Home Blog Page 25

Development of a central platform for business interruptions at DB Regio Bus

0

The solution:

As a centrally commissioned Professional Service Partner, PROTOS Technologie GmbH supported the planning, integration and transfer of the application to DevOps operation. In order to ensure a smooth process between all those involved, one of the main tasks was internal and external stakeholder management.

In addition, the existing customer organization was taken into account when creating and adapting processes. As a certified IT service provider according to ITIL, a continuously developed application cannot simply be handed over to the standardized processes. Instead, solutions had to be found within the framework of the existing processes in order to integrate a DevOps-based project into everyday company life.

In addition to organizational challenges, various IT infrastructure requirements had to be implemented. DB Regio Bus has been using the infrastructure-as-code framework Terraform for several years. Therefore, the entire infrastructure was mapped using Terraform and combined with the software versioning technology GIT to enable reproducibility, testability and automatic rollbacks. An advantage for the DB Regio Bus lies in the mapping of infrastructure as program code. Changes to the infrastructure code are made fully automatically using the AWS Developer Tools (AWS CodeCommit and AWS CodeDeploy) and can be stored and documented centrally. You are therefore no longer tied to the original programmers and enable independent work.

The use of Terraform enables portability of the infrastructure into different environments. As a result of best-practice approaches, a staging and production environment was provided in order to be able to test changes and new features of the application before rolling it out into the productive system.

In order to be able to roll out changes to the application automatically, the rollout for the frontend, backend and dedicated API was automated in the same way as the infrastructure and for both environments using AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS Pipeline as a CI/CD pipeline. Unit and integration tests of the application artifact within the CI/CD pipeline are also automated.

In order to maintain compliance requirements of the Deutsche Bahn Group, requirements such as end-to-end encryption in transit and encryption of data at rest were taken into account when developing the infrastructure code. In addition, the “least privilege” principle would be implemented in connection with role-based access concepts. The logging implemented by PROTOS Technologie also ensured that access to S3 buckets, application logs and real-time monitoring are noticeable at all times. Corresponding alarms are generated and the log data is stored in an audit-proof manner in a dedicated AWS account.

AWS services were used for the infrastructure components, such as AWS Beanstalk in the application backend, Lambda functions in conjunction with AWS API Gateway for API requests, S3 in combination with CloudFront for delivering web content, and AWS Cognito as an authentication service for external access.

The development team of the external IT service provider has no direct access to the AWS account and the application components provided in it within the process described. However, the team is informed about the respective status of CodeBuild / CodeDeploy actions within the CI/CD pipelines for each deployment and can act in the event of an error depending on the status message. In addition, application events are transmitted in real-time via AWS Kinesis to the IT service provider’s AWS account to enable more effective debugging of the application.

Source: https://www.protos-technologie.de/2021/10/19/aufbau-einer-zentralen-plattform-fuer-betriebsunterbrechungen-bei-der-db-regio-bus/

Rent Microsoft Office ProPlus via Office 365

0

Buying new Microsoft Office licenses is not always the best solution. In times of tight budgets, a rental model can also be an option. Microsoft has been offering for some time as part of the Office 365 Enterprise Module the possibility to rent Microsoft Office ProPlus, currently it corresponds to Microsoft Office 2013 ProPlus. Some of the special features of these rental versions that distinguish them from the boxed products are interesting. Among other things, these are:

  • User licenses instead of computer licenses
  • The user may use the software on up to 5 devices (also on Apple Mac, here then the corresponding Office for Mac)
  • If one of these devices is a Windows RT tablet, the license restrictions of the “Home & Student” version are lifted
  • The Microsoft Office grants a kind of SA (Software Assurance) that always allows the latest available version to be used
  • Under certain conditions, a terminal server can also be used with this office, otherwise extra licenses are required for this.
  • In addition to the normal MSI installation, there is also the “Click2Run” version of Microsoft Office. This is a streamed version but is offline capable and can be installed alongside other Microsoft Office versions without any problems. This is implemented with Microsoft App-V (Application Virtualization), but don’t worry, Microsoft will take care of that.

