<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Zeo Technologies</title>
	<atom:link href="https://www.zeotechnologies.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.zeotechnologies.com/</link>
	<description>Zeo Technologies</description>
	<lastBuildDate>Mon, 16 Mar 2020 14:58:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.2</generator>
<site xmlns="com-wordpress:feed-additions:1">171227897</site>	<item>
		<title>Our Statement on the Coronavirus.</title>
		<link>https://www.zeotechnologies.com/our-statement-on-the-coronavirus/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 14:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=667</guid>

					<description><![CDATA[<p>The well-being of our employees and clients is our top priority, Zeo will be suspending on-site visits effective Monday, March 16th through Friday March 27th. Due to growing concerns brought upon by COVID-19, we have decided that this decision is in the best interest of our clients, staff and the public at large.   Remote issues, server outages and mission critical problems will still be addressed, however, may require&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/our-statement-on-the-coronavirus/">Our Statement on the Coronavirus.</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="" data-block="true" data-editor="9lp9g" data-offset-key="2ck99-0-0">
<div class="_1mf _1mj" data-offset-key="2ck99-0-0"><span data-offset-key="2ck99-0-0">The well-being of our employees and clients is our top priority, Zeo will be suspending on-site visits effective Monday, March 16th through Friday March 27th. Due to growing concerns brought upon by COVID-19, we have decided that this decision is in the best interest of our clients, staff and the public at large. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="7b85e-0-0">
<div class="_1mf _1mj" data-offset-key="7b85e-0-0"><span data-offset-key="7b85e-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="duhd-0-0">
<div class="_1mf _1mj" data-offset-key="duhd-0-0"><span data-offset-key="duhd-0-0">Remote issues, server outages and mission critical problems will still be addressed, however, may require additional health safety precautions during onsite visits. Routine system repair will be suspended for the 2 week period. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="4bn15-0-0">
<div class="_1mf _1mj" data-offset-key="4bn15-0-0"><span data-offset-key="4bn15-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="4tamr-0-0">
<div class="_1mf _1mj" data-offset-key="4tamr-0-0"><span data-offset-key="4tamr-0-0">We are actively monitoring the novel coronavirus (COVID-19) updates from the World Health Organization and the U.S. Centers for Disease Control and Prevention, and will continue to respond based on the best advice of governments, public health authorities and medical professionals. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="5jque-0-0">
<div class="_1mf _1mj" data-offset-key="5jque-0-0"><span data-offset-key="5jque-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="csvrr-0-0">
<div class="_1mf _1mj" data-offset-key="csvrr-0-0"><span data-offset-key="csvrr-0-0">Please contact us with any questions or concerns. </span></div>
</div>
<p>The post <a href="https://www.zeotechnologies.com/our-statement-on-the-coronavirus/">Our Statement on the Coronavirus.</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">667</post-id>	</item>
		<item>
		<title>Windows 7 end of life: Security risks and what you should do next</title>
		<link>https://www.zeotechnologies.com/windows-7-end-of-life-security-risks-and-what-you-should-do-next/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Tue, 14 Jan 2020 20:51:28 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[windows 7]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=663</guid>

					<description><![CDATA[<p>Microsoft Windows 7 will no longer receive security patches &#8211; and cyber criminals will be looking to exploit it to target businesses that still haven&#8217;t upgraded from Windows 7. Getting your security strategy right is vital. Windows 7 has reached end of life and now isn&#8217;t supported by Microsoft. It means businesses and consumers with PCs running on Windows 7 – which was introduced in 2009 – will no&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/windows-7-end-of-life-security-risks-and-what-you-should-do-next/">Windows 7 end of life: Security risks and what you should do next</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="summary">Microsoft Windows 7 will no longer receive security patches &#8211; and cyber criminals will be looking to exploit it to target businesses that still haven&#8217;t upgraded from Windows 7. Getting your security strategy right is vital.</h2>
<p>Windows 7 has reached end of life and now isn&#8217;t supported by Microsoft. It means businesses and consumers with PCs running on Windows 7 – which was introduced in 2009 – will no longer receive technical assistance, software patches and security updates from Microsoft, unless they want to pay extra.</p>
