Emails – Best Practices / Bonnes Pratiques de Courriel

 

********* ENGLISH VERSION *************

We would like  to sensitize you on basic rules when you are receiving emails. It is important to understand that even if there is currently security rules in place, it is possible that infected emails arrive in your mailbox. People that will create that type of harmful email will use all sort of strategy to bypass security rules.

A recent study from Wikipedia on harmful software’s categorised as ( Ransomware ) in November 2012

( Mcafee provider of antivirus softwares , reports to have recorded over 120 000 new variations for this type of virus in 2012. Four times more then the year before )

Here is some basic rules you should consider:

1: If you are being contacted by mail and being asked for personal information , Call the company to be sure that it is legitimate or delete the email.

2:   Even If it is easy to detect a  fraudulent character of some emails, other mail appear to be from a valid and reliable online address. Do not trust the name and address listed in the “From” field, since it can be easily modified.

3:  Never provide personal information that would have been asked in an unsolicited mail, even if the site to which you are redirected seems legit . Check with the company requesting the information before filling personal information online

4: Beware of email being sent asking you to make a payment in profit of banking companies

5:  Before providing banking information like MasterCard or visa credit card numbers, be sure that you have proper online security requirement like the ( padlock ) before the fully qualified internet address.

6: Send back an email to any persons who you think could have sent you a weird ( attachments ) to be sure it is legit.  If the email comes back to you immediately, delete it !

7: Beware of very short emails asking you to open the current attachment.  Often you will never have  asked for information about the email

8: Classic cases where people are being caught.

( Here is your bill ! you are being asked to make a payment from a company you don’t even know )

( Your Purolator or Fedex order has arrived )

( Here is my C.V. for a job )

( A list of product that could be sold to your company )

Beware of double extensions in attachments ( .pdf.exe –  .doc.bat )

Beware of the following extensions  ( .zip – .exe – .com – .bat  – .vbs – .rar )

The intention of the people behind this type of email is to get you to open it without questioning yourself !!!

Best protection will be your judgement and vigilance

For more details:

http://fr.wikipedia.org/wiki/Hame%C3%A7onnage

http://fr.wikipedia.org/wiki/Virus_informatique

http://fr.wikipedia.org/wiki/Ransomware

********************** VERSION FRANÇAISE *******************************

Nous aimerions vous sensibiliser aux règles de base lorsque vous recevez des courriels afin d’éviter des ennuis. Il est important de comprendre que malgré toutes les règles de sécurités mises en place, il est toutefois possible que des courriels indésirables arrivent dans votre boite de courriel. Les personnes qui créer ce type de courriel utilise toutes sortent de façon de contourner les règles de sécurités.
Une petite statistique qui vient de Wikipédia sur des logiciels de Type « RansomWare »:

En novembre 2012, « McAfee, l’éditeur de logiciels de sécurité, rapporte avoir enregistré 120 000 nouveaux échantillons de ce genre de virus au deuxième trimestre 2012, soit quatre fois plus qu’à la même période l’année d’avant. »

 

Voici quelques règles à tenir compte :

 

  • Chaque fois que vous recevez un courrier électronique non sollicité vous demandant de confirmer des informations personnelles en ligne, appelez la compagnie pour vérifier la validité de la demande ou supprimer le courriel.
  • S’il est facile de déceler le caractère frauduleux de certains courriers électroniques, d’autres courriers semblent provenir d’une adresse valide et d’une source en ligne fiable. Ne vous fiez pas au nom et à l’adresse indiqués dans le champ “De”, car celui-ci peut être facilement modifié.
  • Ne fournissez jamais d’informations personnelles qui vous auraient été demandées dans un courrier non sollicité, même si le site vers lequel vous êtes redirigé vous semble authentique. Vérifier avec la compagnie qui demande les informations avant de les remplir en ligne.
  • Méfiez-vous des logiciels, courriels en provenance de l’étranger ou dans une autre langue que celle où vous échangez normalement.
  • Méfiez-vous des courriers vous demandant d’effectuer un virement au profit d’institutions bancaires.
  • Vérifiez les référentiels de sécurité (le cadenas) devant l’adresse d’un site web avant de communiquer les informations de votre carte de crédit
  • Renvoyer un courriel a une personne qui vous a envoyé un courriel contenant un attachement louche pour confirmer la véracité du courriel. Si le courriel vous revient, supprimer l’original.Aussi attention même s’il s’agit d’un collègue de travail, il a peut-être ouvert un virus par mégarde!
  • Attention au courriel très court d’une ou 2 lignes qui vous incitent à ouvrir l’attachement du courriel. Souvent vous n’avez jamais demandé d’informations relatives au sujet du courriel.

o   Des cas très classiques de sujet que les gens se font attrapés :

o   Voici votre Facture et vous ne connaissez même pas la personne qui vous l’envoie.

o   Votre livraison Fedex ou Puro est arrivée

o   Voici mon C.V. pour l’emploi

o   Liste de produit à vous vendre

  • Méfiez-vous des attachements ayant des « doubles extensions » .pdf.exe ou .doc.bat
  • Méfiez-vous des fichiers .zip .exe. .com .bat .vbs .RAR

L’intention des gens derrière ce type de courriel est de vous inciter à l’ouvrir sans vous questionner!!