The question is what does it cost? Microsoft offers 3 channels with Office 365, these channels cannot be combined and can only be changed with effort. In addition to the number of users, the differences are the functions of the packages and the price.
overview

P plans M plans E plans
number of users 1-25 1-300 1-x
Office included in P2 M E3, E4, Office only
SingleSignOn mit ADFS no And And
Hybrid mode for infrastructure no no And
Hosted Exchange enthalten And And Yes, not with “Office only”
Hosted SharePoint enthalten And And Yes, not with “Office only”
Hosted Lync enthalten And And Yes, not with “Office only”
Lowest price with Office
(per user per month)
12,80 € 12,30 € E3: € 19.00
Office Only: 12,90 €

The P-Plan for small businesses

The P-Plan is intended for small businesses and can be seen as a supplement to the Microsoft SBS (Small Business Server) and Essentials Server. It serves the infrastructure services Microsoft Exchange, SharePoint and Lync. Due to its focus on small customers and the self-employed, some functions such as SingleSignOn (there is an extra solution for SBS), compliance functions, AdminCenter, to name just a few. Due to the more attractive price of the new M-Plan, I would personally prefer this one.

If you would like to test the Office365 P2 plan (Office 365 Small Business Premium) with 10 users for free, you can register here.

The M-Plan for medium-sized companies – Office 365 Midsize Business

The M-Plan is intended for medium-sized businesses with up to 250 people; an unchangeable limit is 300 users. This should be taken into account when planning. The M-Plan is relatively new to Microsoft and aims to attract even more customers to Office 365. There are more functions than the P plan and the price is also more interesting in my opinion. Active Directory synchronization and the use of ADFS for a single sign-on should be of interest to most customers. An interesting feature that, like the P plan, is missing is the hybrid deployment of Exchange. Anyone who is already using Microsoft Exchange must migrate all mailboxes to the cloud. Also, not all administrative options are available as with the E-Plan.

Anyone who would like to test the Office365 M plan “Office 365 Midsize Business” for 25 users free of charge can register here.

The e-plan for large companies

The E-Plan is actually intended for enterprise environments, but there is no minimum purchase. There are also more modular options, it is only possible to book the services individually with the E-Plan (e.g. only Exchange Online or only SharePoint Online). Another special feature are the kiosk licenses for users without a fixed PC, here only access via the web apps is possible and the storage limits are significantly lower. Another advantage is that hybrid scenarios are supported. In the case of Microsoft Exchange, the cloud can be administered via an existing Exchange 2010 or Exchange 2013 environment and users no longer notice the transition between on-premises and the cloud. Only certain mailboxes can be moved to the cloud and the rest remain in the company. And a special aspect is that the CALs for the cloud also apply accordingly to the on-premise environment, which means that the user of an E3 plan also has the corresponding Exchange, SharePoint and Lync CALs for the servers in the company.

In general, the E plan is the plan with the most and most modular options. Unfortunately, it is not the cheapest with the Office Client.

Anyone who would like to test the Office365 E3 plan free of charge for 25 users can register here.

Office ProPlus without infrastructure services

And of course I would also like to offer the test variant for Office ProPlus without infrastructure services for testing.

Registration for the Office365 ProPlus test for 25 users.

Which is the right Office365 plan now

That depends on many other factors. At first glance, the M plan seems to be the most attractive, but there are some things that are beyond the scope of this article. Our tip: Ask someone who is familiar with it and who can give you the right advice for your needs.

All statements without guarantee. All price information are net prices without VAT and are as of May 8th, 2013. Source of the price information is the official Office365 website.


About the author

Fabian Niesen has been working as an IT consultant for years and worked at CONET Solutions GmbH in Hennef from May 2012 to July 2015. Among other things, he is certified as MCSA Windows Server 2012, MCSA Office365, MCSE Messeging, Microsoft Certified Trainer and Novell Certified Linux Administrator.

Source: https://www.conet.de/blog/microsoft-office-proplus-uber-office-365-mieten/

Disallowed cookie banners? Consumer center NRW sued Google

0

The North Rhine-Westphalia consumer advice center has sued the US tech group Google. According to consumer advocates, the design of the cookie banner in Google search violates both national regulations and EU directives.

