf.org/zert</a>) (ZERT). ZERT is a talented team of programmers and security experts dedicated to creating patches when the official patches lag behind popular demand. ZERT&#8217;s ZProtectorframework allows third party Microsoft Windows patches to be created and deployed, while eliminating the need for the third-party patch to be uninstalled once a vendor patch becomes available.</p>
<p>Other professionals, such as Dr. Jesper Johansson (<a href="http://msinfluentials.com/blogs/jesper" rel="nofollow">http://msinfluentials.com/blogs/jesper</a>) , a former top Microsoft security employee, recommend offsetting defenses that defang zero-day code. Jesper recently came up with some solid security fixes (<a href="http://msinfluentials.com/blogs/jesper/archive/2006/09/29/Set-KillBit-on-Arbitrary-ActiveX-Controls-with-Group-Policy.aspx" rel="nofollow">http://msinfluentials.com/blogs/jesper/archive/2006/09/29/Set-KillBit-on-Arbitrary-ActiveX-Controls-with-Group-Policy.aspx</a>) that could be quickly deployed using group policy.</p>
<p>Microsoft and many other security experts warn customers against deploying third-party patches and fixes. Most customers should strongly consider this advice. For one, third-party patches and fixes are often not as thoroughly tested as well as an official patch. A Microsoft source once told me that each Internet Explorer security patch undergoes thousands of regression tests before it can be released.</p>
<p>It&#8217;s also true that third-party patches have caused more problems than they solved. Even Jesper&#8217;s excellent VML protection script caused problems on a certain class of Windows computers in a common patch scenario.</p>
<p>But with the official warnings in mind, I feel that any company with a knowledgeable administrator who has the time to test a third-party patch or fix thoroughly can benefit using third party patches and advice in times of crisis. Some of these sources are quick to respond if something does go wrong: Jesper made updates to his fix-it advice as soon as he became aware of the problems, for example; ZERT appears to be making the right choices in how it applies its patches, not modifying the original impacted executable.</p>
<p>In my opinion, if a widespread exploit is high risk in your environment, you should consider testing and deploying a third party patch or fix. Management should be made aware of the nature of the third party patch, the risks, and give final approval. And as with any new patch &#8212; even official patches &#8212; you should test thoroughly and have a tested reversal plan in case the medicine is worse than the disease.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/11/08/the-pain-of-patch-management/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">256</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>This is a samle.</title>
		<link>https://hi2005.wordpress.com/2006/10/29/this-is-a-samle/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Sat, 28 Oct 2006 17:22:39 +0000</pubDate>
				<category><![CDATA[Misc]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/10/29/this-is-a-samle/</guid>

					<description><![CDATA[This morning I found this interesting offer by Google. It&#8217;s more convenient and powerful than the old Writely. Moreover, it provide me a way to write my blog at wordpress.com. I can communicate with my friends worldwide. It&#8217;s great !]]></description>
										<content:encoded><![CDATA[<p>This morning I found this interesting offer by Google. It&#8217;s more convenient and powerful than the old Writely. Moreover, it provide me a way to write my blog at wordpress.com. I can communicate with my friends worldwide. It&#8217;s great !</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">255</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>China telecom operators and Sarbanes Oxley Act Compliance</title>
		<link>https://hi2005.wordpress.com/2006/08/10/china-sox/</link>
					<comments>https://hi2005.wordpress.com/2006/08/10/china-sox/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Thu, 10 Aug 2006 05:59:01 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[ITIL]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SOX]]></category>
		<category><![CDATA[Telecom]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/08/10/china-sox/</guid>