<p>Microsoft has urged users still running Windows 7 to upgrade to Windows 10 to continue to receive technical support. But despite these warnings coming over a number of years, it&#8217;s estimated that 200 million PC users are still running Windows 7.</p>
<p>Put simply, if a new security vulnerability or software bug is uncovered in Windows 7, Microsoft is no longer obliged to release any sort of patch to fix the issue on the unsupported operating system; and that&#8217;s something that could put individuals and organisations that still rely on Windows 7 in danger from cyberattacks, hacking and malware.</p>
<p>Such is the potential risk posed by this that the UK&#8217;s National Cyber Security Centre – the cyber arm of the GCHQ intelligence service – has issued a warning over the continued use of Windows 7 PCs and laptops, telling users they shouldn&#8217;t use Windows 7 devices when accessing personal data.</p>
<p>&#8220;The NCSC would encourage people to upgrade devices currently running Windows 7, allowing them to continue receiving software updates that help protect their devices,&#8221; an NCSC spokesperson told ZDNet.</p>
<p>&#8220;We would urge those using the software after the deadline to replace unsupported devices as soon as possible, to move sensitive data to a supported device and not to use them for tasks like accessing bank and other sensitive accounts. They should also consider accessing email from a different device.&#8221;</p>
<p>Individuals who haven&#8217;t upgraded to Windows 10 will inevitably face security risks should they stick with Windows 7, but for organisations that continue to use Windows 7, the potential risks are much greater.</p>
<p>Businesses hold data on large groups of people and it&#8217;s not beyond the realms of possibly that attackers could exploit new vulnerabilities uncovered in Windows 7 to maliciously infiltrate networks via phishing or malware attacks and gain access to that data. The global WannaCry ransomware attack of May 2017 demonstrated how vulnerable machines that haven&#8217;t received security updates can be to hackers.</p>
<p>Then last year, researchers detailed BlueKeep, another Windows vulnerability that could have a similar impact. Therefore, by continuing to use an unsupported operating system, organisations are putting themselves at unnecessary risk from major attacks that exploit any new vulnerabilities found in Windows 7.</p>
<p>&#8220;In May, we learned about the BlueKeep vulnerability which, if exploited, could allow an unauthenticated remote attacker to connect to a Windows server via remote desktop protocol (RDP) and execute arbitrary code on the remote server. Both Windows 7 and XP are still at risk of this exploit,&#8221; said Sivan Nir, threat intelligence team leader at Skybox Security.</p>
<p>&#8220;While some vulnerabilities have network-based mitigation alternatives to patching, like applying an IPS-based signature, this will not be the case for the majority of vulnerabilities. Windows XP users are currently sitting ducks. Now, Windows 7 users will join them,&#8221; she added.</p>
<p>Even for organisations that have pushed towards upgrading their PC environment from Windows 7 to Windows 10, there&#8217;s still the potential that there could be some Windows 7 devices left lurking on the network – and it could be a good idea for organisations who&#8217;ve upgraded their architecture to double-check something hasn&#8217;t been missed.</p>
<p>&#8220;The simple fact is that &#8216;if you can&#8217;t measure it, you can&#8217;t manage it&#8217;. In other words, if you don&#8217;t routinely check your own network for what is on it, you&#8217;ll never confidently be able to say what isn&#8217;t there,&#8221; said Paul Ducklin, principal security researcher at Sophos.</p>
<p>Devices ranging from laptops users have brought from home to things like marketing kiosks and virtual billboards could all potentially be running on Windows 7 and could all have potentially been missed in initial examinations of the network.</p>
<p>Organisations should ensure they really do know what&#8217;s on their networks – because with Windows 7 out-of-support, hackers will be looking for any unsupported and unpatched device they can take advantage of as as an entry point into the network.</p>
<p>&#8220;If you don&#8217;t take stock of your network by scanning it and measuring it to see how much Windows 7 you really have, the chances are the cybercrooks will surely do it for you,&#8221; said Ducklin.</p>
<p>Despite Windows 7 reaching end of life, some organisations remain resistant to upgrading, often citing that the change will be complex or expensive. However, by choosing to use an unsupported version of Windows 7, it might only be a matter of time before an organisation finds itself falling victim to cyber attackers looking to target the decade-old operating system.</p>
<p>&#8220;Ultimately, these organisations need to upgrade and the sooner the better. Cyberattacks aren&#8217;t going to disappear overnight; security teams should be working to protect their organisations&#8217; networks. If they don&#8217;t upgrade soon, then worst-case scenario could be another WannaCry-style attack.&#8221; said Nir.</p>