The North Rhine-Westphalia consumer advice center has filed a lawsuit against the US tech group Google in the Berlin district court. According to an official statement by consumer advocates, the cookie banners in Google search violate national regulations and EU directives.

The banners are designed in such a way that “refusing the processing of cookies is considerably more complex than granting comprehensive consent”. Whether the current design of the cookie banner is permissible should now be determined Judge the district court of Berlin.

Cookie banners: With design tricks to disclose data?

The consumer center NRW accuses the US group that the company use creative tricks, in order to entice users into a “comprehensive disclosure of data”. Consumer advocates argue that refusing cookies should be just as easy as accepting them.

However, this is not the case in Google search. In order to avoid negligent data release, however, this is exactly what is essential. The consumer advice center therefore demands that cookie banners should clearly show users what personal data and information is being processed.

Google: Lack of transparency no coincidence?

The company would have to obtain additional consent from its users. According to the consumer advocates, adjusting or rejecting the settings is often too complicated. There is also much to suggest that this is no coincidence.

Google users only have to click once to agree to cookies. However, a rejection is only possible via a second level of the banner. Users must reject at least three different categories in order to accept the setting and return to the start page.

This so-called dark patterns According to the consumer advice center, users should “move to the most comprehensive possible consent to the processing of their data”. The Berlin Regional Court must now decide whether the search engine giant is violating national data protection regulations and EU directives.

Update (April 7, 2022): Google Announces “Decline All” Button

As the HE DOES reported, Google announced to the Hamburg data protection officer that it intended to provide its cookie banners with a “reject all” button. The function should be introduced gradually. According to data protection officer Thomas Fuchs, Google has also given a written commitment to introduce the button promptly.

Also interesting:

Source: https://www.basicthinking.de/blog/2022/04/06/unzulaessige-cookie-banner-verbraucherzentrale-nrw-verklagt-google/

Despite austerity measures, these devices belong on the grid

0

In times of rising energy prices, it goes without saying that you can save money by taking appropriate measures. However, it does not make sense to disconnect every device from the power supply.
Choosing the right equipment plays a crucial role here.

Constant stand-by mode is unnecessary for many devices

When dealing with many devices, it is correct to disconnect them from the power supply and not to leave them permanently in stand-by mode. In return, not every device may be taken off the grid.

If the devices are to be permanently connected to the network, their manufacturers will provide information about this in the operating instructions.

For example, a modern OLED television should always be connected to the mains in order to carry out a regeneration run for the display at night.

Constant stand-by mode is unnecessary for many devices
Constant stand-by mode is unnecessary for many devices – Bild: © Abe Mossop#9097759 stock.adobe.com

Different options when dealing with wireless routers

Ultimately, with the wireless router, it is less important whether the device is disconnected from the device at night or not. But this measure is not absolutely necessary and, in the worst case, produces unpleasant side effects. Nowadays it is common for most landline phones to be connected to the router. If the phone is disconnected from the router, no calls are possible during this time. To save electricity, it is sufficient to deactivate the WLAN signal at night.
A simple keystroke is usually sufficient for this. It is often also possible to set the router menu individually so that the WLAN module is automatically switched off at night and switched on again in the morning.

Options in dealing with WLAN routers
To save electricity, it is sufficient to deactivate the WLAN signal at night – Image: © escapejaja#191230473 stock.adobe.com

Inkjet printers do not always exhibit

With an inkjet printer, it also makes no sense to unplug the devices after each use. This is because the printers automatically go through a print head cleaning cycle each time they are disconnected from the mains and switched on again at a later point in time. So much ink is wasted in this control run that the financial loss involved is greater than that from the electricity consumed.

Source: https://www.blog.de/geraete-trotz-sparkurs-ans-netz/

What is IP address 192.168.1.1?

0

There are exactly 4,294,967,296 IPv4 addresses, and some of them are more memorable than others. An IP address of a router that you are guaranteed to remember sooner or later, because it is the default IP address of most Linksys routers, is 192.168.1.1, and this article explains it all.

192.168.1.1 is the default IP address used by broadband routers and home network gateway equipment. Network administrators use this address to configure a new router, or update the settings of an existing one. The same address can also be used on commercial computer networks.