La meilleure protection reste votre jugement et soyez vigilant.

Pour plus de détails :

http://fr.wikipedia.org/wiki/Hame%C3%A7onnage

http://fr.wikipedia.org/wiki/Virus_informatique

http://fr.wikipedia.org/wiki/Ransomware

Veeam Restore Linux VM and NIC (network card) not showing

Hi,

I found when I recovered a VMs with Veeam version 8 update 2, the Nic card was not showing. This is related to the change of the MAC Address.

You need to ensure in this file :

/etc/udev/rules.d/70-persistent-net.rules

You have only one ETH0 and also the MAC ADDRESS in this file, matches the MAC address of your NIC Card in the VMware Properties!

After to ensure your NIC configuration follow update you MAC address inside this file also.
/etc/sysconfig/network-scripts/ifcfg-eth0

 

JF

Netextender SSL error Sonicwall OS 5.9+

Hi,

With the newer sonicwall 5.9+ os, there’s minor differences when you setup the SSL VPN from previous OS.

Not so tricky, but, when I try to login from a windows 8.1 machine I face an SSL error with the self signed ?

please make sure the server has valid certificate …

You need to change the following settings :

SSL VPN -> Server Settings -> Check Enable Server Cipher Preferences -> Select : 3DES_SHA1.

 

Reconnect and work….. Cheers..
FYI on the Mac the connection was working with the default settings.

 

Hyper-V on Vmware and Hyper-V Tips and Trick

Hi,

I’m using VMware for now nearly 10 years. I heard a lot of nice feature of Hyper-V. Now I will jump into it and share some discovery.

First, I’m Vmware, so I want to have Hyper-V run on my VMware workstation. Thanks to another tech – blogger, (I will not take the credit)

http://www.rickygao.com/enable-hyper-v-under-vmware-workstation-for-your-lab/

Also I wanted to create template, but I don’t have System Center Virtual Machine Manager (VMM).

http://oxfordsbsguy.com/2014/06/02/how-to-create-a-hyper-v-vm-template-without-vmm/

First read it’s always “Best Practices”

http://blogs.technet.com/b/askpfeplat/archive/2013/03/10/windows-server-2012-hyper-v-best-practices-in-easy-checklist-form.aspx

Stay tune, all tips I found I will share.

J

SQL Server Installation Error Language FR / French

Hi,

You have a french OS, all in french, you download SQL Server in French, you start the setup and you face this error :

This SQL Server setup media does not support the language of the OS, or does not have the SQL Server English-language version installation files. Use the matching language-specific SQL Server media; or install both the language specific MUI and change the format and system locales through the regional settings in the control panel.

Don’t panic, you check all your regional settings, your in French (Canada)…. Why it’s not working…..  I don’t know, but change all your regional settings to French (France). Start the setup, install and enjoy.

Put back your regional setting back to french canada after the setup.

Thanks Microsoft,

 

SSH KEY Authentication Linux How To

Hi,

If you want to have a workstation with (Linux or Mac) to SSH into a server without a passphrase, this is how you can do it.

On your workstation generate a “key” with ssh-keygen

ssh-keygen

This will create a id_rsa and id_rsa.pub under your home dir/.ssh

mac : /Users/your_account/.ssh/
linux : /home/your_account/.ssh/

id_rsa : this is your private key, you keep it safe on your machine!!
id_rsa.pub : this is the key you copy to each server you want to authenticate without a password.

Copy the id_rsa.pub to the server, you can use scp for that

scp /Users/your_account/.ssh/id_rsa.pub root@myserver.com:/root/.ssh/id_rsa_youraccount.pub

WARNING : the id_rsa.pub must be copy under the account you want to authenticate on the server. So if normally on your server you log in as root (not recommend), you will copy the id_rsa.pub under the root.

WARNING2 : I strongly suggest you rename the id_rsa.pub on the target for id_rsa_youraccount.pub because a file can already exist and might be overwritten.

Now. The id_rsa_youraccount.pub is on the server.
SSH to the server (yes with your credential, for the last time ;))

You need to import your key into a special file called authorized_keys

with the scp command I copied the file into the root.

cd /root/.ssh/

now import the id_rsa_youraccount.pub into the authorized_keys

cat id_rsa_youraccount.pub >> authorized_keys

Quit your current ssh.

Retry ssh with :

ssh root@myserver.com

No password should be asked.