More Ransomware Protection with ownCloud: Combat WannaCry, Petya & Co.

Bild von Hacker

After the waves of attack by ransomware WannaCry in May and its successor Petya in June, agitation prevails in many IT departments. The economic damage is now already in the billions and CIOs are under great pressure to protect companies and their users from new attacks. But how can you protect your company against these attacks, which have the potential to destroy all files?

In the owncloud blog we announced a number of new features to better protect your data. As the free community edition of ownCloud is also available in the Univention App Center, I am glad to share this inform with you here today:

Good bye Graduate Prize! Hello Future Ideas!

A total of 9 times we have now awarded the Univention Prize. The objective of this competition was to support the employment of Open Source in a university context and make it known to a broad public. The response impressed us. In some years, there were almost 40 bachelor, master or diploma theses submitted for the competition.

And the broad press coverage in well-known media such as heise.de, the Linux Magazine, Pro-Linux or golem.de certainly contributed to deliver the message to a wide audience that Open Source has nothing to do with spaghetti code, idealism or even stubborn dogmatism. So you could say: The goal is reached!

RADIUS – a Powerful Tool for Safe Mobile Device Accesses

Picture of mobile with earphones

Workplaces become more remote and mobile while individuals are increasingly equipped with (private) mobile devices. In this context it is good to know about RADIUS, because private end devices require simple access to an organization’s network. At the same time you need to avoid that these devices open the doors for malware or leakage. RADIUS is such an instrument for the construction of secure, decentralized work structures and equally a powerful tool for the authentication of mobile device accesses to networks.

In the following, we like to give you a brief understanding of what RADIUS is and how you can use it with UCS.

OpenVPN to Secure your Samba Authentications Automatically

Login Illustration

Samba 4 has become the tool of choice for companies with diverse clients that seek a Linux-based central identity management. However, a growing number of organizations are offering work from home options and manage distributed operations like construction companies with a computer at every construction site or an insurance provider with several offices. The securing of all authentication processes when employees log in your network also from outside, is critical to protect your data.

But how to do that?

You need to add a VPN solution which starts before the login if you want to enjoy the advantages of single sign-on and policies that Samba provides. The following how-to will describe how to add OpenVPN to an existing Samba 4 installation to automatically secure client authentications over an untrusted network.

Cool Solution – Squid as Reverse SSL Proxy

IT Netzwerk Sicherheit Illustration

What is Squid?

Squid is a caching proxy employed primarily for web content delivered via the protocols HTTP, HTTPS, and even FTP. Squid stores websites and their content in a temporary cache, making them available to a number of clients simultaneously. Consequently, the use of Squid makes it possible to speed up the response times when opening websites considerably and reduce data volumes at the same time. In addition to this core function, Squid also boasts other extensive options such as control of users’ access to the Internet (ACLs). This is a scenario which is particularly interesting for use in schools and other public facilities as well as for client authentication. Users and devices are only permitted access to the Internet if they can authenticate themselves against the proxy.

Brief Introduction: High Availability

Photo of a hospital resuscitation icon

When recently assisting a customer in choosing a new cloud service provider, the providers of choice offered 95%, 99%, and 99.9% availability labeling their service “High Availability”. For the human brain and considering a scale from 0% to 100% all of these numbers sound rather good, and we would naturally think, that these services almost never fail. However, let us have a closer look at what high availability truly means for IT environments and how it affects UCS and let us think about why you should also consider the time to recovery and planned downtimes.

Asterisk Universal Communication Solution for UCS – The Cost-Effective and Flexible Alternative to VoIP

Logo asterisk4ucs

Asterisk is a leading, freely available voice over IP (VoIP) solution that companies can employ as an Open Source software without license fees. Originally designed by Mark Spencer at the U.S. company Digium in 1999, the solution is now being continually further developed by a growing development community around the world. In addition, it offers high functionality and boasts an extensive basis for telephony, unified messaging, and third-party systems.

Development of a Central IT Structure With Integration of Local School Servers in the Kassel District – Preparation is Everything!

Foto des Kreishauses vom Landkreis Kassel

The school IT service in the rural district of Kassel, Germany, is responsible for the maintenance and operation of the IT infrastructure in 72 schools counting a total of 25,000 pupils and 2,000 members of staff.

Support of decentralized structures as rural district

Our IT support is based in the media center in Hofgeismar, but as a rural district we are of course faced with certain challenges presented by the distribution of the schools throughout the district. Our overall support concept is oriented toward the decentralized structure. From an organizational and technical perspective, we aim to centralize as much as possible, but the individual support technicians are often out of the media center for days at a time working on site in the schools.