Technically, a computer, printer or other device could be programmed to use this address, but it is not recommended. This often leads to IP address conflicts. 192.168.1.1 belongs to the IP address range commonly used for private networks. The private IP address range starts with 192.168.0.0 and extends to 192.168.255.255.

What is the address 192.168.1.1 for?

It is not always necessary to know the IP address of your router. Phones and other devices can find the router by name (SSID) whenever they need to go online.

However, knowing the address becomes important when you set up a new router or troubleshoot a home network.

To connect to a router that has an IP address of 192.168.1.1, open a web browser and type:

http://192.168.1.1/

Then, log in to the router’s admin page, and access its settings. 

The procedure may fail for the following reasons:

  • The router has failed and does not respond to connections through the browser.
  • The router is configured to use a different address and not 192.168.1.1.
  • The computer and your browser were unable to join the network.

If your router has the default admin id and password (admin/admin), the router is poorly secured and anyone can log into it. Change the default administrator password to protect your router.

How to determine your router’s IP address

If the router is not configured to use 192.168.1.1, check the documentation or the manufacturer’s website (using your cell phone) to find the correct default address and try again. Other common router default addresses are 192.168.0.1 and 192.168.2.1, and there are others.

What to do when the router does not respond

Follow the suggestions below to resolve the network not responding issues. The problem could be with the router itself, the device, or the connection between the router and the software, such as cabling issues or wireless interference. 

restart the router

Unplug the router from the power outlet, wait a few minutes and plug it in again. Wait until all lights on the front of the router are on or flashing before trying to connect again.

Some routers occasionally need to be restarted after a power outage, due to incorrect startup, while the ISP’s own equipment was down.

Access ipconfig

In many cases, ISPs configure routers to use an internal network addressing scheme other than 192.168.1.x.

To find out what the default IP address of a router is, use the IPCONFIG command on a computer connected to the router, either through a wired or wireless connection.

To check the IP address

  1. Go to the  Start menu .
  2. Type  command prompt in the search bar  to display a list of possible matches.
  3. Select  Command Prompt  to launch the application.
  4. At the C: > prompt  , type  ipconfig  and press  Enter .
  5. Search for  default gateway .
  6. This gateway address is your router’s IP address.
  7. Open a browser and enter this IP address to log in to the router using the administrative ID and password.
IPConfig
IPConfig

Reset the router

If the reset doesn’t work, locate the reset button (usually on the back of the router) and press it until the router restarts. Some reset buttons are inside a small hole, and require a pin to push in. Check the manufacturer’s manual for specific instructions on resetting the router.

Also, check the documentation for the default administrative ID and password. After resetting a router, it reverts back to its default ID and password. So it’s a good idea to log in and change the administrative password to something other than the default.

Never reset a router unless you know what default administrative ID and password the router will revert to. Otherwise, you may have your router locked permanently.

It’s not always the router

Even if a router at 192.168.1.1 is working properly, there may be problems with the wireless card configuration in your computer or even problems with the ISP.

There are many reasons why you might not get a good internet connection. It’s a good idea to be methodical when you troubleshoot your Internet connection until you find the problem.

Cyberus Technology – Cyberus Technology Presents new Perspectives on Virtual Machine Introspection at Biggest German IT Security Congress

0

The 17th German IT-Security Congress, organized by the Federal Office for Information Security (BSI), took place on February 2/3 and Cyberus Technology was among a select group of companies providing insights into new developments in this field. Given we are probably best known for our secure virtualization platform (SVP), we used the opportunity to highlight security-related use cases beyond virtualization’s isolation properties. Starting point were the recent Solarwinds-related security incidents that highlight the need for more checks and balances in current computer systems. How can we limit the consequences of compromised software, even when a trusted system component is affected? We presented Virtual Machine Introspection as game changing answer and talked about its basic principles in laymen’s terms. In the following you will find a condensed version of our talk.

