Migrationsleitfaden Leitfaden Für Die Migration Von Software

Total Page:16

File Type:pdf, Size:1020Kb

Migrationsleitfaden Leitfaden Für Die Migration Von Software Migrationsleitfaden Leitfaden für die Migration von Software Version 4.0 März 2012 II Herausgeber Die Beauftragte der Bundesregierung für Informationstechnik Bundesministerium des Innern Alt-Moabit 101D 10559 Berlin Dieses Dokument wurde durch die Bundesstelle für Informationstechnik im Bundesverwaltungsamt in Zusammenarbeit mit der 4Soft GmbH, der akquinet AG sowie Prof. Dr. Axel Metzger erstellt. Ansprechpartner Referat BIT A4 - Standards und Methoden, Kompetenzzentrum Open Source Software (CC OSS) in der Bundesstelle für Informationstechnik - Bundesverwaltungsamt [email protected] Nachdruck, auch auszugsweise, ist genehmigungspflichtig. Berlin, März 2012 Vorwort zur vierten Version des Migrationsleitfadens Der Migrationsleitfaden bietet IT-Entscheidern einen Überblick über alle wichtigen Aspekte von Software- Migrationen sowie eine praktische Hilfe für deren Planung und Durchführung. In der vorliegenden Ver- sion 4 wurde der Migrationsleitfaden vollständig überarbeitet und einige bisher enthaltene Bestandteile als eigenständige Dokumente ausgelagert. Die bisherige Beschreibung einzelner Migrationspfade wur- de wegen der stark heterogenen Ursprungs- und Zielsysteme einzelner Behörden sowie der schnellen Alterung betrachteter Software-Versionen aufgegeben. Stattdessen finden sich nun Entscheidungshilfen für die jeweiligen Migrationsgebiete in Form von Kriterienlisten, kurzen Produktbeschreibungen, tabella- rischen Gegenüberstellungen und Empfehlungen. Die (Bundes-)Verwaltung ist seit langem selbst oder als Auftraggeberin im Bereich der Softwareentwick- lung tätig. Dabei hat der Anteil an verwendeten oder veränderten Open-Source-Komponenten in den letzten Jahren stetig zugenommen. Die Verwaltung ist insbesondere durch den Rückfluss von Ände- rungen und Erweiterungen an die jeweilige Produkt-Community in einigen Fällen implizit ein Teil der Open-Source-Community geworden. Die hierbei aufgekommenen rechtlichen Fragen werden im Migra- tionsleitfaden aufgegriffen. Die Betrachtung der rechtlichen Aspekte von Software-Migrationen wurde vollständig überarbeitet und aktualisiert. Deren Kernaussagen sind im Migrationsleitfaden enthalten und schlagen die Brücke zur Gesamtbetrachtung rechtlicher Aspekte von Software-Migrationen, die dem Mi- grationsleitfaden als eigenständiges Dokument zur Seite gestellt ist. Neu darin sind die Abschnitte über die Lizenzierung verwaltungseigener Software als Open-Source-Software und über die Modifizierung von Open-Source-Software durch die Verwaltung. Die Wirtschaftlichkeitsbetrachtung von Software-Migrationen wurde analog zu den rechtlichen Aspekten behandelt. Deren Kernaussagen sind weiterhin im Migrationsleitfaden enthalten und verweisen für die Details auf das entsprechende Begleitdokument. Inhaltsverzeichnis Vorwort zur vierten Version des Migrationsleitfadens ..................... III 1 Einleitung ............................................. 1 1.1 Ziele des Dokuments..................................... 1 1.2 Zielgruppe........................................... 2 1.3 Aufbau und Inhalt....................................... 2 1.4 Begleitdokumente ...................................... 3 2 Begriffe............................................... 5 2.1 Migration ........................................... 6 2.1.1 Aktualisierung .................................... 6 2.1.2 Fortführende Migration................................ 6 2.1.3 Ablösende Migration................................. 7 2.1.4 Migrationswege.................................... 8 2.2 Offene Standards....................................... 9 2.3 Konformität und Interoperabilität .............................. 11 2.4 Schnittstellen, Module, Komponenten und Services.................... 12 2.5 Integration........................................... 13 2.5.1 Integrationsformen.................................. 13 2.5.1.1 Zusammenstellungen........................... 13 2.5.1.2 Funktionale Integration.......................... 13 2.5.1.3 Datenintegration.............................. 13 2.5.1.4 Kombinierte Integration.......................... 14 2.5.2 Integrationshilfen................................... 14 2.5.3 Integration und Standardisierung.......................... 14 2.5.4 Integration und Abhängigkeit............................ 14 2.5.5 Fazit.......................................... 16 2.6 Open-Source-Software ................................... 17 2.6.1 Standardisierung und Open-Source-Software................... 17 2.6.2 Open-Core-Software................................. 18 2.6.3 Produkteinsatz.................................... 18 2.6.4 Entstehung von OSS................................. 19 2.7 Proprietäre Software..................................... 