					<description><![CDATA[In recent 2 years in China, the main rhythm in telecom industry is the compliance journey of Sarbanes Oxley Act (SOX). The four major telecom operators – China Mobile, China Telecom, China Netcom, China Unicom, all have public-list at USA stock market. In a similar time schedule, each of them has spent a lot of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In recent 2 years in China, the main rhythm in telecom industry is the compliance journey of Sarbanes Oxley Act (SOX). The four major telecom operators – <a href="www.chinamobile.com" title="China Mobile" target="_blank">China Mobile</a>, <a href="http://www.chinatelecom.com.cn" title="China Telecom" target="_blank">China Telecom</a>, China Netcom, China Unicom, all have public-list at USA stock market. In a similar time schedule, each of them has spent a lot of man power and money on SOX compliance, to organize, to plan, to build up internal control oriented processes, to buy consulting services and tools, to collect operation records.</p>
<ul>
<li>Plan and Organize</li>
</ul>
<p>Typically, inside an operator, a 404 team, headed by a vice general manager level executives, was assigned to lead the compliance activities. Specialists in each of the main IT departments, e.g. Management Information System Department, Billing Department, Network Department, were assigned to be responsible for the implementation and follow-ups. A series of education has been conducted to improve the awareness of compliance.<br />
All provincial operators are required by their HQ to complete the self-assessment and corresponding remediation in the first half year of 2006, so that they can collect enough records for external auditors to testify the effectiveness of internal control measures. Three of the BIG FOUR accounting firms are external auditors of the four operators – <strong>KPMG</strong> for China Mobile and China Telecom, <strong>Deloitte</strong> for China Netcom, and <strong>PWC</strong> for China Unicom.</p>
<ul>
<li>Acquire and Implement</li>
</ul>
<p>In order to improve the effectiveness and efficiency of compliance controls, a series of nationwide security and governance projects are being undertaken, covering <strong>IAM</strong> (Identity and Access Management), auditing, <strong>ITSM</strong> (Information Technology Service Management) optimization and etc. Large amount of KPI (Key Performance Indicator) are setup and monitored to reflect the compliance status. Complete <a href="https://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/" title="bmst">audit</a>ing systems are under continuous construction and improvement, while periodic and formal auditing processes for the compliance controls are designed and implemented.<br />
We are glad to say that the enterprise governance structure and effectiveness has got unprecedented upgrade inside the four major telecom operators. There is no denying that SOX compliance journey is <strong>too expensive</strong> for mainland enterprises. The high cost of SOX has had many of enterprises to re-think their IPO plan to Nasdaq.</p>
<p>This page was also published at <a href="http://sbin.cn/blog/?p=254" title="sbin.cn">sbin.cn</a>.</p>
<p><a href="http://del.icio.us/post?url=https://hi2005.wordpress.com/2006/08/10/china-sox/" title="Bookmark this post with del.icio.us."><img src="https://hi2005.wordpress.com/wp-content/uploads/2006/08/delicious.gif?w=16&#038;h=16" alt="Delicious" border="0" height="16" width="16" />del.etio.us</a>     <a href="http://digg.com/submit?phase=2&amp;url=https://hi2005.wordpress.com/2006/08/10/china-sox/" title="Digg this post."><img src="https://hi2005.wordpress.com/wp-content/uploads/2006/08/digg.gif?w=16&#038;h=15" alt="Digg" border="0" height="15" hspace="5" width="16" />digg it</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/08/10/china-sox/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">254</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/08/delicious.gif" medium="image">
			<media:title type="html">Delicious</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/08/digg.gif" medium="image">
			<media:title type="html">Digg</media:title>
		</media:content>
	</item>
		<item>
		<title>In 2006, China has issued 15 national security standards</title>
		<link>https://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/</link>
					<comments>https://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Wed, 09 Aug 2006 06:20:23 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/</guid>

					<description><![CDATA[In China, network and information security have been getting rising attention in these years, not only from the government and those large enterprises, but also from whole society. More and more relevant standards are issued, and internal control manuals are made and executed in FSI (Financing, Securities and Insurance) and telecom enterprises as well to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In China, network and information security have been getting rising attention in these years, not only from the government and those  large enterprises, but also from whole society. More and more relevant standards are issued, and internal control manuals are made and executed in FSI (Financing, Securities and Insurance) and telecom enterprises as well to strengthen their compliance management.</p>
<p>Since the beginning of 2006, 15 standards have been published in security domain by the technical committee TC260 (<a href="http://www.tc260.org.cn" rel="nofollow">http://www.tc260.org.cn</a>), which is responsible for the information security related standards under the government standardization organization (<a href="http://www.sac.gov.cn/" rel="nofollow">http://www.sac.gov.cn/</a>), the counterpart of NIST, USA. Some of them cover the detailed management and technical requirements for classify security protection, while some of them are updates of the previous GB/T18336, which is the localized version of ISO15408 (CC). Additionally, ISO17799:2000 has been adopted as GB/T19716-2005 in 2005.</p>
<p>For the original publish page, check: <a href="http://www.tc260.org.cn/sy/xwzt/htmls/20060720000002.html" rel="nofollow">http://www.tc260.org.cn/sy/xwzt/htmls/20060720000002.html</a></p>
<p><a href="http://blog.zhaol.cn/Article_33559" title="China national security standards" target="_blank">Click here</a> to see my chinese comment.</p>
<p><a href="http://del.icio.us/post?url=https://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/" title="Bookmark this post with del.icio.us."><img src="https://hi2005.wordpress.com/wp-content/uploads/2006/08/delicious.gif?w=16&#038;h=16" alt="Delicious" border="0" height="16" width="16" /></a>  <a href="http://digg.com/submit?phase=2&amp;url=https://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/" title="Digg this post."><img loading="lazy" src="https://hi2005.wordpress.com/wp-content/uploads/2006/08/digg.gif?w=16&#038;h=15" alt="Digg" border="0" height="15" hspace="5" width="16" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/08/09/china-issues-15-national-security-standards/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">250</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/08/delicious.gif" medium="image">
			<media:title type="html">Delicious</media:title>
		</media:content>