Key Points:

  • Compromised software of the trusted compute base is a major challenge as it allows attackers to fly under the radar
  • VMI provides for defense-in-depth and enables event-driven response in a sandbox environment
  • Our microkernel-based architecture offers fine-grained access rights managements, thus limiting the consequences of vulnerabilities

SolarWinds

Most of you surely heard about the supply chain attack via SolarWinds. It is particularly fiendish because SolarWinds itself is a trusted software provider in the IT infrastructure and the company even suggested excluding its files from standard anti virus checks. This contributed to attackers operating undetected for months in their victim’s environment. The SOHO image of a solar erruption provided the background for our proposition that we need an architecture with checks and balances, such that a compromised, privileged component does not jeopardize the entire system.

Virtualization

The origins of virtualization lay, of course, in resource utilization considerations. The strong isolation properties, however, that enable operating multiple virtual machines (VMs) in parallel, also provide means for protecting defender tools. Our high level architecture diagram shows how for example intrusion detection can be shielded and hidden from an attacker by moving it outside the VM it is meant to guard.

Basic virtualization architecture

This works because access to the hardware state is at the discretion of the hypervisor layer. It can allow inspection of memory content or even CPU registers to other entities. There is a little caveat, however, because knowing the raw data values is insufficient for the discovery of abnormal behaviour. One also needs context information and we briefly touched upon the semantic gap problem, a recurring term at this year’s congress. More details on how we enable Windows analysis in a generic manner can be found in the proceedings. You can access them via the information desk at the congress’ web site.

Isolation and inspection capabilities already provide a solid foundation for security tool development. This led, for example, to sandboxing solutions in order to evaluate email attachments. There is yet another ‘I’, though, the so-called interposition. The hypervisor sits between the virtual hardware (that the legacy software stack operates on) and the real thing, much like the moon sits on the line of sight to the sun in case of a solar eclipse. Thus the hypervisor controls the interaction with the hardware which enables reactive behavior. Even relatively dumb activities like a straight forward memory analysis using YARA rules can be simplified as it can operate directly in virtual address space instead of stitching together physical memory dumps and Windows pagefile content. Once more you can find further ideas on how to use interposition in our paper.

Virtual Machine Introspection

With our talk we wanted to shed some light on the enormous potential of Virtual Machine Introspection for improving system security. Of course, it should be paired with an appropriate hypervisor architecture (cf. Hedron Hypervisor). This combination allows the implementation of the checks and balances mentioned in the introduction.

VMI as key take-away of our talk

Further Information

If you are interested in learning more, the congress’ web site, with a recorded version of our talk (in german, though) shall be accessible for another month. From there you can also download the proceedings with our paper (in english). Of course, feel free to contact me directly if you have further questions or want to learn more about Cyberus Technology’s vision with respect to VMI and IT security.

Source: https://www.cyberus-technology.de/posts/2021-02-08-sicherheitskongress.html

Building a data management platform with Azure Synapse Analytics

0

About the customer:

Our customer is a wholly owned subsidiary of a large German group. With a holistic, customer-specific offer, it drives the digitization of all companies in the group with around 5,100 employees successfully, integratively and value-adding.

In order to find and implement the right solutions for the companies, the customer relies on a comprehensive, market-oriented product portfolio for topics such as the cloud, big data, Internet of Things and artificial intelligence, as well as a high level of consulting and methodological expertise.

Especially with its own ventures, the customer is in the dynamic development of open data platforms. These enable the comprehensive change from classic work and organizational structures to self-organization and company-wide, agile networks.

The challenge:

Since mid-2020, the customer has been faced with the task of developing a uniform, central and open data platform in accordance with the group’s operator specifications.

A large number of group-wide projects with requirements for high data throughput should be able to benefit from the advantages of a modern data platform within a very short time thanks to the automated provision. Thanks to the configurations specified in-house, all corporate requirements regarding security and compatibility are met in a future-proof manner and, in addition to quick and easy integration into existing systems, they offer cost savings, reliable performance and high reliability.

The implementation:

The aim of the project is to offer a group-wide and uniform data management platform for IT projects within the group. The entire infrastructure is set up according to group-wide operating specifications. The connections run mainly via the Microsoft backbone and not publicly via the Internet. The data management platform can be ordered for all IT teams via a corporate portal and is automatically made available on it.

