Monday, 29 June 2015

Review: The best password managers for PCs, Macs, and mobile devices

10 local and cloud-based contenders make passwords stronger and online life easier for Windows, OS X, iOS, Android, BlackBerry, and Windows Phone users

Thanks to a continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It's one of the easiest too.

A password manager won't shield you against Heartbleed or the NSA, but it's an excellent first step in securing your identity, helping you increase the strength of the passwords that protect your online accounts because it will remember those passwords for you. A password manager will even randomly generate strong passwords, without requiring you to memorize or write down these random strings of characters. These strong passwords help shield against traditional password attacks such as dictionary, rainbow tables, or brute-force attacks.

Many password managers allow you to automatically populate your password vault by capturing your Web logins using a browser plug-in and allowing you to store these credentials. Other options for populating your password database include importing an Excel spreadsheet or manually entering your login information. Further, using these stored credentials is typically automated using a browser plug-in, which recognizes the website's username and password fields, then populates these fields with the appropriate login information.

Although several browsers offer similar functionality out of the box, many password managers offer several benefits over the built-in browser functionality -- including encryption, cross-platform and cross-browser synchronization, mobile device support, secure sharing of credentials, and support for multifactor authentication. In some cases, usernames and passwords must be copied from the password manager into the browser, reducing the ease of use but increasing the level of security by requiring entry of the master password before accessing stored login information.
6 simple tricks for protecting your passwords

Some password managers store your credentials locally, others rely on cloud services for storage and synchronization, and still others take a hybrid approach. Some of the options using local storage (such as KeePass and 1Password) still support synchronization through Dropbox or other storage services. Deciding which password manager is best for you will come down to features and ease of use, as well as to whether you're comfortable storing your passwords on the Internet.

If having your critical data stored in a cloud service worries you, then KeePass, 1Password, or SplashID Safe (sans SplashID's cloud service) offer the top options. If you trust cloud-based services with your passwords and believe they will protect your data using good security practices and encryption, then LastPass, Dashlane, or PasswordBox are your best bets.

In my judgment, KeePass is the best of the options using local storage. The fact that it's open source, free, and complemented by countless plug-ins adds up to a very flexible option. With the right combination of plug-ins, KeePass can be made to do almost anything you could require of a password manager. My favorite cloud option is LastPass, primarily due to its low cost and the consistent implementation of features across all of the clients. Each LastPass client I tested was easy to work with, stable, and remarkably uniform from a usability perspective. Additionally, the fact that a LastPass Premium account is all of $1 per month makes it an extremely compelling option.

But one of these other options might suit you better. Really, you can't go wrong with any of these password managers.
1Password

1Password is the brainchild of AgileBits, maker of the popular Knox encryption tool for OS X. Unlike Knox, 1Password offers support for multiple platforms, including Mac, Windows, iOS, and Android.

Like KeePass, 1Password uses a local file to store encrypted passwords. AgileBits does not provide a cloud service for synchronization with mobile devices, but 1Password does support synchronization of the password vault using Dropbox (all platforms) or iCloud (Mac and iOS only). 1Password also supports synchronization over Wi-Fi between Windows, Mac, and iOS clients. Because the 1Password vault is contained in a single file, you gain the convenience of a portable password vault without having to store your passwords on the Internet.

1Password clients allow you to create and maintain multiple password vaults. Multiple vaults can be used to share some of your passwords with another family member or co-worker. Secure sharing between 1Password clients is supported, giving you a method to transmit a login (or any sensitive information, such as a credit card number or the answer to a website's security question) to another licensed 1Password user over an encrypted channel. Emailing login information in plain text is also supported, but this information is only as secure as your email traffic.
1Password favorites

1Password stores your passwords in a local file, but supports synchronization across devices using Dropbox and iCloud.

1Password now provides a number of different tools that analyze your passwords and the services they secure in order to identify potential vulnerabilities. Though many websites have patched the Heartbleed vulnerability by now, 1Password takes the precaution of comparing your last password change for a site against the date the site’s server was patched. If your password hasn’t been changed since the patch, 1Password will encourage you to protect yourself through a password change. Potential areas of concern such as duplicate or weak passwords are also identified.

The cost of using 1Password is markedly different than cloud-based password lockers. Users must purchase clients for each platform they intend to use, costing more up front than a subscription service, but potentially saving money in the long term. 1Password for PC or Mac cost $49.99; the Mac-plus-PC bundle runs $69.99. Both the iOS app and Android apps are free with an in-app upgrade to the Pro feature set for $9.99.