		<media:content url="https://hi2005.wordpress.com/wp-content/uploads/2006/08/digg.gif" medium="image">
			<media:title type="html">Digg</media:title>
		</media:content>
	</item>
		<item>
		<title>WP&#8217;s first step to profit</title>
		<link>https://hi2005.wordpress.com/2006/08/04/wps-first-step-to-profit/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Fri, 04 Aug 2006 08:25:28 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/08/04/wps-first-step-to-profit/</guid>

					<description><![CDATA[The largest free blog hosting service provider &#8211; wordpress.com rolled out a new service &#8211; CSS customization, to give the bloggers a way to customize the stylesheet, according to their own flavor. This service is not free, instead you have to pay 15 credits for it. You can buy a credit point for 1$ through [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The largest free blog hosting service provider &#8211; wordpress.com rolled out a new service &#8211; CSS customization, to give the bloggers a way to customize the stylesheet, according to their own flavor. This service is not free, instead you have to pay 15 credits for it. You can buy a credit point for 1$ through PayPal. For <a href="http://wordpress.com/products/custom-css/" title="Custom CSS" target="_blank">more&#8230;</a><br />
This is the first service not free by wordpress.com. It&#8217;s a common sense to regard it as the signal of first step to profit.  Considering its huge subscriber base (287 thousands for now), WP is expected to be the superstar at the venture capital market.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">249</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>What Hamachi brings?</title>
		<link>https://hi2005.wordpress.com/2006/07/28/what-hamachi-brings/</link>
					<comments>https://hi2005.wordpress.com/2006/07/28/what-hamachi-brings/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Fri, 28 Jul 2006 05:28:44 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[P2P]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[SVM]]></category>
		<category><![CDATA[UTM]]></category>
		<category><![CDATA[VoIP]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/07/28/what-hamachi-brings/</guid>

					<description><![CDATA[Bill recommended one &#8220;new&#8221; application to me. That&#8217;s Hamachi. It gave me a very complicated feeling. It&#8217;s a wonderful software application, which provides us a virtual LAN over Internet. It&#8217;s a typical overlay network application, which makes use of P2P technology and has the capability to tranverse the NAT/FW enterprise perimeter. Additionally, it brings us [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.skypejournal.com" title="SkypeJournal" target="_blank">Bill</a> recommended one &#8220;new&#8221; application to me. That&#8217;s <a href="http://www.hamachi.cc" title="Hamachi" target="_blank">Hamachi</a>. It gave me a very complicated feeling.</p>
<p>It&#8217;s a wonderful software application, which provides us a virtual LAN over Internet. It&#8217;s a typical overlay network application, which makes use of P2P technology and has the capability to tranverse the NAT/FW enterprise perimeter. Additionally, it brings us an interesting function &#8211; Web Proxy:</p>
<blockquote><p>Built-in Web proxy<br />
An option to use Hamachi as a simple web proxy. This way your Hamachi peers may configure their Web browsers to access the Internet via your computer and therefore protect their Web traffic while it is in transition between you and them.</p>
<p>This feature is typically used for securing Web surfing from untrusted locations including cybercafes, coffee houses, hotels, etc</p></blockquote>
<p>Obviously, founders of Hamachi have learned the lesson from Skype. They has done a lot of effort to open their protocols and algorithm in the identity, authentication, and communications among system components. That will be a door-knocker to those enterprise IT managers, because there must be growing security and system management software to support Hamachi, as long as Hamachi&#8217;s installation get enough base.  According to their website, Hamachi has over 3,000,000 users at June 17, while this number was merely 2,000,000 in April, growing 50% in two months.</p>
<p>It&#8217;s a wonderful remote collaboration tool, as well as a virtual networking platform, particularly in the current booming broadband world.</p>
<p>At the other hand, the overspreading of such kind of softwares (for others, see vnn.cn, softether.com)  has been eroding and further eliminating the enterprises&#8217; network perimeter, leading the compomise of security policy.  It requires that firewalls and networking devices should support more and more layer-7 applications, in particular P2P overlay networking traffic.  Morever, Traditional IDS and UTM won&#8217;t work in face of virtual LANs.</p>
<p>Let&#8217;s keep an eye on them together. See my <a href="http://www.i170.com/user/zhaol/Article_32652" title="zhaol's blog" target="_blank">comment in chinese</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/07/28/what-hamachi-brings/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">248</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>Ground-breaking audit tool for SSH and Windows Remote Desktop Protocol (RDP)</title>
		<link>https://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/</link>
					<comments>https://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Mon, 24 Jul 2006 03:13:10 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[BS7799]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/</guid>