20 2.7.1 Freeware ....................................... 20 2.7.2 Shareware ...................................... 20 3 Kriterien für erfolgreiche Migrationen............................. 21 3.1 Ziele einer Migration..................................... 21 VI Inhaltsverzeichnis 3.2 Vorgehensweise / Migrationsplanung............................ 22 3.2.1 Einführungsphase.................................. 23 3.2.2 Anforderungsanalysephase............................. 23 3.2.3 Auswahlphase .................................... 25 3.2.4 Umsetzung...................................... 25 3.2.4.1 Stichtagsumstellung............................ 25 3.2.4.2 Schrittweise Migration........................... 26 3.2.5 Kompetenzzentrum Open-Source-Software.................... 27 3.3 Strategische Aspekte .................................... 28 3.4 Rechtliche Aspekte...................................... 29 3.4.1 Behörde als Nutzer und Lizenznehmer....................... 29 3.4.2 Lizenzierung verwaltungseigener Software als OSS............... 30 3.5 Wirtschaftliche Aspekte ................................... 33 3.6 Qualitative Aspekte...................................... 34 3.6.1 Funktionale Eignung................................. 34 3.6.2 Leistungsfähigkeit .................................. 34 3.6.3 Kompatibilität..................................... 34 3.6.4 Benutzbarkeit..................................... 35 3.6.5 Zuverlässigkeit.................................... 35 3.6.6 Sicherheit....................................... 35 3.6.7 Wartbarkeit...................................... 35 3.6.8 Portabilität ...................................... 36 3.6.9 Dokumentationsgüte................................. 36 3.6.10 Konfigurierbarkeit .................................. 36 3.6.11 Sonstige Qualitätsmerkmale ............................ 37 3.7 Aspekte des Systembetriebs ................................ 38 3.7.1 Weitere Arten der Migration aus Sicht des Systembetriebs ........... 38 3.7.2 Service Level Agreements (SLAs) ......................... 38 3.7.3 Anforderung an das Migrationsvorgehen...................... 39 3.7.4 Auswahl der Infrastruktur und der Anwendungsprodukte............. 39 3.7.5 Wartungsverträge und Lizenzmodelle....................... 40 3.7.6 Auswahl des Systembetreibers........................... 40 3.8 Organisatorische Aspekte.................................. 42 3.8.1 Change Management................................ 42 3.8.1.1 Stakeholder ................................ 43 3.8.1.2 Veränderungsmanagement innerhalb der IT .............. 43 3.8.1.3 Veränderungsmanagement innerhalb der Anwenderorganisation . 44 3.8.1.4 Einführungs- und Schulungskonzept................... 44 3.8.2 Release Management................................ 45 3.8.3 Zeitplanung...................................... 46 3.8.4 Risikomanagement.................................. 46 3.8.5 Management-Unterstützung............................. 47 3.9 Sicherheitsaspekte...................................... 49 3.9.1 Informationssicherheit................................ 49 3.9.2 Schutzziele der Informationssicherheit....................... 49 3.9.3 Strukturanalyse nach IT-Grundschutz ....................... 50 3.9.4 Bewertungskriterien................................. 50 3.9.4.1 Sicherheitskriterien zur Anforderungsanalyse.............. 50 Inhaltsverzeichnis VII 3.9.4.2 Sicherheitskriterien zum Migrationsprojekt ............... 51 3.9.4.3 Umsetzungsbewertung der Anforderungskriterien........... 52 3.10 Exkurs: Erfahrungsbericht der Landeshaupstadt München – Projekt LiMux . 53 3.10.1 Historie und Ziele des Projekts LiMux ....................... 53 3.10.2 Projektinhalt/Projektgegenstand .......................... 53 3.10.2.1 Heterogenität der Clients......................... 54 3.10.2.2 Zwei verschiedene Fileservice-Systeme................. 54 3.10.2.3 Zentrale Strategie und dezentraler Berieb................ 54 3.10.2.4 Bestandteile des linuxbasierten PC Arbeitsplatzes........... 54 3.10.3 Projektsteuerung................................... 54 3.10.4 Projektorganisation.................................. 55 3.10.5 Projektmethodik ................................... 55 3.10.6 Projektvorgehen................................... 55 4 Migrationsgebiete......................................... 57 4.1 Übersicht ........................................... 57 4.1.1 Aufbau ........................................ 58 4.1.2 Bewertungs-Skalen ................................. 58 4.1.3 Bewertungsmethode................................. 59 4.1.4 Domänen-Spezifika ................................. 59 4.2 Infrastruktur.......................................... 60 4.2.1 Low-Level-Dienste.................................. 60 4.2.1.1 Adress-Vergabe und Netzwerkkonfiguration............... 60 4.2.1.2 Namensauflösung............................