An order process triggers a Gitlab pipeline, which uses Terraform to set up the infrastructure within 30 minutes and set the necessary authorizations and configure it.

The Microsoft Azure Cloud was chosen as the provider for building a data management platform. This option offers intelligent solutions for storing, managing and analyzing growing volumes of complex customer data.

A Data Lake Gen2 architecture is deployed for data storage, which in combination with Synapse Analytics offers a simple interface for data scientists. The processing is carried out on the underlying Apache Spark pools and SQL pools.

In the future, Synapse Analytics will ensure integration with the data catalog.

The result:

The introduction of the data management platform enables fast, barrier-free and cost-efficient access to the data collected by the group. This not only improves access to and management of the existing data catalogue, but also makes it easier to use the data profitably.

Thanks to the technical support of PROTOS Technologie GmbH, it is possible to receive the platform completely set up and preconfigured within approx. 30 minutes after ordering. The user-friendly operation reduces the inhibition threshold to work with data.

For data scientists, using Synapse Analytics brings elementary operational and organizational advantages, as it supports the integration of different systems. While the internal data integration takes over the management and administration of the data, the data connection prevents data from disappearing into the data swamp. The innovative Data Lake House paradigm is also supported by Synapse Analytics. Big Data Warehouse (Big Data SQL Pools) queries and Spark Jobs (Apache Spark) can also be run in Synapse Analytics.

As a certified HashiCorp & Microsoft Partner (Silver – Data Analytics), PROTOS Technologie GmbH has been supporting the customer since the beginning of 2020 in setting up the Azure reference architecture for the data management platform, which can be self-provisioned via a service portal. Thanks to the cooperation, the customer was able to develop a uniform, central and open data platform according to the operator specifications of the group. In addition to the consulting service, PROTOS implements the highly automated provision of the platform based on HashiCorp Terraform.

Graphics: Prosymbols, Freepik, Becris, Ralf Schmitzer from Flaticon.com

Source: https://www.protos-technologie.de/2021/11/17/aufbau-einer-data-management-platform-mit-azure-synapse-analytics/

IP loss in Windows 7 computers | CONET IT Blog

0

A computer loses its DHCP IP address when no DHCP server is available in Windows 7 or Windows Vista.

Given the occasion, I would like to pass this information on to all administrators who are currently working with Windows 7 or have rolled it out.

You may have noticed that the Windows 7 computers suddenly have no or the wrong IP if the connection to the DHCP server was briefly lost. Normally, this should be corrected with the lease time, but unfortunately this is a small bug in Windows 7, which can be switched off simply by changing a RegKey and the normal behavior can be restored.

Editor’s note: The following description of the solution is largely based on a corresponding article on the Microsoft support pages, which is currently only available in English and in machine German translation and which we are therefore making available to you here in an edited German version. The link to the original entry can be found at the end of this blog entry.

Scenario:

  • You have a Dynamic Host Configuration Protocol (DHCP) client computer running Windows Vista or later operating system.
  • The DHCP server service is not available.
  • The client computer will restart.

It can now happen that a Windows 7 client does not maintain its valid lease. As a result, you cannot reach some network resources.

Cause:

In this scenario, the computer loses the IP address that was assigned to it by the DHCP server. This occurs even if the default gateway is still available. Instead, the client computer is assigned an address using Automatic Private IP Addressing (APIPA) or the adapter uses the IP address given to it via the tab Alternative configuration was assigned separately.

Solution:

To resolve this issue, add a registry value to the registry that forces the client to keep its DHCP IP address even when no DHCP server is available. To do this, follow these steps:

  1. Start Registry Editor. To do this, click on Startgive regedit in the field start search and then press the Enter key.
  2. To enable this setting for all adapters, locate the following registry key (registry subkey):HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters(For Windows Vista only:) To enable this setting for only a specific adapter, locate the specific adapter registry key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\
  3. Do you click in the menu To edit on NI and then click DWORD value.
  4. Give DontPingGateway and then press the Enter key.
  5. Do you click in the menu To edit on To change.
  6. Type in the box value1” and then click OK.
  7. Exit Registry Editor.
  8. Restart the computer.

