Internet Health

The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.  

RSS Citrix Blogs

  • Citrix Director – Your Daily Management Console January 6, 2016Since Director was first released back in late 2010 with XenDesktop 5.0 (known as Desktop Director at the time), the web-based console has helped keep XenDesktop and XenApp sites running well. Help desk staff use it to monitor, reset and shadow user sessions. Administrators can track performance trends and view usage details over time. It’s […] Allen Furmanski
  • NEW! Receive Workspace Cloud Apps & Desktops Service Alerts January 6, 2016Citrix environment administrators often worry about the smallest of issues that could impact the productivity of their organizations. What if there were a way to know of any anomalies ahead of time, so you could be proactive and prevent any outages? If that’s got you thinking, it means you have definitely wondered of such a situation. Worry […] Harsh Gupta
  • The Geeks of Summit 2016 January 5, 2016Speakers for Geek Speak @ Summit 2016 feature people whose work push technological boundaries; their work and vision have the ability to change how we interact with technology—how we architect, virtualize and even gain insight into resources applicable to designing VDI solutions while transcending legacy IT. They will present highly energized presentations with insights and […] Fabian Wright
  • Finding VDI Thin Clients Just Got Easier January 4, 2016A warm welcome to the New Year & a happy and prosperous 2016 to all! I’d like to share a few welcoming changes we made during November including the launch of new product category page for thin clients. The changes mean that, when choosing thin clients, you should be able to transparently evaluate the performance […] Sagnik Datta
  • Citrix: Powering the Businesses that Make the World Go ‘Round January 4, 2016Citrix products power the systems of some of the world’s biggest tech companies. Did you know that they also help a lot of other businesses that you use every day do their jobs better; like hospitals, schools, and banks? It’s true! Virtualization solutions including XenDesktop and XenApp, paired with NetScaler, Receiver and XenServer, help doctors treat patients with […] Jerrica Lohrum
  • Enterprise Software Cloudification January 4, 2016More and more, software functions traditionally executed by the client are now pushed to the server and, moreover, to the Cloud. One such example is media transformation, like when YouTube allows users to upload a video in one of the several formats, transforms and then serves it in number of formats and resolutions for all common video […] Alexandr Smelov
  • MTM & the Power of Their Citrix Partnership December 29, 2015Our customer was in absolute technological pain. Citrix partner and specialist, MTM Technologies, recently worked with a large Midwestern news organization that helped them realize the value of having multiple Citrix specializations. According to Bill Kleyman, MTM vice president of strategy and innovation, the news organization had an outdated datacenter, old virtualization solutions and lacked effective centralized access. […] John Carey
  • XenApp & XenDesktop 7.7: Intro to Zones within FMA December 29, 2015We have just announced XenApp & XenDesktop 7.7. One of the key features with this release is something called Zones, and rather than writing a long, detailed blog post, I decided to try something a little different. Instead, I have opted for a video blog, which will take you–at a high level–through the basic concepts of zoning. […] Craig Hinchliffe
  • Extend your XenApp Deployments to Microsoft Azure: Learn How @Summit December 28, 2015As a Citrix Service Provider, you’re always on the lookout for ways to deploy desktop and application services quickly, reliably, and cost-effectively. By deploying Citrix XenApp and XenDesktop solutions on Microsoft Azure, you can supplement resources in your on-premise datacenter with Azure Infrastructure-as-a-Service (IaaS) resources, making your IT organization more agile and able to respond […] Loay Shbeilat
  • Troubleshooting & Maintaining the Heart of PVS: Your vDisk December 21, 2015In the past few years, we’ve seen some great features added to Citrix Provisioning Services. Performance and scalability have been greatly improved, as well as interoperability with Hypervisors and other technologies. But the fact remains that the heart of your Citrix Provisioning Services implementation is your vDisk. We’ve all seen them at least one time … those […] Raul Davila

RSS Sans News Feed

RSS Microsoft Security Feed

  • An error has occurred, which probably means the feed is down. Try again later.

RSS Cyber Security Alerts

  • TA15-337A: Dorkbot December 3, 2015Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in […] US-CERT
  • TA15-314A: Compromised Web Servers and Web Shells – Threat Awareness and Guidance November 11, 2015Original release date: November 10, 2015 | Last revised: November 13, 2015 Systems Affected Compromised web servers with malicious web shells installed Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert outlines […] US-CERT
  • TA15-286A: Dridex P2P Malware October 13, 2015Original release date: October 13, 2015 | Last revised: October 15, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of […] US-CERT
  • TA15-240A: Controlling Outbound DNS Access August 28, 2015Original release date: August 28, 2015 | Last revised: August 30, 2015 Systems Affected Networked systems Overview US-CERT has observed an increase in Domain Name System (DNS) traffic from client systems within internal networks to publically hosted DNS servers. Direct client access to Internet DNS servers, rather than controlled access through enterprise DNS servers, can […] US-CERT
  • TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations August 1, 2015Original release date: August 01, 2015 Systems Affected Microsoft Windows Systems, Adobe Flash Player, and Linux Overview Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing campaigns targeting U.S. Government agencies and private sector organizations. This alert provides general and phishing-specific […] US-CERT
  • TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities July 14, 2015Original release date: July 14, 2015 | Last revised: July 15, 2015 Systems Affected Microsoft Windows systems with Adobe Flash Player installed. Overview Used in conjunction, recently disclosed vulnerabilities in Adobe Flash and Microsoft Windows may allow a remote attacker to execute arbitrary code with system privileges. Since attackers continue to target and find new […] US-CERT
  • TA15-120A: Securing End-to-End Communications April 30, 2015Original release date: April 30, 2015 Systems Affected Networked systems Overview Securing end-to-end communications plays an important role in protecting privacy and preventing some forms of man-in-the-middle (MITM) attacks. Recently, researchers described a MITM attack used to inject code, causing unsecured web browsers around the world to become unwitting participants in a distributed denial-of-service attack. […] US-CERT
  • TA15-119A: Top 30 Targeted High Risk Vulnerabilities April 29, 2015Original release date: April 29, 2015 | Last revised: May 06, 2015 Systems Affected Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL.  Overview Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of targeted attacks are preventable [1].This Alert provides information on […] US-CERT
  • TA15-105A: Simda Botnet April 15, 2015Original release date: April 15, 2015 Systems Affected Microsoft Windows Overview The Simda botnet – a network of computers infected with self-propagating malware – has compromised more than 770,000 computers worldwide [1].The United States Department of Homeland Security (DHS), in collaboration with Interpol and the Federal Bureau of Investigation (FBI), has released this Technical Alert […] US-CERT
  • TA15-103A: DNS Zone Transfer AXFR Requests May Leak Domain Information April 13, 2015Original release date: April 13, 2015 | Last revised: April 15, 2015 Systems Affected Misconfigured Domain Name System (DNS) servers that respond to global Asynchronous Transfer Full Range (AXFR) requests. Overview A remote unauthenticated user may request a DNS zone transfer from a public-facing DNS server. If improperly configured, the DNS server may respond with […] US-CERT