Recommended publications
  • Case Study PRO
    GoToMyPC™ case study PRO SUMMARY AdministGoToMyPC Pro TopsTion pcAnywhere The Enterprise Rapattoni Corporation provides for Easy Network Administration management information software "GoToMyPC Pro simply works better than pcAnywhere" is the for real estate associations. reason Chris Edgar gives for his company's switch to GoToMyPC Pro.As network support manager for Rapattoni Corporation, his The Challenge team uses GoToMyPC Pro to administer and support custom Network Support Manager Chris software implementations. Edgar requires reliable access to customer computers to remotely Rapattoni Corporation remotely manages its customized SQL database product for administer his company's custom more than 250 real estate associations.The company had previously used pcAnywhere software implementation.The and other packaged products for remote administration, but found implementation and company was using pcAnywhere configuration to be difficult, especially when working with customers who had limited and other remote-access software, computer experience. Rapattoni now uses GoToMyPC Pro to easily administer but found it to be unreliable and customer networks. Edgar believes that GoToMyPC Pro is faster and more reliable than difficult to use pcAnywhere. "GoToMyPC Pro is very non-intrusive and fast," he says. "Our customers love it." The GoToMyPC Solution GoToMyPC Pro can be easily “Their mouths drop and they ask implemented within minutes on customer networks, even for where they can get GoToMyPC Pro.” customers with limited computer experience.There is virtually no GoToMyPC Pro has been a real money saver for Rapattoni because administrators can configuration with GoToMyPC resolve issues without a customer's intervention. "We probably save two or three phone Pro, allowing company calls per incident with GoToMyPC," says Edgar.
    [Show full text]
  • BSM 1.4 Installation Guide
    & ESCALA BSM 1.4 NOVASCALE Installation Guide REFERENCE 86 A2 54FA 04 NOVASCALE & ESCALA BSM 1.4 Installation Guide Software December 2010 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 86 A2 54FA 04 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright © Bull SAS 2008-2010 Printed in France Trademarks and Acknowledgements We acknowledge the rights of the proprietors of the trademarks mentioned in this manual. All brand names and software and hardware product names are subject to trademark and/or patent protection. Quoting of brand and product names is for information purposes only and does not represent trademark misuse. The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Table of Contents Preface..................................................................................................................vii Overview .............................................................................................................. ix Chapter 1. General Installation Requirements ..........................................................1 1.1 Supported Operating Systems.............................................................................................. 1 1.2 Required Disk Space .........................................................................................................