This technique forces the client to keep its DHCP IP address even if no DHCP server is available. If you tab Alternative configuration used to change the IP address of an adapter, the IP address assigned here will be assigned to this adapter.

Please note: In Windows 7 the new registry value will not be honored if you try to set it only for a specific adapter in the following subkey:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\

Link to the English KB article in Microsoft Support: http://support.microsoft.com/kb/958336/en-us


This script or this procedure has been successfully tested by the author on the platforms described here under the specified framework conditions. If you have your own experiences or questions about the application, we look forward to your comments. Disclaimer: The scripts and procedures described herein are provided “as is” and without warranty of any kind. All risks arising from the use or execution of the scripts and procedures described herein are entirely your responsibility. In no event shall CONET, our authors, or anyone else involved in providing the Content provide any support in connection with the scripts and practices described herein, nor shall they be liable for any damages (including without limitation any damages for loss of business, business failure, the loss of business information or other financial loss) arising from the use or inability to use the scripts and procedures described herein.


About the author

Dirk Machnitzke worked as an IT consultant at CONET and supported the planning, consulting, implementation and management of IT architecture solutions based on Microsoft products in the Microsoft operating environment.

Source: https://www.conet.de/blog/ip-verlust-bei-windows-7-rechnern/

Hacker attack saves 3,000 speed offenders from punishment

0

The district of Ludwigslust-Parchim will not rest after a hacker attack in October 2021. As the Schwerin People’s Newspaper reported, but now 3,000 traffic offenders in the district can breathe a sigh of relief.

Speed ​​cameras can lead to lucrative additional income for cities and communities. This is also the case in the Hanseatic City of Hamburg. In 2020 alone, 17.1 million euros were taken with speed camera photos.

Hamburg is the German leader in a survey conducted by the Traffic Law Working Group of the German Lawyers’ Association among the 150 largest cities in Germany.

However, the district of Ludwigslust-Parchim was not so lucky in 2021. Because according to a report by Schwerin People’s Newspaper a hacker attack has dried up this source of income.

District Ludwigslust-Parchim: There was something

At the end of last year, the district of Ludwigslust-Parchim was in the headlines because of this hacker attack. At that time, the Corona card from the Robert Koch Institute was the focus of reporting. There was a large gap on this in northern Germany.

A white spot on the unfathomable corona map of incidences. But how did it come about? On October 15, 2021, hackers attacked the municipal IT service provider of the district. As a precaution, all systems in the district were shut down.

However, the Mecklenburg state capital Schwerin was not affected. The reason: The city uses the less common software SurvNet to transmit the number of corona cases. The district of Ludwigslust-Parchim, on the other hand, transmits the data via Sormas.

Traffic offenders should now be happy about the hack

As of 2021, there were around 4,700 permanently installed speed cameras in Germany. This means that Germany is clearly lagging behind the European leader. Because there are around 17,900 permanently installed speed cameras on Italian roads.

While the speed cameras do not have a very pleasant side effect for many drivers, the cities and municipalities should be very happy about the additional income. The district of Ludwigslust-Parchim in Mecklenburg-Western Pomerania is exempt from this – at least temporarily.

Because last year’s hacker attack not only disrupted the transmission of the corona numbers. Around 3,000 speed offenders can now breathe a sigh of relief thanks to the cyber attack. In the meantime, the procedures for the respective speed camera photos have expired because the processing period has expired.

Who is behind the hacker attack?

The county was unable to process the data due to the impact of the attack. In the period between the hacker attack in mid-October and the end of 2021, the city was not able to obtain any owner queries from the Federal Motor Transport Authority.

Those responsible for the cyber attack on the district of Ludwigslust-Parchim have not yet been identified. The public prosecutor’s office in Rostock announced in November that the “Deep Blue Magic” malware was used in the attack. More is not yet known.

Also interesting:

Source: https://www.basicthinking.de/blog/2022/04/08/landkreis-ludwigslust-parchim-hackerangriff-temposuender/

200 million euros for the climate startup 1Komma5 by Philipp Schröder

0

The former Tesla manager has raised a lot of money for his new climate startup. He dreams of a tech company that can compete with Elon Musk’s company.