My biggest concern with 1Password has to do with feature parity between the Mac and PC versions. Currently both platforms offer similar features, largely due to a massive update to the Windows version mere days before publication of this article. Previously, features such as secure sharing or Wi-Fi sync were nowhere to be found. AgileBits has made good on promises to bring these features to all platforms, but if you're primarily a PC user, the lag may be cause for concern. Regardless, 1Password is a strong password manager. With AgileBits' strong ties to the Apple community, this is particularly true for Mac and iOS users.

Dashlane

Dashlane toes the line between cloud service and local password manager in an attempt to answer every security concern. You can store your password database on Dashlane's servers and take advantage of synchronization across devices, or you can store your password vault locally and forgo synchronization. It's your choice.

If you store your password database in Dashlane's cloud, your master password remains with you only. Rather than storing a hash of the master password on its servers, Dashlane claims to use your password merely to encrypt and decrypt the data locally. For this reason your password database on the Web is read only, and changes can solely be made on a client.

Authentication is performed against devices that are registered with Dashlane through a two-step process, incorporating your master password and a device registration code sent via email. Two pricing tiers are offered for Dashlane users. A free account allows access to your passwords through a single device of your choice. Premium accounts, which cost $39.99 per year, let you synchronize your passwords across multiple devices, perform account backups, share more than five items, give you access to the read-only Web app, and entitle you to Dashlane's customer support.
Dashlane score

Dashlane will store your password database in the cloud, but your master password remains with you only. (Don't lose it!). Like other password managers, Dashlane will assess the strength of your password as you create it.

With Dashlane, retention of your master password is critical. The company states that it is unable to perform password recovery in the event of loss, a necessary side effect of its decision to not store a copy of your password in any form. Two-factor authentication is also supported through the use of Google Authenticator. Support for two-factor authentication must be enabled through the Windows or Mac client and can only be used on Internet-connected clients.

Dashlane’s team features allow you to securely share login information with other Dashlane users, providing them with an appropriate level of access to the information. Shared items can be provided with limited rights, which restrict the ability to change permissions or reshare an item, or with full rights to the data. Dashlane also offers the ability to designate emergency contacts, making it easy to allow family or co-workers access to critical accounts or information in the event of an emergency. The data shared with an emergency contact can be fine-tuned in order to only provide certain information to specific contacts.

Because Dashlane attempts to be a hybrid of a cloud-based and local password manager, it isn't as full featured as other cloud offerings, and it may not win over customers fearful of cloud services. However, Dashlane has been able to accomplish something truly remarkable through no small amount of ingenuity and attention to security precautions. Before you dismiss Dashlane because it's a cloud-based service, take a look at the company's security whitepaper, which details the concepts and security practices it has implemented.

KeePass

A mature open source project (GNU GPL version 2), KeePass is a free password management solution for Windows, OS X, or Linux, running natively on Windows and requiring Mono for the other platforms. Many of the benefits of open source software are prevalent in KeePass, including ports to other client operating systems and a robust plug-in ecosystem. With the extensibility offered by plug-ins for KeePass, you can change the encryption algorithm, automate logins through your browser, integrate an on-screen keyboard, or even create scripts you can run against KeePass.

KeePass was designed to store a local copy of the password vault. Cloud backup and support for synchronization across multiple devices are obtained through plug-ins that work with the likes of Dropbox, Google Docs, and Microsoft OneDrive. A side benefit of a local password database such as KeyPass is the ability for multiple users to share a database or for one user to keep multiple databases, sharing some and keeping others private.

KeePass master

With KeePass, you can lock your password vault using a combination of password, key file, and Windows authentication.

Mobile support for KeePass is a little more obtuse than some of the commercial options. Ports are available for iOS, Android, and Windows Phone, but the big question becomes synchronization support. Not all mobile ports support cloud synchronization, and those that do support only a subset of the cloud options. Some mobile KeePass clients carry a cost, though most are in the $1 to $2 range.

If you're more concerned about the security of your password vault than mobile clients and device synchronization, you'll be pleased to know that KeePass supports multiple authentication methods by default. KeePass database files can be locked by a combination of password, key file, and Windows user account. With a key file stored on removable media such as a USB thumb drive, two-factor authentication can be used to secure access to your critical passwords.

The biggest downside to KeePass is complexity. Getting all of the advanced functionality offered by the competition will require quite a bit of research, setup, and maintenance. While KeePass is a great solution for fans of open source, maximum flexibility, and free software, it is certainly not as straightforward as some of the cloud-based services listed here.

