Wednesday, November 27, 2013

Is simply having Java installed dooming you to data theft?

Java is a difficult beast that is causing a lot of concern in the CTO, CIO and CSO offices. Mitigating Java risk, including disabling Java, is easier said than done in today's business world. Java is embedded into critical business applications, which enable organizations to stay competitive. Unfortunately, Java zero-days and vulnerabilities allow bad guys to constantly pwn computers, and patch management, while often touted as a solution, simply isn't working. This is precisely why over the past few months the we researched and documented the gravity of the Java security risk.

Our initial research reviewed real-time telemetry collected from our ThreatSeeker Intelligence Cloud to determine which versions of Java are actively used across tens of millions of endpoints. The results of our research were frightening to say the least:
  • 93 per cent of enterprises were vulnerable to known Java exploits
  • Nearly 50 per cent of enterprise traffic is using a version of Java more than two years out of date
  • In monitoring patch progress, we discovered that within months of a critical Java release, only 7 per cent of enterprises had adopted the latest version of Java
  • 83.86 per cent of enterprise browsers have Java enabled to deliver Java-based content
Nearly 40 per cent of users are not currently using the most up-to-date versions of Flash. So, if roughly 10 per cent of enterprises or less are proactively managing known critical Java vulnerabilities through patch management and version control, what security measures are the other 93 per cent relying on to protect their systems from compromise and data theft?
Java Exploits and Zero Days Popular in Crime Kits
Take a look at the control panel for any crime kit and you'll see that Java exploits are one of the most successful gateways into an organization to infect machines and steal sensitive data. However, the challenge for most businesses isn't the initial discovery of Java vulnerabilities, but the integration of zero-days into exploit kits.
Cybercriminals can rent a hosted exploit kit with zero-days already in it, for as little as $200 a week. Fast integration of zero-day vulnerabilities provides attackers with an unlimited capacity to reconstruct exploits that bypass traditional signature methods like antivirus, firewalls and other controls. Exploit kits have taken a complex and costly process and reduced the effort, expertise and cost previously required to take advantage of vulnerabilities. The barrier to entry for cybercriminals is now incredibly low. Well-made kits do almost all the work for you, right down to hosting the binary, if you choose.
The results of our research indicate that the patch management process is woefully slow. Patch management can be a complicated process for an organization, especially those with remote workers. This is exactly why real-time security models are absolutely essential. Patch management (even the best) and antivirus simply cannot keep up with the ongoing barrage of zero-days and exploits created to take advantage of the next generations of attacks.
How Java Exploits are Used in the Seven Stages of Advanced Threats
When you take the approach of looking at the entire attack chain for suspicious behavior, rather than waiting and hoping to catch something on the last step of the process, you have many more opportunities to spot and disrupt an attack - even if it's malware you've never seen before. Here is a recent example:
This year, cybercriminals sought to take advantage of the horrific attacks at the Boston Marathon to infect computers using the RedKit Exploit Kit. Let's take a look at this campaign, to understand how Java exploits are used in the Seven Stages of Advanced Threats.
Stage 1: Reconnaissance
Like many other campaigns, in this example, the cybercriminals are opportunists looking to monitor news and breaking events for a chance to launch a successful attack. The bombings at the Boston Marathon provided the opportunity for this specific campaign.
Stage 2: Lures
The bad actors then generated a spam email campaign with sensational headlines to exploit human interest in learning more about the situation, including:
  • 2 Explosions at Boston Marathon
  • Aftermath to explosion at Boston Marathon
  • Boston Explosion Caught on Video
  • BREAKING - Boston Marathon Explosion
  • Runner captures. Marathon Explosion
  • Video of Explosion at the Boston Marathon
Stage 3: Redirects
Once the link is clicked, the victim is brought to a page with video coverage of the breaking event. Unbeknownst to them, a hidden iframe redirects them to an exploit page, in this case:
  • http:///news.html
  • http:///boston.html
Stage 4: Exploit Kits
The RedKit Exploit Kit used in this attack scans for applicable vulnerabilities and in this occurrence, exploits an Oracle Java 7 Security Manager bypass vulnerability (CVE-2013-0422) in order to deliver a file to the visitors computer.
Stage 5: Dropper Files
This particular campaign used a non-standard dropper file, a downloader in the Win32/Waledac family to install two bots: Win32/Kelihos and Troj/Zbot.
Stage 6: Call Home
From here, the machine notifies the bot herder and validates communications.
Stage 7: Data Theft
In what can be the most dangerous stage for businesses, the machine is now set for long term data interception on the endpoint or device, passing through the device or accessible by the device. This also can change the endpoint into a new platform for new attacks like the sending of unsolicited email or the unwilling participation in distributed denial of service (DDoS) attacks.
By looking at the entire threat chain, CSOs have multiple opportunities to spot risks and stop them before data is compromised. This approach is much more effective at spotting and stopping attacks rather than simply trying to spot an unknown object. With multiple analytics looking at every link in the threat chain, even zero-day attacks can be stopped.
Today's businesses need these layers of analytics, with each layer making it much more difficult for the bad guys to penetrate your networks and steal your data, minimizing the risk that Java presents to the enterprise.

src: http://www.abc.net.au/technology/articles/2013/11/27/3900108.htm
By Gerry Tucker ABC Technology and Games 27 Nov 2013

Sunday, November 10, 2013

Easy , Understandable and Simple definition of - Big Data




 Post by PhPRinG.