    [Show full text]
  • Problème : Solution : Activités : Bilan De L'existant : Planification Des
    Activités 4 – OCS Inventory et GLPI Problème : Un client souhaiterait mettre en place un système d’inventaire de son parc informatique de façon totalement automatique. Solution : La gestion du parc informatique se fait par deux logiciels complémentaires : OCS Inventory et GLPI. • OCS permet de faire l'inventaire d'une machine et de centraliser cet inventaire sur un serveur. • GLPI permet la gestion du parc au sens large. Il se base sur l'inventaire que remonte OCS et y ajoute notamment la gestion des tickets d'incidents, réservations de matériels, base de connaissance, ... Activités : A5.1.1 Mise en place d'une gestion de configuration A5.1.2 Recueil d'information sur une configuration et ses éléments A5.1.3 Suivi d'une configuration et de ses éléments. Bilan de l’existant : - Une machine sous Debian 10 qui va nous servir de serveur pour installer et configurer OCS et GLPI - Une machine sous Windows 10 qui va nous servir de machine test pour essayer l’interface web de OCS et GLPI ainsi que de test pour l’inventaire de machine - Une machine sous Windows 10 qui va nous servir d’utilisation en SSH pour quelques copier-coller. Planification des taches : Debian : - Installation de Debian 10 sous une machine virtuelle - Paramétrage des cartes réseaux sous VMware (Segment Lan & NAT) - Configurations des IP de façon statique et dynamique sous Debian - Installations des prérequis pour OCS - Téléchargement du paquet OCSInventory - Décompression & installation - Paramétrage de OCSInventory sous ligne de commande - Création de la base de données OCS
    [Show full text]
  • Edital 001 2017 Hostedagem De Site
    SERVIÇO PÚBLICO FEDERAL CONSELHO REGIONAL DE QUÍMICA DA 9ª REGIÃO/PARANÁ PREGÃO ELETRÔNICO Nº 001/2017 PROCESSO CRQ9-CPL Nº 006/2017 O Conselho Regional de Química – IX Região, doravante denominado apenas CRQ-IX, localizado na Rua Monsenhor Celso, 225 – 5º/6º/10º Andar, Curitiba, Paraná, torna público que o Pregoeiro e sua Equipe de Apoio, designados pela Portaria CRQ-IX nº 014 e 015, ambas de 27 de abril de 2016, realizarão, no dia 22/02/2017, às 10 horas - horário de Brasília, por meio de utilização de recursos de tecnologia de informação- INTERNET , licitação na modalidade de PREGÃO ELETRÔNICO, do tipo menor Preço. Esta licitação observará as disposições do presente Edital e seus Anexos e, ainda, os preceitos de Direito Público, em especial: - Lei nº 8.666 e alterações posteriores; - Lei nº 10.520 de 17.07.2002; - Decreto nº 3.555, Anexo I, de 08.08.2000, e alterações posteriores; - Lei 8.666, de 21.06.1993 e alterações posteriores; - Decreto nº 5.450 de 31.05.2005. 1. DO OBJETO 1.1 – O presente Pregão tem por objeto a Contratação de Empresa, Contratação de Empresa especializada na prestação de serviços profissional, de Hospedagem (Hosting), Fornecimento de Sistema de Gestão de Conteúdo na modalidade de Software como Serviço (SAAS) e Criação de Conteúdo, Marketing Digital, Consultoria em ambiente Microsoft, VMware, Linux, FreeBSD e Networking para implantações, configurações e suporte técnico nível 2, nível 3 nas sedes Curitiba/PR, Cascavel/PR e Maringá/PR, conforme descrições e especificações contidas no presente Edital de seus Anexos. Anexo I – Termo de Referência Anexo II - Modelo de Proposta Comercial Anexo III - Minuta de Contrato Rua Monsenhor Celso, 225 – 5º/6º/10º Andar – Cx.
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • Softwares OCS E GLPI
    FACULDADE DE TECNOLOGIA OSASCO - PREFEITO HIRANT SANAZAR Redes de Computadores Softwares OCS e GLPI São Paulo 2021 Anderson Carlos Anjos de Lima RA 2160292013013 Bruna Rafaele Maciel Oliveira RA 2160292113031 Diogenes Castro de Souza RA 2160292023026 Luciano Souza de Jesus RA 2160292022037 Tatiane Pereira Santos RA 2160292023006 João Lucas Hallwas Bueno RA 2160292113010 Matheus Alexandrino dos Santos 2160292023043 Rodrigo Inocencio da Silva RA 2160292113014 Softwares OCS e GLPI Trabalho apresentado para a matéria de Laboratório de Hardware e redes, para a faculdade Fatec Osasco Prefeito Hirant Sanazar. Orientador: Profª Marcio André Ferreira Pereira São Paulo 2021 Sumário 1.GLPI – GESTION LIBRE DE PARC INFORMATIQUE ...................................................................................... 4 1.1 Plugins ................................................................................................................................................. 5 1.2 Principais Funcionalidades Do Sistema ............................................................................................... 5 1.3 Porque utilizar o GLPI e o OCS juntos? ............................................................................................... 6 1.4 Módulos do GLPI ................................................................................................................................. 7 1.5 Sistema em execução .......................................................................................................................... 7 2. OCS
    [Show full text]
  • Remote Administration
    Remote Administration Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iPhone App 9 © Maxum Development Corp. Remote Administration Rumpus allows you to add users, check server status, review logs, and generally administer your server from your own desktop Mac, rather than having to go to the server to perform these tasks. Setting up Rumpus for remote administration is fairly straightforward, though some effort needs to be expended making sure your Rumpus settings remain secure, even when you make them accessible to remote Macs. Not all administrative tasks can be performed remotely. In particular, server installation, the setup assistants, and automatic diagnostics must be performed on the server itself. Almost all Rumpus control features needed for long-term server maintenance are accessible remotely, but before enabling remote access, you will need to install and perform basic setup of the server. In fact, we recommend that your server be functional and that you at least test the ability to log in to the server before attempting to remotely administer it. Preparing The Server Once basic operation of the server has been established, you are ready to enable remote administration. Open the “Network Settings” window and flip to the “Remote Admin” tab, shown below. ! Setup of remote administration from a desktop Mac Maxum Development Corp. "2 Remote Administration Maintaining security over remote administration is extremely important, so start by specifying an administration password and a list of client IP addresses that will be allowed to administer the server.