					<description><![CDATA[A startup company in China, BMST Co. Ltd., is bringing security managers and auditors a ground-breaking product which can audit SSH and Windows Remote Desktop Protocol (RDP) as a network bridge transparent to the upper layer applications. The product is named Session Auditor. It can record, replay, query, correlate those session data from most of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A startup company in China, <a href="http://www.bmst.net/en/index.htm" target="_blank" title="BMST Co. Ltd.">BMST Co. Ltd</a>.,  is bringing security managers and auditors a ground-breaking product which can audit SSH and Windows Remote Desktop Protocol (RDP) as a network bridge transparent to the upper layer applications. The product is named Session Auditor. It can record, replay, query, correlate those session data from most of popular protocols used in the daily network and system maintenance and operations, such as SSH, RemoteDesktop(RDP), Telnet, FTP, HTTP, Rlogin, VNC, and even those SQL query in Oracle, Sybase, MS SQL and etc.  The most brilliant point is its unprecedented audit capability to the two most popular encrypted protocols, ie.  SSH and RDP, making it unique in the competition against common sniffer products as well as forensics tools.</p>
<p>The founders of BMST have put their product at much larger background &#8211; the wave of compliance.</p>
<p>In the wake of Enron and WorldCom the role of internal auditors in corporate governance has taken on whole new meaning. Compliance is a long journey that enterprise excutives and IT managers have to take. Although there have been too much in your work breakdown structure task list, however, &#8220;Audit&#8221; is the right one that you can never overlook for seconds. Audit systems help executives assure everything runing as expected and defined.</p>
<p>Generally speaking, &#8220;audit system&#8221; for information systems are seperated into two kinds, one is management layer auditing, another one is technical layer auditing.  The former is mapped to those auditing tools, particularly based on best practices and standards, such as ISO27001(BS7799), Cobit. But as to the technical layer auditing, there are too many tools and approaches in IT managers&#8217; table.  Typically it&#8217;s implemented by those log collection and analysis tools in the IDC&#8217;s security product category of SIEM(Security Information and Event Management). Those logs are designed to record only the event results, without the details of the activities and operations. In other words, if security managers and auditors want to do in depth investigation and forensics,  those logs can&#8217;t  help any more.</p>
<p>BMST&#8217;s Session Auditor can help. It&#8217;s an outstanding in-depth investigation and forensics tool.  With its huge built-in storage (up to 2T Bytes), SA can record up to 5 months of network traffic in a wire speed fast ethernet (100Mb/s) environment without missing any packet.</p>
<p>This post was also published at <a href="http://sbin.cn/blog/?p=240" title="sbin.cn">sbin.cn</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/07/24/audit-ssh-rdp/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">247</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>UTM in China</title>
		<link>https://hi2005.wordpress.com/2006/06/22/utm-in-china/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Thu, 22 Jun 2006 05:16:57 +0000</pubDate>
				<category><![CDATA[Firewall]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[UTM]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/06/22/utm-in-china/</guid>