LastPass
LastPass may be the most popular password manager in this review, due to a rich set of features, support for a wide range of mobile platforms, and straightforward licensing, not to mention aggressive marketing. Unlike KeePass, LastPass is decidedly cloud-centric, using its own cloud service to store user information and synchronize data.

A recent LastPass security notice underscores one drawback of a cloud-based password manager: It makes a tempting target for hackers. Although no user accounts were accessed and no vault data was taken, attackers did make away with account email addresses and other data that could be used in targeted attacks. Bottom line: LastPass users should change their master passwords. Brian Krebs' post on the LastPass breach provides a concise explanation of the risks.

LastPass offers a free and premium pricing tier for consumers, with the premium service costing $1 per month. Users of the free edition get many of the basics you'd expect from a cloud-based service, including plug-in support for multiple browsers, anywhere access, and even support for multifactor authentication using Google Authenticator on an Android or iOS device or Microsoft Authenticator on Windows Phone. Mobile device support requires a premium account but includes support for iOS, Android, BlackBerry, and Windows Phone. Even some mobile browsers such as Dolphin and Firefox Mobile work with LastPass Premium to automate username and password entry. Finally, premium users get access to the LastPass support team, rather than being relegated to the user forums.

LastPass vault
LastPass offers handy functionality for sharing accounts with friends and family. The free service allows you to selectively share account login information with other LastPass users, allowing them to authenticate to individual Web applications using your information, without giving them direct access to your passwords. Premium account subscribers get access to a Family Folder, a feature that lets you specify exactly which login information to share with up to five other LastPass users.

Desktop support for LastPass is somewhat confusing. Downloading the basic installer for Windows provides browser plug-ins, an import tool (for migrating from another password vault or spreadsheet), and a shortcut to the LastPass Web app. Premium subscribers also have access to LastPass for applications, which provides increased utility by allowing you to automatically log into desktop applications such as Skype or a corporate VPN client.

LastPass supports several forms of two-factor authentication. I've already mentioned that both Microsoft Authenticator and Google Authenticator are supported with free accounts, providing simple integration using a mobile device. Premium accounts gain support for Yubikey, a USB hardware authentication device, and Sesame, a software authentication tool run from a USB storage device.

If you need simple password management in a Web app, you can't go wrong with a free LastPass account. For more granular credential sharing and mobile device support, LastPass premium will be the best $1 you spend each month.

PasswordBox

PasswordBox bears a number of similarities to Dashlane. Master passwords are neither stored nor transmitted, meaning that password data is secured throughout the process, and password resets are technically impossible. PasswordBox even takes extra steps to ensure the security of your information in other ways, such as PCI-compliant data centers and providing the ability to send the company encrypted email using the PGP key published on its website.

PasswordBox is currently missing some of the features available in Dashlane, such as two-factor authentication, but both two-factor and fingerprint-based authentication are reportedly coming soon. You can read about the security measures PasswordBox uses to safeguard password data in the company's security whitepaper.

PasswordBox does not use stand-alone client programs on Windows and Mac, opting instead for browser plug-ins (Chrome, Firefox, and Internet Explorer), but mobile apps are available for both iOS and Android. Another minor oddity: PasswordBox doesn't offer a Web app to view or edit passwords or manage your account -- everything is handled via mobile app or browser plug-in.
PasswordBox

PasswordBox stores your passwords on its servers, but they're never decrypted there. Passwords can only be viewed and edited using the browser plug-in or mobile client.

PasswordBox is priced competitively with the other cloud-based password managers. Free accounts support up to 25 stored passwords, including synchronization and full sharing capabilities. Premium accounts cost $12 per year and give you unlimited password storage. Referring five friends nets you a premium account for life.

PasswordBox allows users (free or premium) to share saved login information seamlessly between accounts, even without the passwords being visible. Shared log-ins persist even through password changes, and they can be revoked at any time. An interesting and unique feature of PasswordBox is the Legacy Locker, which allows you to designate one or more responsible parties who get access to your account information in the event of your death. Account transfers using Legacy Locker are not performed until a death certificate is provided and validated.

PasswordBox is now part of the Intel Security Family, meaning its future is in a state of flux. For now Intel Security is offering free premium subscriptions to both new and existing users.

SplashID Safe

SplashID has been in the password manager business for years. Its product, SplashID Safe, has been particularly popular on mobile devices. Currently SplashID Safe supports access through the Web and client apps for Windows desktop, Windows, Mac, iOS, Android, BlackBerry 10, and Windows Phone.