<p>&#8220;Even though businesses are reluctant to purchase more recent versions of Windows, keeping themselves without security updates is incredibly dangerous, and the risk of financial and reputational damage is huge. For those who don&#8217;t have a clear plan to move away from Windows 7, it is about time to create one,&#8221; she said.</p>
<p>Source: <a href="https://www.zdnet.com/article/windows-7-end-of-life-security-risks-and-what-you-should-do-next/" target="_blank" rel="noopener noreferrer">ZDnet.com</a></p>
<p>Zeo can help get your windows 10 upgrade completed making sure your operating system is running at optimal performance, while keeping your business network secure.  <a href="https://www.zeotechnologies.com/contact/"><strong>CONTACT US TODAY!</strong></a></p>
<p>The post <a href="https://www.zeotechnologies.com/windows-7-end-of-life-security-risks-and-what-you-should-do-next/">Windows 7 end of life: Security risks and what you should do next</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">663</post-id>	</item>
		<item>
		<title>Microsoft dissolves links between features and Windows 10 releases</title>
		<link>https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 18:38:28 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=660</guid>

					<description><![CDATA[<p>The company this week made more changes to its Windows 10 development model, changes that have implications for future releases. Microsoft this week reworked its Windows 10 development model, severing links between features and specific releases so that it can deliver the former &#8220;when they are ready.&#8221; &#8220;While features in the active development branch may be slated for a future Windows 10 release, they are no longer matched to&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/">Microsoft dissolves links between features and Windows 10 releases</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The company this week made more changes to its Windows 10 development model, changes that have implications for future releases.</h2>
<p>Microsoft this week reworked its Windows 10 development model, severing links between features and specific releases so that it can deliver the former &#8220;when they are ready.&#8221;<br />
&#8220;While features in the active development branch may be slated for a future Windows 10 release, they are no longer matched to a specific Windows 10 release,&#8221; Brandon LeBlanc, a senior program manager on the Windows Insider team, wrote in a Dec. 16 post to a company blog. &#8220;New features and OS improvements done in this branch during these development cycles will show up in future Windows 10 releases when they are ready.&#8221;</p>
<p>Since Windows 10&#8217;s mid-2015 launch, Microsoft has publicly linked features to their intended releases, usually by introducing them in a blog post connected to the preview build in which they debuted. Microsoft has reinforced those connections by repeatedly trumpeting major new features each time it describes the coming release. On occasion, the linkages have had to be broken as the Redmond, Wash. company retracted a feature previously scheduled for a specific release. But that has been rare.</p>
<p>(One of the most prominent features backed out of a release was Windows Sets, which had been touted in 2017 and slated for a 2018 upgrade but ended up as a no-show.)</p>
<p>The difference between the old way and LeBlanc&#8217;s description of the new may be too subtle to be noticeable by outsiders. In the past, Microsoft almost certainly did not share everything related to scheduling the contents of a then-upcoming-now-past upgrade. Just as certainly, that will be the case going forward. What Microsoft doesn&#8217;t tell customers are, to quote a former Secretary of Defense, the &#8220;unknown unknowns — the ones we don&#8217;t know we don&#8217;t know.&#8221;</p>
<p>But by claiming &#8220;when they are ready&#8221; as the guide for future features, Microsoft implied that at least some had not been so when they were baked into past upgrades. That&#8217;s a puzzling tack, even risky, if customers pause a moment to absorb the phrase and inevitably wonder, &#8220;Wait, weren&#8217;t they ready before?&#8221;</p>
<p>Microsoft&#8217;s newfound stance on &#8220;not until it&#8217;s ready&#8221; was reminiscent of browser makers, who have long used that model as they crank out seven or more new versions annually. For browser developers, it&#8217;s nothing for a feature to miss the intended &#8220;train&#8221; or version; the feature can catch the next six or eight weeks later. That was the whole point of a more-is-better release strategy.</p>
<p>The analogy doesn&#8217;t track exactly, though. That&#8217;s because new Windows 10 features can catch only two trains each year, not seven or eight (as with Chrome) or 12 or 13 (Firefox). Miss one and there&#8217;s at least a six-month wait.</p>
<p>Or double that.</p>
