Speeding up the broadband connection with the I-Plate

iplate
I have been meaning to post this for a while now.
Around a year ago BT release the BT I-Plate, and I took the plunge and got one. This is really simple to install if you have a modern BT Master Socket, and it has given me a steady, stable extra 1MB of bandwidth.

I have no affiliation with BroadBandBuyer but they seem to be selling it for a pretty good price, so its certainly worth a try for under £10.

What is the BT i-Plate & how does it work?
The i-Plate (iPlate) is a filter for use on ADSL Broadband lines to improve the speed & stability of the connection. Since they’re easy to install yourself, (see YouTube video below) there are no costly engineer visits required. When connected to the master socket, the iPlate filters the ‘bell wire’ which used to be needed to make our old-fashioned analogue telephones ring. However, with today’s touch-tone phones, this bell wire is now redundant and its presence in a master socket actually causes digital interference on the ADSL line.

Please note that with an iPlate, you will still need to use micro filters.

Increased speeds:
Some lines have seen up to 4Mb increases in speed although improvements of 1.5Mb were found to be more typical in a benchmark survey of 36,000 filtered lines. This indicates a potential 10Db extension in reach meaning iPlates can also help with poor performing ‘Long lines’. These benefits were realized on ADSL lines and they’ll be at least as good, if not better, on ADSL2+ lines.

Improved stability:
Since the iPlate also helps to make ADSL connections more stable, there can be Broadband performance benefits even when line speed is not noticeably increased. The same benchmark study of 36,000 lines showed that filtered lines typically had 20% fewer re-trains (denoting lost connections) and a 45% reduction in error rate.

Who can use the iPlate?
7 out of 10 UK homes will benefit to some extent – that’s approximately 9m Broadband lines. You must have a BT NTE5 type Master Socket (does your socket look like the picture below?).

Will I benefit from an iPlate?
A good way to tell if your line is likely to benefit from bell wire filtering is to compare Broadband performance test results when the modem is plugged into the master socket, versus plugging it into an extension socket. If you see an improvement in broadband performance when the master socket is used, this is a good indication that an iPlate will help

The hidden threats of multi functional devices

Lots of organisations are moving to IP based technologies to save money and consolidate devices. Items such as IP Phones, IP Alarm System, and of coure Multi Functional Devices.

These devices consolidate printers, scanners, faxes, photocopiers and even basic storage into a single device on the network. I had my first involvement with these about a year or so ago, but recently a few people have asked me about the security concerns and risks around these devices so I thought I would bullet the main issues to consider that might not appear obvious.

  • Internal / External Connections. With the device acting as a network printer / scanner, and also a fax that will be connected to a PSTN for external connection. There is a possibility to bridge the connections and gain access to the network via the fax line. All the devices I have reviewed have been logically disconected, and when testin it was not possible to bridge the connections.
  • Internal Storage. These devices use a Hard Disk, and it is not uncommon for all faxes, prints, copies and scans to be present on the HD at some point before being output. With this in mind, and where the device it is worth considering encryption of the HD contents, and consider decommisioning techniques when the unit fails or needs to be replaced.
  • Shared usage. As the device usually replaces multiple departmental kit, this now becomes the central location for printing etc. In the event personal or sensitive data is sent for print, or faxed received it is highly likely that someone else may find the print. It is a good idea to lock down prints and scans to users, prompting a key combination or password is required to release the print.
  • Network access. With these devices on the network, it is most likely shared access can be achieved through the network to prints and scans. Once again if access is not restricted appropriately, data may be inappropriately accessed.

These devices really need to be treated more like a workstation or server, and not like the printers with minimal memory that we are familiar with.
They also tend to be running a Linux OS, so it is important to review the OS for patches, and firmware updates, as well as ensuring appropriate ports are locked down. There are a few known vulnerabilities with printers that can be exploited, and the MFD opens various additional risks to be exploited.

L0phtCrack soon to be returning

L0phtCrack, the venerable password cracking tool is being prepped for a return to the spotlight.

The original creators of L0phtCrack has reacquired the tool with plans to release a new version at next week’s SOURCE Boston conference.

L0phtCrack was a popular tool used to identify and remediate security vulnerabilities that result from the use of weak or easily guessed passwords.  It was also used to recover Windows and Unix account passwords to access user and administrator accounts whose passwords are lost or to streamline migration of users to newer authentication systems.

I look forward to reading and seeing more on this new revision.

President Obama’s Helicopter Data Leaked via P2P.

Tiversa, headquartered in Cranberry Township, Pa., reportedly discovered a security breach that led to the transfer of military information to an Iranian IP address, according to WPXI. The information is said to include planned engineering upgrades, avionic schematics, and computer network information.

The channel quoted the company’s CEO, Bob Boback, who said Tiversa found a file containing the entire blueprints and avionics package for Marine One.

“What appears to be a defense contractor in Bethesda, Md., had a file-sharing program on one of their systems that also contained highly sensitive blueprints for Marine One,” Boback told WPXI.

Tiversa makes products that monitor the sharing of files online. A representative for the company was not immediately available for comment.

Boback believes that the files probably were transferred through a peer-to-peer file-sharing network such as LimeWire or BearShare, then compromised.

* Source CNET News

So are you sure your company data isnt being accidently shared via P2P networks in your network, or when staff take laptops home.

Turbo Charged Wireless Data Sharing

leyio
Leyio have released a device that uses a new technology called “Ultra Wide Band (UWB)”
This new technology allows your to transfer 1GB in about 40 secs, allowing pictures and mp3’s to be transfered almost instataneously.

Currently the range is about four metres, so its perfect for mobile devices, such as phones, mp3 players and media devices. For now a 16GB Personal Sharing Device from Leyio is available.

Netraguard show how Facebook can be used for a hacking attack.

I recently stumbled across the SNOsoft blog, where they detailed how Facebook can be utilised from a Hackers perspective.

The post is interesting, and focuses on the social engineering aspects, and the human tendancy / desire to trust each other.  They then go one to detail how they selected an organisation as a victim, searched for profile information within Facebook, and the people associated with the organisation. This is all part of the very important reconisance phase.

They then build trust relationships with people in the organisation via Facebook, even though they have never been introduced or met in the real world. They then created a fake site detailing how a recent incident might have lead to passwords being compromised, and users should use the form to carry out a password reset.

This obviously lead to them getting various password, for them to then utilise these to initiate a direct attack on the organisation and gain access.

I think its good to carry out this sort of scenarios, I am sure many people dont just add any old Tom, Dick or Harry to any of the social networking sites they visit, but this is a prime example how the few that do cause a security risk.