Where other password managers are either local or cloud-based, SplashID Safe supports either option. SplashID has simplified its licensing structure somewhat in version 8. A basic SplashID account is free, but limits you to one device and doesn’t allow sharing or backup. A SpashID Pro account allows you to synchronize your password vault for $1.99 per month or $19.99 per year. SplashID Pro supports unlimited devices, synchronization over the Internet or Wi-Fi, sharing, and automated backup. It also comes with customer support.

For an additional $5 per user per month, families or businesses can leverage SplashID Safe Teams edition, which adds an admin panel that allows you to control who has access to each record, either by assigning a record to an individual user or a group of users.

SplashID Safe has at least one feature we wish all the cloud-based services would implement: the ability to configure a login as local only, giving you the ability to prevent your most sensitive data from being stored on the Internet. The idea is that if you have certain login information or other sensitive data you don't trust to the Internet, you can prevent this information from being uploaded to SplashID's servers.

SplashID Safe supports two methods of sharing login information. When sharing with a user who has a SplashID cloud account, the login information is imported directly into their account. Users without a SplashID cloud account will receive an email containing a link to securely retrieve the information. Links to shared information are secured with a password (which can be included in the email or shared using another method), are valid for only 24 hours, and expire after the first use.

Two-factor support in SplashID only provides an extra layer of security when registering a new device (not on each login), requiring you to enter a six-digit code sent via email. While a registered device paired with a password technically meets the definition of two-factor authentication (something you have and something you know), it's not quite up to par with services offering support for Google Authenticator or other two-factor methods. SplashID Safe offers a pattern unlock feature as an alternative to a master password, but I found this feature to be somewhat inconsistent.
Other contenders

It's always nice when a security product is backed by a brand synonymous with computer security, and Symantec's Norton Identity Safe certainly has that factor in its favor. Identity Safe has another plus: It's completely free. You can choose from a number of free password managers, but none are cloud services operated by a software vendor with a level of trust built up over decades. Norton Identity Safe used to be part of a Norton security suite, but it's now a stand-alone service with a Web front end and clients for Windows, iOS, and Android.

RoboForm is a popular password manager and form filler, but it falls short of the leading contenders on a few counts. Though it offers synchronization across multiple platforms, there is no Web app, two-factor authentication, or sharing capability. Individual RoboForm desktop licenses can be purchased outright for Mac or PC at a price of $29.95, and a Windows portable version for USB storage is available for $39.95. RoboForm also offers subscription-based licensing for $19.95 per year, which provides synchronization and access through mobile apps on iOS, Android, Windows 8, and Windows Phone.

KeePass isn't the only open source password manager. There's also Password Safe, currently available for Windows in both installable and portable versions, and for Linux in a beta version. Password Safe is not nearly as feature-rich or mature as KeePass, and I'd be hard-pressed to give you a reason to use it over its big brother. That said, Password Safe is a viable alternative, and if all you need is a local password manager, the decision may come down to which program you find easier to use. The result may be Password Safe.

My1Login has both a free version, supported through advertisements and affiliate links to partner sites, and a pro version, which eliminates the ads and affiliate links for $2 per month. My1Login offers features commonly found in the other contenders such as secure sharing and strong password generation. The problem with My1Login is that the entire service is Web-based, with mobile support coming through the mobile Web app only. While My1Login is enthusiastic about the minimal setup requirements due to the lack of client applications, I find this method to be more difficult to use in the long term.

Keeper Backup is full-featured password manager supporting multiple client platforms, including Mac, Windows, iOS, Android, and Windows Phone. Security features offered by Keeper Backup include two-factor authentication and secure sharing. Keeper offers three pricing tiers, starting with a free edition that supports one device, no sharing, and a limited amount of data. Keeper Backup provides unlimited storage, access to the Keeper Web app, secure sharing, and access to the support team for $9.99 per year. Backup Unlimited adds support for synchronization across devices for a heftier $29.99 per year.

Trend Micro's DirectPass has a free option that supports only five passwords. Trend Micro's subscription service, which costs $14.95 for one year or $24.95 for two years, supports an unlimited number of passwords and devices. Desktop clients are available for both PC and Mac, and mobile clients are available for iOS and Android. While there's nothing wrong with DirectPass, it doesn't match other competitors in features or polish.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


Monday, 22 June 2015

Cisco to make $10 billion investment in China

Cisco plans to invest US$10 billion in China, although its sales in the country are slumping due in part to persistent security concerns surrounding U.S. technology.