    [Show full text]
  • Remote Administration of the Wcst
    Remote Administration: ™ WCST-64: Computer Version 2– Research Edition PAR Staff 01 Remote Administration WCST At PAR, we are committed to doing everything we can to help you serve your clients. With the evolving situation around COVID-19, you may need methods to conduct testing remotely. This paper describes how you can use a videoconferencing tool to remotely administer the WCST using desktop software. This is a living document and will be updated as needed. For additional guidance on preparing your clients for their telehealth appoint- ments, visit parinc.com/Remote_Appointment_Checklist. OVERVIEW OF THE WCST The Wisconsin Card Sorting Test (WCST) is used primarily to assess perseveration and abstract thinking for individuals ages 7 to 89 years. The WCST is also considered a measure of execu- tive function because of its reported sensitivity to frontal lobe dysfunction. The WCST: Computer Version 4–Research Edition (WCST:CV4) software provides unlimited scoring and reporting for administered WCST protocols and allows you to administer the WCST on-screen. The computer version of the WCST has been found to yield similar results to the pencil-and-paper version in nor- mal and psychiatric samples (Artiola i Fortuny & Heaton, 1996; Feldstein et al., 1999; Hellman et al., 1992; Wagner & Trentini, 2009). Although the computer version has been used for more than 15 years, it is considered a research version because the norms were obtained using the paper-and-pencil version of the WCST. TECHNICAL REQUIREMENTS Software. The WCST:CV4 is available for purchase at parinc.com/WCSTCV4. This software provides unlimited scoring and reporting for administered WCST protocols and allows you to administer the WCST on-screen.
    [Show full text]
  • Data Fellows Adds Detection of Netbus 2.0 Pro F-Secure Anti-Virus Now Detects the Controversial Utility Submitted By: Context PR Friday, 5 March 1999
    Data Fellows adds Detection of NetBus 2.0 Pro F-Secure Anti-Virus now detects the controversial utility Submitted by: Context PR Friday, 5 March 1999 March 5, 1999 -- Data Fellows, the global leader in anti-virus and encryption software, today announced that it has added detection of the NetBus 2.0 utility into F-Secure Anti-Virus. Netbus can be used to remotely control a Windows workstation, such as to read and write files, send messages, listen to the microphone, etc. The Netbus detection feature in F-Secure Anti-Virus is optional. NetBus is a remote administration tool for Windows, similar to the infamous Back Orifice tool. It can be installed invisibly into an end user machine. After this, the machine can be accessed and controlled using the NetBus client. This means that a malicious person could control a Windows workstation across the Internet, even from another country. What makes NetBus special among hacking tools is that it has gone commercial. Since February 1999, NetBus has been marketed by it's developers on the Internet. The latest version of the tool has been enchanced with new features and can be used as a generic remote access tool. Older, free versions of NetBus have been detected by most anti-virus programs as trojan horses or backdoor utilities. The controversy over NetBus 2.0 Pro has concerned the commercial aspect: should anti-virus programs detect a tool that people are actually buying and using for day-to-day remote access? NetBus 2.0 can be used for good or bad, just like any other remote access program.
