Saturday, February 9, 2019

Netiquette IQ Blog For 2/9/2019 command-and-control server (C&C server)



+++++++++++++++++++++++++++++++++++++



February is Black History Month And Pantone Color Month(Coral in 2019)








Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















command-and-control server (C&C server)
from whatis.com
A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. C&C servers can be used to create powerful networks of infected devices capable of carrying out distributed denial-of-service (DDoS) attacks, stealing data, deleting data or encrypting data in order to carry out an extortion scheme. In the past, a C&C server was often under an attacker's physical control and could remain active for several years. Today, C&C servers generally have a short shelf life; they often reside in legitimate cloud services and use automated domain generation algorithms (DGAs) to make it more difficult for law enforcement and white hat malware hunters to locate them.
A malicious network under a C&C server's control is called a botnet and the network nodes that belong to the botnet are sometimes referred to as zombies. In a traditional botnet, the bots are infected with a Trojan horse and use Internet Relay Chat (IRC) to communicate with a central C&C server. These botnets were often used to distribute spam or malware and gather misappropriated information, such as credit card numbers.
Popular botnet topologies include:
  • Star topology - the bots are organized around a central server.
  • Multi-server topology - there are multiple C&C servers for redundancy.
  • Hierarchical topology - multiple C&C servers are organized into tiered groups.
  • Random topology - co-opted computers communicate as a peer-to-peer botnet (P2P botnet).
Since IRC communication was typically used to command botnets, it is often guarded against. This has motivated the drive for more covert ways for C&C servers to issue commands. Alternative channels used for botnet command include JPG images, Microsoft Word files and posts from LinkedIn or Twitter dummy accounts. 
                                        




                                                                        

Thursday, February 7, 2019

Netiquette IQ Blog 2/7/2019 3-tier application architecture - From whatis.com









Happy Chinese New Year - 2019 Is The Year Of The Pig


The New Year greeting in Chinese is “xin nian kuai le”

+++++++++++++++++++++++++++++++++++++



February is Black History Month And Pantone Color Month(Coral in 2019)







Buy the books at

 www.amazon.com/author/paulbabicki
====================================================
















Buy the books at

 www.amazon.com/author/paulbabicki
====================================================













3-tier application architecture - From whatis.com
A 3-tier application architecture is a modular client-server architecture that consists of a presentation tier, an application tier and a data tier. The data tier stores information, the application tier handles logic and the presentation tier is a graphical user interface (GUI) that communicates with the other two tiers. The three tiers are logical, not physical, and may or may not run on the same physical server.
Presentation tier - This tier, which is built with HTML5, JavaScript and cascading style sheets (CSS), is deployed to a computing device through a web browser or a web-based application. The presentation tier communicates with the other tiers through application program interface (API) calls.

Application tier - The application tier, which may also be referred to as the logic tier, is written in a programming language such as Java, Python or Ruby and contains the business logic that supports the application's core functions. The underlying application tier can either be hosted on distributed servers in the cloud or on a dedicated in-house server, depending on how much processing power the application requires.

Data tier - The data tier consists of a database and a program for managing read and write access to the database. This tier may also be referred to as the storage tier and can be hosted on-premises or in the cloud. Popular database systems for managing read/write access include MySQL, Oracle, PostgreSQL, Microsoft SQL Server and MongoDB.

The benefits of using a 3-layer architecture include improved scalability, performance and availability. With three tiers or parts, each part can be developed concurrently by a different team of programmers coding in different languages from the other tier developers. Because the programming for a tier can be changed or relocated without affecting the other tiers, the 3-tier model makes it easier for an enterprise or software packager to continually evolve an application as new needs and opportunities arise. Existing applications or critical parts can be permanently or temporarily retained and encapsulated within the new tier of which it becomes a component.

3-tier application programs may also be referred to as n-tier programs. In this context, the letter "n" stands for 'a number of tiers.'
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.