<p>In 2019, Microsoft launched a major release in the spring and a minor one in the fall, making the latter little more than a rerun of the former, a &#8220;service pack&#8221; retread with few new features, none of significance. If Microsoft maintains that cadence in 2020 and beyond, delayed features of substance could be postponed a full year.</p>
<h3>Speaking of major and minor&#8230;.</h3>
<p>Microsoft has yet to answer one of the questions about Windows 10 from 2019: Is the major (spring) and minor (fall) upgrade slate a one-off or the new normal?</p>
<p>More than a month ago, Computerworld predicted that Microsoft would tip its hand when it started previewing the version of Windows that was to follow 2004, the Spring 2020 upgrade that by accounts is finished or nearly so. If Microsoft began seeding Insider participants with early code for 21H1 (Microsoft&#8217;s code name for the upgrade eventually released in Spring 2021), 2020 would repeat the cadence of 2019, a major, then a minor release. But if Microsoft instead slotted next year&#8217;s second upgrade, 21H2, into Insider, it would be evidence that it was reverting to the 2017-2018 model of two relatively equal feature upgrades.</p>
<p>What Computerworld failed to consider — like someone asked to predict a coin flip not accounting for it to end on its edge — was neither. By separating features from specific releases, Microsoft is able to dodge the question of what comes after Windows 10 2004. What it will preview via Insider could be destined for 20H2, 21H1 or neither.</p>
<p>Nor did Le Blanc give any clues. &#8220;We may deliver these new features and OS improvements as full OS build updates or servicing releases,&#8221; he wrote, covering both major (full OS) and minor (servicing) releases.</p>
<p>Cynics might be tempted to see the whole instance — the talk of &#8220;when they are ready&#8221; — as a smokescreen that lets Microsoft put off deciding which upgrade cadence to adopt for 2020. There may be something to that: Microsoft has said it is &#8220;closely monitoring feedback&#8221; from the major-minor &#8220;pilot&#8221; of 2019. What with the year&#8217;s minor refresh, 1909, having been available for just a month and seeing as how businesses have likely done next to nothing with the service pack since, there probably is little to no feedback to monitor at this point. The firm may want more time to evaluate the 2019 cadence and whether it worked for the most important customers, enterprises.</p>
<p>By claiming that no feature will be assigned a specific upgrade before its time, Microsoft can continue to issue new code for Insiders to test without committing to a release model.</p>
<h3>Slow down</h3>
<p>Although it can be dangerous to ascribe rationales to decisions others make — it risks organizing something without coherence — that&#8217;s not stopped Computerworld.<br />
Separating features from releases so that the former is added to the latter only &#8220;when they are ready&#8221; may signal that Microsoft expects a slow, if not necessarily slower, upgrade pace — one that is, if nothing else, unhurried.</p>
<p>(If so, the debacle of Windows 10 1809 must still sting in Redmond more so than it has let on publicly. By slowing down the release tempo, Microsoft and its Insiders get more time to test.)</p>
<p>That, in turn, hints at the slower of the two cadences in question: 2019&#8217;s major-minor releases.</p>
<p>But if that is to be the case, why bother changing the feature-release relationship? Assuming the tempo of this year is retained next, what&#8217;s the purpose of Microsoft saying &#8220;((features)) are no longer matched to a specific Windows 10 release&#8221;?</p>
<p>Is it because the linkage will be increasingly unimportant, and because there will be really just one feature upgrade annually? What, exactly, was the purpose of this year&#8217;s 1909, an update that was in no way an upgrade, what with so few new features, enhancements or improvements over 1903? Was it only to have a release that qualified for 30 months of support for Windows 10 Enterprise users?</p>
<p>That could be arranged without the hassle of building a Potemkin upgrade for the fall: Simply announce that the spring refresh, the one that actually includes new functionality and features, will be supported for 30 months on Windows 10 Enterprise and Windows 10 Education.</p>
<p>And then boot the fall upgrade so that there&#8217;s only one each year.</p>
<p>Source:  <a href="https://www.computerworld.com/article/3510649/microsoft-dissolves-links-between-features-and-windows-10-releases.html" target="_blank" rel="noopener noreferrer">ComputerWorld</a></p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/">Microsoft dissolves links between features and Windows 10 releases</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">660</post-id>	</item>
		<item>
		<title>Cisco issues critical security warnings its Data Center Network Manager</title>
		<link>https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Tue, 07 Jan 2020 17:01:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=643</guid>

					<description><![CDATA[<p>Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions. Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches. DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/">Cisco issues critical security warnings its Data Center Network Manager</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions.</h3>