    [Show full text]
  • Configuració D'ocs Inventory 2.0.5 En Centos 6.3
    Configuració d'OCS Inventory 2.0.5 en CentOS 6.3 Configuració del servidor 1. Instal·la CentOS 6.3 i386 minimal 2. Configura la interfície de xarxa vi /etc/sysconfig/network-scripts/ifcfg-eth0 DEVICE="eth0" BOOTPROTO="none" HWADDR="08:00:27:D7:9B:C2" NM_CONTROLLED="no" ONBOOT="yes" TYPE="Ethernet" UUID="f17abfb3-7772-47de-ad27-575585b15644" GATEWAY="192.168.1.1" NETMASK="255.255.255.0" IPADDR="192.168.1.XXX" DNS1="194.179.1.100" DNS2="8.8.8.8" 3. Activa la interfície de xarxa i comprova que funciona ifup eth0 ping www.google.cat 4. Afegeix el dipòsit epel rpm -ivH http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm 5. Edita el dipòsit epel vi /etc/yum.repos.d/epel.repo Cerca: enabled=1 Canvia per: enabled=0 6. Actualitza els sistema yum update -y 7. Instal·la l'editor de text nano (opcional) yum install nano 8. Instal·la dependències d'OCS Inventory yum install make wget httpd mysql mysql-server php php-gd php-mysql php-mbstring mod_perl perl-XML-Simple perl-Net-IP perl-SOAP-Lite perl-DBI perl-DBD-MySQL yum install --enablerepo=epel perl-Apache-DBI perl-Apache2-SOAP perl-XML-Entities Pàgina 1 de 13 9. Canvia el nom del servidor en la configuració d'Apache nano /etc/httpd/conf/httpd.conf Cerca: servername Canvia: #ServerName www.example.com:80 Per: ServerName 192.168.1.XXX 10. Configura el servidor de bases de dades MySQL mysql_install_db 11. Configura el servidor de bases de dades perquè engegui des de l'inici del sistema en els runlevels 3, 4 i 5 chkconfig --levels 345 mysqld on 12.
    [Show full text]
  • Weekly Bulletin S21sec COVID-19
    Weekly Bulletin S21sec COVID-19 May 22, 2020 S21sec’s Threat Intelligence Department CYBERSECURITY YOU CAN TRUST Massive phishing attack Microsoft is warning of an ongoing COVID-19 themed phishing campaign that installs the NetSupport Manager remote administration tool. The attack starts with emails pretending to be from the Johns Hopkins Center, which is sending an update on the number of Coronavirus-related deaths in the United States. Attached to the email there is an Excel document entitled “covid_usa_nyt_8072.xls” that once opened and the malicious macros enabled, would execute the malware. According to researchers, the Excel files in this campaign use strong obfuscation formulas and connect to the same URL to download the malware and compromise the computers by taking remote control of them, executing commands and installing tools and scripts. In addition to the credentials theft suffered by the victims of this campaign, compromised computers can be used by attackers to laterally spread malware throughout the network, so it is recommended to change passwords. https://www.bleepingcomputer.com/news/security/microsoft-war- ns-of-massive-phishing-attack-pushing-legit-rat/ Scattered Canary Group scam on COVID The labor and economic crisis caused by the coronavirus has left more than 20 million U.S. citizens unemployed. In response to this situation, Nigerian scammers known as "Scattered Canary" have launched a fraudulent campaign through the website created by the IRS (Internal Revenue Service) which consisted on filing claims based on the CARES Act for financial assistance caused by the COVID-19 pandemic. To file such claims, personal data such as name, address, date of birth and social security number are required.
    [Show full text]
  • Back Door and Remote Administration Programs
    By:By:XÇzXÇzAA TÅÅtÜTÅÅtÜ ]A]A `t{ÅÉÉw`t{ÅÉÉw SupervisedSupervised By:DrBy:Dr.. LoLo’’aiai TawalbehTawalbeh New York Institute of Technology (NYIT)-Jordan’s Campus 1 Eng. Ammar Mahmood 11/2/2006 Introduction A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication or securing remote access to a computer, while attempting to remain hidden from casual inspection.(unauthorized persons/systems) Most backdoors are autonomic malicious programs that must be somehow installed to a computer. Some parasites do not require the installation, as their parts are already integrated into particular SW running on a remote host. 11/2/2006 Eng. Ammar Mahmood 2 Introduction The backdoor may take the form of an installed program (e.g., Back Orifice or the Sony/BMG rootkit backdoor installed when any of millions of Sony music CDs were played on a Windows computer), or could be a modification to a legitimate program. 11/2/2006 Eng. Ammar Mahmood 3 Ways of Infection Typical backdoors can be accidentally installed by unaware users. Some backdoors come attached to e- mail messages or are downloaded from the Internet using file sharing programs. Their authors give them unsuspicious names and trick users into opening or executing such files (Trojan horse ). Backdoors often are installed by other parasites like viruses, worms or even spyware (even antispyware e.g. AdWare SpyWare SE ). They get into the system without user knowledge and consent and affect everybody who uses a compromised computer. Some threats can be manually installed by malicious local users who have sufficient privileges for the software installation.
    [Show full text]