Cisco is proud to be a Platinum sponsor and exhibitor at PASS Summit this year. If you aren’t familiar with PASS Summit, it “is the world’s largest, most-focused, and most-intensive conference for Microsoft SQL Server and BI professionals.”
Gary Serda has done an excellent job in detailing what the Cisco UCS team will be sharing with attendees in his blog post Guide to Cisco at the PASS Summit, so I wanted to highlight our 3D, interactive vRack of our Unified Computing System which is always a highlight at trade shows and will be on display at PASS Summit.
More than 5,000 Microsoft SQL Server and Business Intelligence professionals will be convening in Charlotte, NC, for the PASS Summit 2013. Cisco is proud to support the SQL Server community as a Platinum Sponsor of the PASS Summit. We have an action-packed agenda of activities and hope to connect with you, to discuss how the Cisco Unified Computing System (UCS), with Intel Xeon Processers, integrates with Microsoft technologies to provide the optimal SQL Server platform, – and a bit of fun.
Let’s start with the fun! Cisco is pleased to join with Microsoft as the co-sponsor of the Welcome Reception on October 15th. We’re looking forward to meeting everyone at this festive event. The reception will feature a surprise signature Cisco beverage, in case you get thirsty.
Of course, the Cisco data center team also has fun speaking about our integrated solutions for SQL Server and Microsoft oriented data centers. Please join us in booth 300 to pick up your Cisco UCS cap and speak with a Cisco expert about: Read More »
Detours is a library offered by Microsoft Research for interception of functions on x86 and x64 platforms. It is sold for commercial use to various vendors that build products ranging from security to gaming applications.
Detours is often injected into most or all of the processes, either system-wide or in the context of the logged in user. The most common way this is done is through the AppInit_Dlls registry value. Because the injection is typically applied to a large number of processes running under various permissions, extra care must be taken to ensure the library and its usage are very carefully reviewed by engineers with a strong understanding of the implications of such wide hooking.
We have used this library in our own security products at Cisco (both CSA and AnyConnect) to provide certain security functions on the system. During one of our research projects earlier this year, we noticed a peculiar pattern on Windows systems where processes we were hooking had a change in the in-memory permissions, which marked the headers of the modules from the normal READ/EXECUTE to now include WRITE as well.
This was quite alarming to us, because a dll should not be writeable when loaded into memory. What was interesting, and led to clues of what might be the cause, was that it was only the dlls that had functions we were actively trying to hook. They were the common Win32 dlls that one would typically intercept methods for, such as Kernel32.dll.
TechEd Australia kicks off today and the Cisco team is on hand to showcase how Cisco and Microsoft are teaming to develop integrated solutions that are enabling new levels of IT innovation in the data centre.
Make sure to come by booth #56/57 to speak with Cisco experts about how the Cisco Unified Computing System (UCS) and Nexus switch family integrate seamlessly with the Microsoft portfolio of enterprise applications and technologies, including:
Cisco UCS for Microsoft Private Cloud and applications (SQL and Exchange)
Cisco UCS Manager for Microsoft System Centre
Cisco UCS PowerTool for Microsoft Windows PowerShell
That’s right folks, today is Patch Tuesday and Microsoft has published its monthly security bulletin for August 2013. The bulletins address a total of 23 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, and Microsoft Exchange. These vulnerabilities could allow an attacker to execute arbitrary code, cause a denial of service condition, or gain elevated privileges.
The bulk of the August updates correct several vulnerabilities in Internet Explorer. Although little technical information is available currently, it’s likely that attackers may develop future exploits based on the vulnerabilities.
Multiple vulnerabilities correct vulnerabilities in Microsoft Windows. A few of the vulnerabilities involve improper processing of ICMP network packets and could allow for attacks that cause affected systems to stop responding to additional network traffic. Although service failures are a concern for production systems, an exploit would allow no system access. Read More »