Philipp Schröder in front of the Hamburg showroom of his startup 1Komma5: The former Tesla manager wants to promote the expansion of renewable energies.
1Komma5

He was able to do without the exhausting search for investors. This is what Philipp Schröder (38) tells in an interview with the start-up scene. The founder and former Tesla manager is well connected in the industry and maintains contacts with the richest Germans. Once again, this benefits him at his celebrated climate startup 1Komma5.

200 million euros are flowing into the young Hamburg company as part of a new round of financing. Series A is led by a group of well-known investors, including Porsche Ventures, Btov Ventures, eCapital from Münster and the French investment fund Eurazeo. Well-known family offices have also bought into Schröder’s company. The financiers include the billionaire industrialist family Haniel, the Schürfeld Group from Hamburg and Jan Klatten, ex-husband of BMW major shareholder Susanne Klatten.

“We sent 40 rejections”

Investors were very interested, says Philipp Schröder. Many would have asked proactively about joining the climate startup. “Ultimately, we accepted 20 investors and sent 40 rejections,” says the founder. Since it was founded a good year ago, 1Komma5 has expanded its investment framework to 300 million euros. Schröder does not want to comment on the rating. However, it should be in the high three-digit million range – with a lot of room for improvement, as Schröder himself emphasizes. “We founders still hold the majority of the shares with almost 60 percent.”

read too

“I don’t want Tesla in my personal life anymore”

The fact that the company raises so much money at an early stage is not only due to investors’ hopes for profits from the energy transition. 1Komma5’s plans are cost-intensive: The start-up buys up electrician companies across Europe and modernizes them using software and IT. The electricians of the start-up then take care of the installation of solar systems, electricity storage and charging stations – lean and digitally organized.

In this way, Schröder wants to advance the sluggish expansion of renewable energies. Especially in Germany. “We want to be the first energy company that really offers everything from a single source – from the solar system to the electricity tariff,” explains Schröder. Consumers’ interest in renewable energies, which is already growing, has increased significantly again recently. The reason is the war between Russia and Ukraine. “People not only want to set an example against Putin, they are above all afraid that they will soon no longer be able to pay their bills,” said Schröder.

The model is a Tesla innovation

Because of the recent sharp rise in gas and petrol prices, people are always thinking about alternative energy sources. Electric cars, solar systems and heat pumps are increasingly paying off. “Of course we also benefit from this,” says Schröder. He assumes that his company will turn over around 200 million euros this year. Twice as much as originally planned. 1Komma5 currently has 13 locations across Europe, most of them in Germany. The startup currently employs 420 people. Many of them technicians.

However, it is important for Schröder not to be understood merely as a digital workbench for the energy transition. He sees 1Komma5 as a holistic tech company. Customers should not only be able to purchase the systems directly from the startup, but also receive a special energy computer for their own four walls. Customers can use this to make the electricity they produce available to other households, for example if the full electricity storage device at home remains unused during a holiday trip.

This is controlled via a software platform that 1Komma5 is also developing. In the long term, such a decentralized power grid could emerge beyond large providers such as RWE or Eon. A concept that the electric car and solar manufacturer Tesla has been pursuing for some time with its “Autobidder” software. “Tesla is a role model, but we’re just building a manufacturer-independent platform,” says Schröder. It should therefore be possible to use devices from various manufacturers and network them with one another.

Showrooms planned in prime locations

But it will probably be a few years before that happens. Not only because, according to Schröder, there are currently several hundred thousand technicians missing in Germany alone. There is also still a great need for information on the customer side – energy crisis or not.

read too

Elon Musk no longer wants to sell cars

In order to make the concept behind 1Komma5 known to more people, Schröder relies on on-site advice. The startup is planning to open several showrooms in prime locations in major German cities. There customers should be able to test the technology of the startup. The first store near Hamburg’s well-known Jungfernstieg shopping mile is scheduled to open in July. Tesla once had a shop there in the immediate vicinity.

Source: https://www.businessinsider.de/gruenderszene/technologie/1komma5-philipp-schroeder-200-millionen-angriff-auf-tesla/

Latest

Popular