					<description><![CDATA[In China, UTM (Unified Threats Management) has been rocketing in recent months, not only in the media, but also in the real market transactions. International vendors, such as Fortinet, Watchguard, Sonicwall, ZyXel, bomb the newspapers, journals and other soft-ad everyday, while Cisco, Juniper, Symantec, Securecomputing, McAfee and etc. keep talking on their vision of UTM [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In China, <a href="https://hi2005.wordpress.com/2005/11/14/utm-unified-threat-management-definition/" title="UTM definition" target="_blank">UTM (Unified Threats Management)</a> has been rocketing in recent months,  not only in the media, but also in the real market transactions.  International vendors, such as <a href="http://www.fortinet.com" title="Fortinet" target="_blank">Fortinet</a>, Watchguard, Sonicwall, <a href="http://us.zyxel.com/web/index.php" title="ZyXel" target="_blank">ZyXel</a>, bomb the newspapers, journals and other soft-ad everyday, while Cisco, Juniper, Symantec, <a href="http://securecomputing.com/" title="SecureComputing" target="_blank">Securecomputing</a>, McAfee and etc. keep talking on their vision of UTM directions.  Of course, the prediction of IDC&#39;s report on UTM market that UTM will occupy 57.6% of total firewall, vpn, and anti-virus market share is one of the main stir and encouragement to the investment.  Then, how is everything going about those local security vendors? Yes, they won&#39;t just stand by and watch the growth, instead they are deeply involved in this arena.</p>
<p>During the past 1-2 years, most of those major players in China security market have been brewing and rolling-out their UTM products. <a href="http://www.kingsoft.com.cn" title="Kingsoft" target="_blank">Kingsoft</a> is one of the top three local anti-virus vendors in China(the other two is Rising and Jiangmin). Recently, they inked the agreement with <a href="http://www.xscreen.cn" title="xScreen" target="_blank">xScreen</a> on the UTM product OEM cooperation. In conjunction with their desktop antivirus/firewall/IDS, anti-virus gateway and server protection, no one would like to ignor their competition in the total security solution for SMB.</p>
<p>According to the UTM description by IDC, anti-virus is one basic function of UTM devices, ie. it&#39;s easier for those anti-virus vendors  to turn to catch up UTM market.  So it&#39;s an easy job to predict that Rising/Jiangmin/CA-JC won&#39;t wait long time to sell their UTM.</p>
<p>As to the UTM market, OEM is doomed to be a good choice for those vendors who want to break into this market. Because a single core technology within a UTM, such as firewall, VPN, IDS engine, and anti-virus engine, is a little bit overwhelming for an average vendor to develop from the much beginning. As a proof of my point, IDC&#39;s report list reflect the anti-virus engine OEMed in the major UTM products.  So again it&#39;s easy to predict there are more and more vendors choose OEM to enhance their features and shorten the rolling-out time.  It must leave such technology companies as xScreen a big space to make money and grow.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">246</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>12345678! Pyramid Framework</title>
		<link>https://hi2005.wordpress.com/2006/06/14/12345678-pyramid-framework/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Wed, 14 Jun 2006 08:15:48 +0000</pubDate>
				<category><![CDATA[BS7799]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[ITIL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[SOX]]></category>
		<category><![CDATA[Telecom]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/06/14/12345678-pyramid-framework/</guid>

					<description><![CDATA[Yesterday afternoon, WHY and I worked out a holistic enterprise internal control framework. We named it as 12345678! Pyramid Framework. It help integrate the enterprise execution, IT control and security control methodologies and countermeasures. One Priority: Execution Two Hands: Technology and Management Three Layers: Decision Makers, Managers, and Execution Four Phases: Plan, Do, Check, Act [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Yesterday afternoon, WHY and I worked out a holistic enterprise internal control framework. We named it as 12345678! Pyramid Framework. It help integrate the enterprise execution, IT control and security control methodologies and countermeasures.</p>
<ol>
<li>One Priority: Execution</li>
<li>Two Hands: Technology and Management</li>
<li>Three Layers: Decision Makers, Managers, and Execution</li>
<li>Four Phases: Plan, Do, Check, Act</li>
<li>Five Layer Controls: Control Environment, Risk Assessment, Control Activities, Information and Communications, Monitoring</li>
<li>Six Risk Elements: Assets, Threats, Vulnerabilities, Safeguards, Risks and Opportunities</li>
<li>Seven Information Criteria: Confidentiality, Integrity, Availability, Efficiency, Effectiveness, Compliance, Reliability</li>
<li>Eight IT Processes: Planning and Organization, Acquisition &amp; Implementation, Delivery and Support, Monitoring and Evaluation</li>
</ol>
<p>Do you like it? We know there has been much space left for it to be perfect. But it help guide your thinking ways when you prepare proposals or do planning. Its original form is in Chinese. Click <a href="http://www.i170.com/user/zhaol/Article_27990" title="Pyramid Framework">here</a> for more.</p>
<p>If you think it helpful or have any suggestions, just leave me a comment.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">244</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>VoIPsa Blog</title>
		<link>https://hi2005.wordpress.com/2006/06/01/voipsa-blog/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Thu, 01 Jun 2006 06:00:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[P2P]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[Telecom]]></category>
		<category><![CDATA[VoIP]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/06/01/voipsa-blog/</guid>