<p>Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.</p>
<p>DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.  Cisco said that there were three exposures, which it rated as a 9.8 out of 10 on the Common Vulnerability Scoring System, in the DCNM authentication mechanisms that could let a remote attacker bypass authentication and execute arbitrary actions with administrative privileges on vulnerable devices.</p>
<p>Cisco said that the vulnerabilities are independent of each other so exploitation of one is not required to exploit another. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the others, the company said.</p>
<p><strong>The critical weaknesses include:</strong></p>
<p>REST API authentication bypass vulnerability: A vulnerability in the REST API endpoint of Cisco DCNM could allow a remote attacker to bypass authentication. “The vulnerability exists because a static encryption key is shared between installations. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges,” Cisco stated.</p>
<p>SOAP API authentication bypass vulnerability: A weakness in the SOAP API endpoint of Cisco DCNM could let an unauthenticated, remote attacker to bypass authentication on an affected device. Like the REST vulnerability, this problem exists because a static encryption key is shared between installations. Exploits could allow arbitrary actions through the SOAP API with administrative privileges.</p>
<p>Authentication-bypass vulnerability: A weakness in the web-based management interface of Cisco DCNM could also let remote attackers bypass authentication on an affected device. Again, the vulnerability is due to the presence of static credentials that and an attacker could exploit by using them to authenticate against the user interface, Cisco stated. “A successful exploit could allow the attacker to access a specific section of the web interface and obtain certain confidential information from an affected device. This information could be used to conduct further attacks against the system,” Cisco stated.</p>
<p>There are no workarounds that address these vulnerabilities but Cisco has released a DCNM software version that address the problems, the company stated. Cisco said it is not aware of any public announcements about or malicious use of the DCNM vulnerabilities.</p>
<h2>Less severe vulnerabilities</h2>
<p>There were numerous additional DCNM vulnerabilities involving the REST and SOAP APIs  with “high” to “medium” threat ratings including:<br />
REST API SQL-injection vulnerability: A vulnerability in the REST API of Cisco DCNM could let an authenticated, remote attacker with administrative privileges execute arbitrary SQL commands on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API and an attacker could exploit this vulnerability by sending a crafted request to the API, Cisco wrote. A successful exploit could let an attacker view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the system.</p>
<p>REST API path-traversal vulnerability: A vulnerability in the REST API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory-traversal attacks on an affected device. An attacker could exploit this vulnerability by sending a crafted request to the API, which could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. The exposure is due to insufficient validation of user-supplied input to the API, Cisco wrote.</p>
<p>REST API command-injection vulnerability: A weakness in the REST API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying OS. An attacker could exploit this vulnerability by sending a crafted request to the API and could let an attacker execute arbitrary commands on the device with full administrative privileges. The vulnerability is due to insufficient validation of user-supplied input to the API, Cisco stated.</p>
<p>SOAP API SQL-injection vulnerability: A weakness in the SOAP API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to execute arbitrary SQL commands on an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the device. The problem is due to insufficient validation of user-supplied input to the API, Cisco wrote.</p>
<p>SOAP API path-traversal vulnerability: A vulnerability in the SOAP API of DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory-traversal attacks on an affected device. A successful exploit could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. Cisco said the vulnerability is due to insufficient validation of user-supplied input to the API.</p>
<p>SOAP API command injection vulnerability: A vulnerability in the SOAP API of DCNM could let an authenticated, remote attacker with administrative privileges on the DCNM application inject arbitrary commands on the underlying OS. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could let an attacker execute arbitrary commands on the device with full administrative privileges. Cisco said the vulnerability is due to insufficient validation of user-supplied input to the API.</p>