The investment marks a “new chapter” for the company, and it includes agreements with the Chinese government to expand in areas including research, and job creation, Cisco said on Wednesday.

The $10 billion investment will be made over several years, and will help spur technology innovation in the country, Cisco said, without further elaborating. It called the move a “renewed commitment” suggesting that the investment would be added on top of its existing operational expenses in China. Cisco could not be immediately reached for comment.

As part of the investment, the company has signed agreements with China’s National Development and Reform Commission, a high-level government agency, and with an association connected to the Ministry of Education.

Cisco has been in the Chinese market for over two decades supplying networking equipment, including what’s used in the country’s Internet infrastructure. But its business in the country has struggled in recent years due to “geopolitical challenges”, according to the company.

Following leaks about the U.S.’s secret surveillance programs, China has made cybersecurity a priority. As a result, the country is considering stricter regulations that could push U.S. tech firms out of the market.

In Cisco’s case, it also had to contend with competition from Huawei Technologies and ZTE, two Chinese companies that have become major players in the networking sector and are moving into enterprise services.

But even as China focuses more on cybersecurity, Cisco said on Wednesday it’s committed to the market. The company announced the investment as both its outgoing CEO John Chambers and incoming CEO Chuck Robbins met Chinese government officials.

Cisco will continue to “work closely” with the Chinese government and its partners to better meet demands for the market, Cisco’s head of the Greater China Owen Chan, said in a statement.

Back in 2007, Cisco made another huge investment in the country that reached $16 billion. Most of the money was geared toward doubling its manufacturing.

The market opportunity in China is huge. The country has over 600 million Internet users, and there’s a growing need for more data centers, and faster networking infrastructure.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Saturday, 20 June 2015

20 best iPhone/iPad games

Star Wars Rebels, Fireworks, Shakespeare and lots of quests are featured in top iPhone and iPad games.

Games
As we head toward summer 2015, it’s time to check in and see how the mobile gaming industry has fared for Apple iOS platforms, the iPhone and iPad. Here’s a look at top rated games issued so far this year, based on App Store user reviews and professional reviewers on Metacritic. We hope you’ll discover a few hidden gems in here.

Legend of Grimrock
Developer: Almost Human
Price: $5
Ratings: 95 of 100 on Metacritic; 4.5 of 5 stars on Apple App Store; Ages 9+

This popular role-playing game for the PC brings its dungeon crawling to iOS. With Legend of Grimrock, enable prisoners who may or may not have committed the crimes for which they’ve been exiled to Mount Grimlock navigate its maze of tunnels and tombs.

Ryan North’s To Be or Not to Be
Developer: Tim Man Games
Price: $6
Ratings: 93 of 100 on Metacritic; 4 of 5 stars on App Store; Rated 12+

Shakespeare meets the iPhone and iPad in Ryan North’s To Be or Not to Be game. As the developer writes: “Play as Hamlet and revenge your father's death. Play as Ophelia and make scientific discoveries. Play as King Hamlet, Sr. and die on the first page!”

Implosion: Never lose hope
Developer: Rayark
Price: $10
Ratings: 93 of 100 on Metacritic; 4.5 stars on App Store; Rated 12+

Implosion transports you here: “Twenty years after the fall of Earth, the remnants of the Human race are once again faced with extinction. The time has come to justify our existence. A mysterious life form known as the XADA squares off against humanity's last weapon - the War-Mech series III battle suit.”

Attack the Light: Steven Universe Light RPG
Developer: Cartoon Network
Price: $3
Ratings: 91 of 100 on Metacritic; 5 of 5 stars on App Store; Rated for ages 9+.

Attack the Light is a role-playing game in which 4 heroes team up for a magical adventure.

Sorcery! 3
Developer: Inkle Studios
Price: $5
Ratings: 90 of 100 on Metacritic; 4 of 5 stars on App Store; Rated 12+

Sorcery! 3 is described as “An epic adventure through a cursed wilderness of monsters, traps and magic.” And you don’t need to have played parts 1 or 2.
Video courtesy YouTube.com

Does not Commute
Developer: Mediocre AB
Price: Free
Ratings: 87 of 100 on Metacritic; 4.5 of 5 stars on App Store: Rated ages 4+.

In Does not Commute, “What starts out as a relaxing commute in a small town of the 1970s quickly devolves into traffic chaos with hot dog trucks, sports cars, school buses and dozens of other vehicles. You drive them all.”