					<description><![CDATA[Here is coming an eye-catching blog at VoIP security at VoIPsa Blog.]]></description>
										<content:encoded><![CDATA[<p>Here is coming an eye-catching blog at VoIP security at <a target="_blank" href="http://www.voipsa.org/blog/" title="VoIPsa Blog">VoIPsa Blog.</a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">243</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>Go Security 2.0</title>
		<link>https://hi2005.wordpress.com/2006/05/10/go-security-20/</link>
					<comments>https://hi2005.wordpress.com/2006/05/10/go-security-20/#comments</comments>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Wed, 10 May 2006 08:13:56 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security2.0]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[UTM]]></category>
		<category><![CDATA[Web2.0]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/05/10/go-security-20/</guid>

					<description><![CDATA[When I try to dig &#34;Security 2.0&#34; via Google, only one noticeable hit was found from CSOonline by Sarah. Sarah summarized the convergence at security area, and regarded &#34;Security 2.0&#34; as integration, convergence, holistic security and so on. Sarah reported a case study from Constellation Energy Group on convergence of physical security and IT security, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>When I try to dig &quot;Security 2.0&quot; via Google, only one noticeable hit was found from <a href="http://www.csoonline.com/read/041505/constellation.html?action=print" title="CSOOnline" target="_blank">CSOonline by Sarah</a>. Sarah summarized the convergence at security area, and regarded &quot;Security 2.0&quot; as integration, convergence, holistic security and so on.  Sarah reported a case study from Constellation Energy Group on convergence of physical security and IT security, where they assigned a new role named Chief Risk Officer, directly under CEO, who is responsible for control of what ever risks which might hurt the enterprise to an acceptable level.  That&#39;s very interesting and  with deep insight.  However, my vision of &quot;Security 2.0&quot; is somewhat different.</p>
<p>At least in China, based on the about ten years of security practice, I would like to define the following two stages of security management and technology we are living with so far.</p>
<ul>
<li>Security 0.1: security came from anti-virus capability</li>
<li>Security 1.0: security is <b>PDR</b> (Protection -&gt; Detection -&gt; Response), where in most cases at China, PDR was explained as firewall (protection), IDS (detection) and security emergency response services (Response)</li>
</ul>
<p>But I begin to feel the emerging of a new pulse and inspiration at the industry, which I didn&#39;t hasitate to call it &quot;<b>Security 2.0</b>&quot;, where I hope to borrow some concepts and feelings from Web2.0. The representative and definitive features of &quot;Security 2.0&quot; include:</p>
<ul>
<li>Security 2.0.1: focus changed to <b>internal control and security protection of applications and data</b>, rather than simple virus/intrusion detection and attacks.</li>
<li>Security 2.0.2: &quot;holistic security&quot; synergizing the <b>AAAA</b>(Account, Authentication, Authorization, and Audit), from just stack/heap of firewalls, IDSs and other single point stuff.</li>
<li>Security 2.0.3: emphasizing the perception and experience of those security managers and administrators, ie. the real effectiveness and efficiency. along with the implementation of technologies of data mining and correlation.</li>
</ul>
<p>The key difference between Security 2.0 and previous stages lies at that the later focuses on the security information production and corresponding accuracy from those single point security elements, while the former turns to effective and efficient usage of those information to direct the real operations.  Security 2.0 just develops itself on the shoulder of Security 1.0, instead of replacing them.</p>
<p>BTW, I am  sorry I don&#39;t have time to translate other parts of this post from Chinese to English. If you are interested, please check the full version in <a href="http://www.i170.com/user/zhaol/Article_23026" title="Go Security 2.0">Chinese</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hi2005.wordpress.com/2006/05/10/go-security-20/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">242</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>China&#8217;s &#8220;Plan&#8221; &#8211; A Question of (a) Character</title>
		<link>https://hi2005.wordpress.com/2006/05/08/chinas-plan-a-question-of-a-character/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Mon, 08 May 2006 02:32:33 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/05/08/chinas-plan-a-question-of-a-character/</guid>