<p>Path-traversal vulnerability: A vulnerability in the Application Framework feature of DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory traversal attacks on an affected device. An attacker could exploit this vulnerability by sending a crafted request to the application. A successful exploit could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. The vulnerability is due to insufficient validation of user-supplied input to the Application Framework endpoint, Cisco stated.</p>
<p>Cisco has released software updates that address the vulnerabilities.</p>
<p>Cisco said it fixed all of the vulnerabilities in Cisco DCNM Software releases 11.3.1 and later.</p>
<p>This story, &#8220;Cisco issues critical security warnings its Data Center Network Manager &#8221; was originally published by <a href="https://www.networkworld.com/" target="_blank" rel="noopener noreferrer">Network World</a>.</p>
<p>The post <a href="https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/">Cisco issues critical security warnings its Data Center Network Manager</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">643</post-id>	</item>
		<item>
		<title>Windows 10 version 2004 gets one step closer to public release</title>
		<link>https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Tue, 07 Jan 2020 16:00:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows update]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=646</guid>

					<description><![CDATA[<p>The November 2019 Update rollout has completed and Microsoft has been working on Windows 10 version 2004, also referred to as 20H1, for early 2020 release. According to a new report, Microsoft finalized the development of Windows 10 version 2004 in December 2019, but it looks like the public rollout won’t happen until the spring. It’s unclear if Microsoft is moving forward with its classic rollout schedule, but right&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/">Windows 10 version 2004 gets one step closer to public release</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The November 2019 Update rollout has completed and Microsoft has been working on Windows 10 version 2004, also referred to as 20H1, for early 2020 release. According to a new <a href="https://youtu.be/-7C_dyx-RRs?t=491" target="_blank" rel="nofollow noopener noreferrer">report</a>, Microsoft finalized the development of Windows 10 version 2004 in December 2019, but it looks like the public rollout won’t happen until the spring.</p>
<p>It’s unclear if Microsoft is moving forward with its classic rollout schedule, but right now it simply seems like the public launch won’t happen earlier than the spring.</p>
<p>Although Microsoft has most likely finalized the development of the next major update in December 2019, Windows 10 version ‘2004’ suggests that the update could go live for devices in April or May.</p>
<p>While other details are not yet available, Windows 10 Build 19041 is said to be the final candidate or the foundation of the upcoming cumulative updates. Don’t be surprised if a slightly newer build is tested or additional patches are released for this particular build over the next couple of months.</p>
<p>It’s worth noting that Windows 10 Build 19041 has dropped preview watermark on the desktop, which suggests the update is close to completion.</p>
<p>Also, Microsoft hasn’t commented on the current status of Windows 10 version 2004 ‘RTM’ candidate and 20H1 will receive further improvements ahead of its spring launch.</p>
<p>After Windows 10 20H1, Microsoft is expected to roll out Windows 10 20H2 in the second half of 2020 and it could be another minor release like Windows 10 November 2019 Update.</p>
<h2>Windows 10 version 2004 is a major update</h2>
<p>November 2019 Update felt light on new features compared to prior releases. For Windows 10 v2004, there’s a grab bag of new additions and noticeable performance improvement.<br />
One of the key features of the update is Cloud Reset. If you don’t have a recovery drive and local reset is not working for you, you now have the option of entirely re-downloading Windows 10 from Microsoft website during a reset operation.</p>
<p>Another new feature is bandwidth limits for Windows Update. This gives users more control over bandwidth used for downloading Windows Update and Microsoft Store app updates. With Windows 10 20H1, you can set absolute bandwidth limit in Mbps and throttle downloading of updates more accurately.</p>
<p>Microsoft has also focused on performance and rough areas of Windows in this release. For instance, Windows search will get faster on PCs by eliminating excessive disk and CPU usage.</p>
<p>Source:  <a href="https://www.windowslatest.com/2020/01/02/windows-10-version-2004-rtm-rumour/" target="_blank" rel="noopener noreferrer">WindowsLatest.com</a></p>
<p>The post <a href="https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/">Windows 10 version 2004 gets one step closer to public release</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">646</post-id>	</item>
		<item>
		<title>Welcome to our new website</title>