Saturday, November 9, 2013

Facebook open sources its SQL-on-Hadoop engine, and the web rejoices

Facebook has open sourced Presto, the interactive SQL-on-Hadoop engine the company first discussed in June. Presto is Facebook’s take on Cloudera’s Impala or Google’s Dremel, and it already has some big-name fans in Dropbox and Airbnb.

Technologically, Presto and other query engines of its ilk can be viewed as faster versions of Hive, the data warehouse framework for Hadoop that Facebook created several years ago. Facebook and many other Hadoop users still rely heavily on Hive for batch-processing jobs such as regular reporting, but there has been a demand for something letting users perform ad hoc, exploratory queries on Hadoop data similar to how they might do them using a massively parallel relational database.

Presto is 10 times faster than Hive for most queries, according to Facebook software engineer Martin Traverso in a blog post detailing today’s news.
Src: facebook
Technologically, Hive and Presto are very different, namely because the former relies on MapReduce to carry out its processing and the latter does not. This is by and large the difference that makes Presto suitable for low-latency queries while the MapReduce-based Hive can take a long time — especially over Facebook’s many petabytes of data — because it must scan everything in the cluster and requires lots of disk writes. Presto also works with a variety of non-Hadoop-Distributed-File-System data sources and uses ANSI SQL compared with Hive’s SQL-like language.

Presto is currently running in numerous Facebook data centers and the company has scaled a single cluster up to 1,000 nodes. More than 1,000 employees run queries on Presto, and they do more than 30,000 of them per day over a petabyte of data. Traverso’s post gives a lot more details about how Presto works and how Facebook plans to improve its speed and functionality in the near term.
A Presto screenshot

However, I think the most-interesting part about Presto might be less technological and more about its effects on the Hadoop industry, which is projected to be worth tens of billions of dollars in the next few years. The mere fact that Facebook chose to create a website for the project says something about how serious the company takes it. And although Facebook has technically open sourced quite a few Hadoop improvements over the years, this is the first since Hive where I’ve noticed such fast (if any) uptake from external companies.
It will be interesting to watch how, if at all, Presto affects adoption of Cloudera’s Impala, Hortonworks’ Stinger project, Pivotal’s HAWQ or any other of the myriad SQL-on-Hadoop engines currently making fighting for mindshare. The fact that Presto is open source and ready to use certainly has to be a big draw for some users, and could help it establish a solid user base while other technologies are still coming to be.
Facebook isn’t looking to compete with other projects and doesn’t have a horse in the race from a business perspective — it will likely go along using and improving Presto at its own pace regardless what happens — but serious uptake could inspire the Hadoop vendors to change their strategies when it comes to the SQL engines they support. Much of the early innovation from Hadoop came from power users (including Yahoo and Facebook) rather software companies, and it’s possible we haven’t seen the end of that trend.

src:  http://gigaom.com/2013/11/06/facebook-open-sources-its-sql-on-hadoop-engine-and-the-web-rejoices/#!

Friday, September 13, 2013

Top 5 Books on Spring Framework and Spring MVC

Here is my list of top 5 books to learn Spring MVC and Spring framework.