					<description><![CDATA[As a Chinese, from my birth at the end of 60s, last century, I witnessed the great impressive change in China in the passing 20 years&#8230; Until very recently, when the Chinese press mentioned the government&#39;s Five-year Plan, it used the official four-character phrase wu nian ji hua (五年计划), which has been in use since [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>As a Chinese, from my birth at the end of 60s, last century, I witnessed the great impressive change in China in the passing 20 years&#8230;</p>
<blockquote><p>Until very recently, when the Chinese press mentioned the government&#39;s Five-year Plan, it used the official four-character phrase wu nian ji hua (五年计划), which has been in use since the 1950s.  But over the past several months, a new character has appeared in the phrase.  It&rsquo;s now wu nian gui hua (五年规划).  In the English press, a variety of words have been used to reflect this change: The &quot;plan&quot; is now referred to as a &quot;program&quot;, &quot;road map&quot;, &quot;guideline&quot;, &quot;blueprint&quot; or &quot;framework&quot;. What&rsquo;s going on?</p>
<p>The Five-Year Plan was once the most visible artifact of the Marxist centrally planned system for determining China&rsquo;s economic and social activities.  But over the past 27 years, China has systematically transitioned into a socialist market economy.  Today, less than 5% of the country&#39;s merchandise is priced by the government.  The number of industrial state-owned enterprises has plummeted from more than 120,000 in the mid-1990s to around 30,000 in 2005.  The government departments that were at the core of the planning system &#8211; the State Planning Commission and the State Economic Commission and their local counterparts &#8211; don&#39;t exist anymore.</p>
<p>In short, the Chinese government no longer intervenes in most business operations and no longer controls most economic activities.  Though the Five-Year Program remains as strategic a document as its predecessors, setting directions and intentions for the long term; detailed execution is out of the government&#39;s hands and has shifted to the market and enterprises.  What a difference a character can make.</p></blockquote>
<blockquote><p>by JIANMAO WANG AND LINDA G.SPRAGUE, Harvard Business Review, April 2006-05-07.</p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">241</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
		<item>
		<title>Best practice on password management</title>
		<link>https://hi2005.wordpress.com/2006/04/29/best-practice-on-password-management/</link>
		
		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Sat, 29 Apr 2006 02:02:43 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[BS7799]]></category>
		<category><![CDATA[CoBIT]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SOX]]></category>
		<guid isPermaLink="false">http://hi2005.wordpress.com/2006/04/29/best-practice-on-password-management/</guid>

					<description><![CDATA[This morning I read a good essay named &#34;Security Myths and Passwords&#34; by Prof. Eugene Spafford. Prof. Eugene told us his doubt on&#160; those&#160; best practices on password management policy, like &#34;monthyly change&#34;, based on the interesting origin of this &#34;best practice&#34;. The defects and even failures in most of enterprise security defense systems can [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This morning I read a good essay named &quot;<a href="http://www.cerias.purdue.edu/weblogs/spaf/general/post-30/trackback/" title="Security Myths and Passwords">Security Myths and Passwords</a>&quot; by Prof. Eugene Spafford. Prof. Eugene told us his doubt on&nbsp; those&nbsp; best practices on password management policy, like &quot;monthyly change&quot;, based on the interesting origin of this &quot;best practice&quot;.</p>
<p>The defects and even failures in most of enterprise security defense systems can be root caused into problems in &quot;security execution&quot;, ie. the discrepancy between the policy and the real environment. The security manager just book those best practices into their &quot;policy&quot;, while not considering their staff, their skills, the data to protect, the threats to contain/mitigate&#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">240</post-id>
		<media:content url="https://1.gravatar.com/avatar/7c942bc52bc10a357420a51f8e7ad01272ddb1a98691c72e17f7ec2847dbc837?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">zhaol</media:title>
		</media:content>
	</item>
	</channel>
</rss>