		<link>https://www.zeotechnologies.com/welcome-to-our-new-website/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 06 Feb 2019 07:21:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.zeotechnologies.com?p=211</guid>

					<description><![CDATA[<p>If you are reading this blog post, you must realize there is something different about our website. Our new website launched last Wednesday, the 6th of February after a lot of hard work and dedication. We have added a colorful boost with up-to-date information and upgraded user accessibility.</p>
<p>The post <a href="https://www.zeotechnologies.com/welcome-to-our-new-website/">Welcome to our new website</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you are reading this blog post, you must realize there is something different about our website. Our new website launched last Wednesday, the 6th of February after a lot of hard work and dedication. We have added a colorful boost with up-to-date information and upgraded user accessibility.</p>
<p>The post <a href="https://www.zeotechnologies.com/welcome-to-our-new-website/">Welcome to our new website</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">211</post-id>	</item>
		<item>
		<title>Microsoft Releases Silverlight 5: The Final Version?</title>
		<link>https://www.zeotechnologies.com/microsoft-releases-silverlight-5-the-final-version/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Fri, 13 Apr 2012 13:49:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">http://www.zeotechnologies.com?p=171</guid>

					<description><![CDATA[<p>As widely discussed last month, Flash has already been squeezed out of the front end of the mobile experience. Now here comes Silverlight to try to fix its place among developers&#8217; favorite framework tools, but will its place at the front of sites be relevant for long? Gone in a Flash Silverlight has only ever had, at best, 65% penetration on the desktop and minimal mobile presence, meaning that&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-releases-silverlight-5-the-final-version/">Microsoft Releases Silverlight 5: The Final Version?</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As widely discussed last month, Flash has already been squeezed out of the front end of the mobile experience. Now here comes Silverlight to try to fix its place among developers&#8217; favorite framework tools, but will its place at the front of sites be relevant for long? <span id="more-171"></span></p>
<p><strong>Gone in a Flash</strong></p>
<p>Silverlight has only ever had, at best, 65% penetration on the desktop and minimal mobile presence, meaning that developers using it were writing for a smaller audience, compared with Flash and Java. So, it is not much of a surprise to find that Silverlight&#8217;s fifth release happened with more of a nudge out the door than an explosive presentation like the early versions.</p>
<p>However, if Windows Phones take off, then there is still a future for Silverlight, along with Expression and Visual Studio, to create applications for that growing user base. The new version offers plenty of features for both desktop web use and mobile app development.</p>
<p><strong>Feature-Rich</strong></p>
<p>New features in Silverlight 5 include hardware GPU decoding of H.264 media, plus an improved graphics stack with 3D support in Windows with GPU access to draw vertex shaders and low-level 3D primitives, for gaming-class graphics within the browser. It also adds the a secure &#8220;trusted app&#8221; model to the browser.</p>
<p>Those features help keep it on a vague par with HTML 5, which Microsoft is happily supporting in its new browsers, but the lack the shouting &#8220;look-at-me&#8221; news and Microsoft&#8217;s silence about its plans beyond this version suggest that Silverlight has a limited future.</p>
<p>Resource: http://www.cmswire.com/cms/customer-experience/microsoft-releases-silverlight-5-the-final-version-013806.php</p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-releases-silverlight-5-the-final-version/">Microsoft Releases Silverlight 5: The Final Version?</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">171</post-id>	</item>
		<item>
		<title>Oracle previews MySQL 5.6</title>
		<link>https://www.zeotechnologies.com/oracle-previews-mysql-5-6/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 11 Apr 2012 20:21:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">http://www.zeotechnologies.com?p=64</guid>

					<description><![CDATA[<p>Offering a glimpse of the new features some database administrators will be working with before too long, Oracle has posted a preview version of the next MySQL relational database management system. The Development Milestone Release (DMR) for MySQL 5.6 comes with a number of new and still experimental features for the open source database system, including improved replication and the ability to bypass the SQL framework for faster data&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/oracle-previews-mysql-5-6/">Oracle previews MySQL 5.6</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Offering a glimpse of the new features some database administrators will be working with before too long, Oracle has posted a preview version of the next MySQL relational database management system.</p>