Expert Spring MVC and Web Flow
5 good books on Spring MVC frameworkExpert Spring MVC and Web Flow by Seth Ladd, Darren Davison, Steven Devijver, Colin Yates is one of my favorite book on Spring MVC and arguably one of the best book in Spring MVC. It covers both Spring MVC and web flow in depth and explains each concept with simple explanation. I highly recommend this book to any beginner which is learning Spring MVC framework. There chapter on Spring fundamentals is also one of the best way to learn dependency injection and inversion of control in Spring and I myself learned DI and IOC from that chapter. This is the Spring book I recommend to any Java web developer who is familiar with Java web technology or any MVC framework like Struts. Only missing point is that this book only covers Spring MVC and web flow and does not cover whole Spring framework. Also, in my opinion there chapter on Spring Fundamentals is one of the best way to start with Spring framework. 
Spring Recipes – A problem solution approach
list of books to learn spring framework in JavaThis is another good book on Spring Framework which I like most. This book is collection of Spring recipes or How to do in Spring Framework. In every Spring recipes you learn some new concept and it also helps to learn Spring fundamental e.g. there recipes help me to learn when to use ApplicationContext and BeanFactory and  Constructor vs Setter Injection. Key highlight of this book is, It’s problem solution approach. Since it’s teaching style is different than any conventional book, it’s a good supplement along with Spring documentation. This books also provide excellent coverage of many spring technologies e.g. Spring Security, Spring JDBC, Spring and EJB, JMX, Email and have a chapter on scripting as well. If you like books on problem solution approach than you will enjoy reading Spring Recipes, not the best book on Spring but still a good one and will definitely made to any list of top 10 books on Spring framework.
Professional Java Development with the Spring Framework
best book to learn spring mvc and springMain highlight of this book is that one of it’s author is Rod Johnson, who is also created Spring framework. So you get his view on Spring and How spring should be used used, what are best practices to follow on Spring e.g. When to use Setter Injection and Constructor Injection. This book provide good coverage of Spring framework including Spring core, Spring MVC, Spring ORM support etc. Also examples in this book is easy to understand and it also focus on Unit tests which is good practice. Though I don’t rate this book too high, like if your focus is Spring MVC than Expert Spring MVC and Web flow is the best Spring book to follow. If you are looking an overview on Spring features, than Spring Documentation is best book to read. As I said positive point of this book is knowing Spring from author Rod Johnson himself. Once you have basic knowledge of Spring framework, you can read this book to get authors view.
Pro Spring 3.0
top book on spring framework for Java developerPro Spring is one of the best book to learn Spring Framework from start. This book is massive and tries to cover most of the Spring concept e.g. Spring fundamentals, JDBC Support, Transaction support, Spring AOP, Spring Web MVC, Spring Testing etc. Good point about this book is that it’s conventional and easy to read, it explains concept, followed with good example, which is good way to learn. What is worrying is sheer size, I haven’t completed this book till date and only refer with some topic. Good point is that this book covers Spring 3.1 which is the latest stable version. As I said this is one of the most comprehensive book on Spring framework and any one who wants to learn Spring framework by following just one book, Pro Spring 3.0 is a good choice.
Spring Documentation
Spring framework documentation is located on Springsource website, here is the link for Spring documentation for Spring framework 3.1 in HTML format http://static.springsource.org/spring/docs/3.1.0.M2/spring-framework-reference/html/. Though this is not a book, Spring tutorials and Spring documentation are another two source of learning Spring framework, which I highly recommend. Main reason for that is they are free and highly comprehensive and has lot of examples to support various concept and feature. Also one of the best part of reference documentation is that they are updated with the latest Spring release available. Updating books with every new version of Spring is rather difficult than updating documentation. Spring documentation combine with any Spring book is best way to learn Spring framework. For learning Spring MVC, you can combine Spring documentation with earlier spring book, Expert Spring MVC and Web Flow.

Spring in Action
Lots of my readers suggested  Spring in Action from manning, as one of the best book to learn Spring. Seems like a worth reading book. I have seen it's content briefly and it does cover both Spring and Spring MVC. So if you are looking for common book for complete Spring framework, Spring in Action is another one.

These are some of the best books to learn Spring framework and Spring MVC. Spring documentation is special  because of update and new releases of Spring Framework. Given popularity of Spring Framework for new Java development work, every Java developer should make effort to learn Spring framework.

Wednesday, July 17, 2013

Struts 2 Dojo Plugin for Maven

DropdownList in Struts2

http://css.dzone.com/articles/nodejs-good-parts-skeptics

http://css.dzone.com/news/dojo-toolkit-maven-repository

http://www.sitepen.com/blog/2011/08/11/how-do-you-use-the-dojo-store-jsonrest-api-with-spring/

Maven Dojo
http://mvnrepository.com/artifact/org.dojotoolkit/dojo-maven/1.9.0

http://css.dzone.com/news/dojo-toolkit-maven-repository

https://github.com/jlgrock/ClosureFrameworkDojoExample/blob/master/pom.xml

http://svn.dojotoolkit.org/src/maven/trunk/dojo/pom.xml

http://codesearch.ruethschilling.info/xref/apache-foundation/sling/contrib/extensions/dojo/pom.xml

http://stackoverflow.com/questions/10149539/conditional-configuration-in-maven-pom-xml

http://www.ohloh.net/


DropdownList

http://www.mahieu.org/?p=3

http://viralpatel.net/blogs/struts-2-ajax-tutorial-example-drop-down/

http://javachamp.blogspot.com/2008/06/struts-2-ajax-drop-down-example.html

http://www.coderanch.com/t/549953/Struts/create-set-interdependent-drop-lists

http://stackoverflow.com/questions/5334965/how-to-create-struts-drop-down-list

http://www.mkyong.com/struts2/how-to-auto-select-drop-down-box-value-in-struts-2/

http://www.mkyong.com/struts2/struts-2-sselect-drop-down-box-example/


Important
http://stackoverflow.com/questions/4996905/comparing-two-valuestack-string-values-in-jsp-struts2

Friday, June 28, 2013

Test Driven Development (TDD)

Improving Code Quality with PMD and Eclipse

http://www.eclipsezone.com/articles/pmd/


 PMD is a static code analyzer for Java. Developers use PMD to comply with coding standards and deliver quality code. Team leaders and Quality Assurance folks use it to change the nature of code reviews. PMD has the potential to transform a mechanical and syntax check oriented code review into a to dynamic peer-to-peer discussion.
This article looks at PMD as an Eclipse plugin and the ways it can be used to improve the code quality and shorten the code review process. Since every organization has a unique set of coding conventions and quality metrics, it also demonstrates how to customize PMD to meet these needs.