<p>The Development Milestone Release (DMR) for MySQL 5.6 comes with a number of new and still experimental features for the open source database system, including improved replication and the ability to bypass the SQL framework for faster data access.  <span id="more-64"></span></p>
<p>As part of the open source LAMP stack &#8212; which also includes Linux, Apache and Perl, Python and PHP &#8212; MySQL is widely used in Web applications. Large, popular sites such as Twitter, Facebook and Flickr use MySQL.</p>
<p>With this pending version of MySQL 5.6, Oracle and outside developers have strengthened the way the software handles data replication, as well as potentially shortening the software&#8217;s response times to complex queries.</p>
<p>In regards to replication, MySQL introduces Global Transactions Identifiers (GTIDs), which assure the system can track data as it is replicated across different servers. GTIDs will ease the process of automatically switching to a duplicate server should the original fail. Third-party software now offers this capability, but this will be the first time MySQL itself can do the job.</p>
<p>MySQL 5.6 offers a number of new features that should speed queries. It can now consolidate multiple queries or result sets into a single unit of work. It can assign the current date and time as the default for DATETIME columns, eliminating the need for the application to do that work itself. The software can also speed query time by determining the best order of execution for Filesort and ORDER BY queries.</p>
<p>Another new benefit for developers: MySQL can also deliver query results in the popular JSON (JavaScript Object Notation) format, useful for integrating data to Web applications.</p>
<p>In addition to these new features, which will be ready for production duty with the full release of MySQL 5.6, the software also includes some experimental features that may appear in future versions of the software, courtesy of Oracle&#8217;s MySQL Labs. Developers can test them now to see how well they work.</p>
<p>Perhaps the most notable feature is an API (application programming interface) that allows applications to directly access data from the core InnoDB database engine, rather than going through the SQL-based interface. The API replicates the interface of the open source memcache caching technology used by Facebook and others for speedy access to large amounts of data.</p>
<p>Such an API may bring MySQL on par with the easy accessibility offered by NoSQL databases currently gaining favor in Web applications, said Tomas Ulin, Oracle vice president of MySQL engineering,in an interview last year.</p>
<p>The post <a href="https://www.zeotechnologies.com/oracle-previews-mysql-5-6/">Oracle previews MySQL 5.6</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">64</post-id>	</item>
		<item>
		<title>Flashback Virus</title>
		<link>https://www.zeotechnologies.com/hello-world/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 11 Apr 2012 14:41:51 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">http://www.zeotechnologies.com?p=1</guid>

					<description><![CDATA[<p>Think your Apple computer is immune? Think different. A nasty bit of malware called Flashback has infected approximately 600,000 Macintosh computers worldwide through a Java security flaw, according to a Russian security firm &#8212; and Apple itself is hard at work on a fix, the company said Tuesday. “Apple is developing software that will detect and remove the Flashback malware,” the company wrote in a support document on its&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/hello-world/">Flashback Virus</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Think your Apple computer is immune? Think different.</p>
<p>A nasty bit of malware called Flashback has infected approximately 600,000 Macintosh computers worldwide through a Java security flaw, according to a Russian security firm &#8212; and Apple itself is hard at work on a fix, the company said Tuesday.</p>
<p>“Apple is developing software that will detect and remove the Flashback malware,” the company wrote in a <a href="http://support.apple.com/kb/HT5244?viewlocale=en_US&amp;locale=en_US">support document on its site</a> addressing the Flashback malware. <span id="more-1"></span></p>
<p>“Apple released a Java update on April 3, 2012 that fixes the Java security flaw for systems running OS X v10.7 and Mac OS X v10.6” &#8212; the most recent versions of the operating system, the company noted. But software will still be required to remove Flashback from systems that are already infected.</p>
<div>Read more: <a href="http://www.foxnews.com/scitech/2012/04/11/apple-writing-software-to-rid-half-million-macs-flashback-virus/#ixzz1rl5FV8h4">http://www.foxnews.com/scitech/2012/04/11/apple-writing-software-to-rid-half-million-macs-flashback-virus/#ixzz1rl5FV8h4</a></div>
<p>The post <a href="https://www.zeotechnologies.com/hello-world/">Flashback Virus</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1</post-id>	</item>
	</channel>
</rss>