Magic Touch: Wizard for Hire
Developer: Nitrome
Price: Free
Ratings: 87 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated age 9+.

In Magic Touch a wizard is wanted who has proficiency in spell casting for popping intruders’ balloons.

Halo Spartan Strike
Developer: Microsoft
Price: $6
Ratings: 86 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 12+.

In Halo Spartan Strike, you are a supersoldier tasked with up to 30 challenging missions in city and jungle settings. Don’t worry, you have plenty of weapons, skills and vehicles with which to pummel and outwit enemies of Earth.

SwapQuest
Developer: Constantin Graf
Price: $3
Ratings: 85 of 100 on Metacritic; 3.5 of 5 stars on App Store; Rated for ages 9+.

SwapQuest mixes easy-to-learn puzzles with role-playing action as you try to save the Kingdom of Aventana from a demon cloud dubbed the Horde.

Silly Sausage in Meatland
Developer: Nitrome
Price: Free
Ratings: 85 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 9+.

In Silly Sausage you’re a dog with an infinitely stretchy body, which can be handy but also exposes you to all sorts of meat cutting instruments.

Card Crawl
Developer: Arnold Rauers
Price: $2
Ratings: 84 of 100 on Metacritic; 5 of 5 stars on App Store; Rated for ages 12+.

Card Crawl is solitaire with a dungeon crawler twist, in which you need to say monsters efficiently.

TouchTone
Developer: Mikengreg
Price: $3
Ratings: 84 of 100 on Metacritic; 4 of 5 stars on App Store; Rated ages 12+.

TouchTone is a game that the likes of the NSA and Anonymous would love: decrypt suspicious messages to make the nation safer and stronger.

Flop Rocket
Developer: Butterscotch Shenanigans
Price: Free
Ratings: 84 of 100 on Metacritic; 4.5 of 5 on App Store; Rated for ages 12+.

Next best thing to flying a drone: “Pilot your Flop Rocket through a 5 kilometer cave filled with dragon-like Spaceducks, enormous rock-worms, and other space-time anomalies as you try to prevent an underfunded space program from going bust.”

Fearless Fantasy
Developer: TinyBuild
Price: $4
Ratings: 84 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 9+.

Fearless Fantasy is a gesture-based role-playing game in which you are a bounty hunter intent on slaying weird creatures and saving a young woman from an awful marriage.

The Quest Keeper
Developer: Tyson Ibele
Price: Free
Ratings: 83 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 4+.

In The Quest Keeper, your mission is to help a peasant become a dungeon master, but you’ll need to dodge spikes, knives and scary creatures to do so.

Star Wars Rebels: Recon Missions
Developer: Disney Interactive Studios
Price: Free
Ratings: 83 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 9+.

Star Wars Rebels is based on the TV show, and lets you take on the Empire in this action platform game.

Blokshot Revolution
Developer: Foxhole Games
Price: Free
Ratings: 82 of 100 on Metacritic; 4.5 of 5 stars on App Store; Rated for ages 4+.

In Blokshot Revolution, experience “a beautiful firework display of hypnotic neon destruction” set against a pumping EDM sountrack.

Beast Quest

Developer: Miniclip.com
Price: Free
Ratings: 81 of 100 on Metacritic; 4 of 5 stars on App store; Rated for ages 9+.

The Beast Quest action-adventure game asks whether you are the hero Avantia has been looking for to free the magical beasts of this leand from the spell of a wicked wizard.
best iphone ipad games 20

Marvel Future Fight
Developer: Netmarble Games
Price: Free
Ratings: 81 of 100 on Metacritic; 4.5 of 5 on App Store;

This Marvel role-playing game lets you assemble teams of super heroes for single or multiple player games, as you battle via weapons and skills to keep humanity alive.

MicRogue
Developer: Crescent Moon Games
Price: $2
Ratings: 80 of 100 on Metacritic; 2 of 5 stars on App Store; Rated for ages 4+.

MicRogue does have a weak rating on the App Store based on limited reviews, but Metacritic reviewers gave it some love for packing fun into a small package. Climb a dark tower and avoid monsters with chess-like moves.

Tuesday, 9 June 2015

400-101 CCIE Routing and Switching

400-101 CCIE Routing and Switching
Exam Description
The CCIE written exam is a two-hour qualification exam. The exam uses a combination of 90-110 multiple choice questions and simulations to assess skills. Exams are closed book and no reference materials are allowed.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
1.0 Network Principles 10%
1.1 Network theory
1.1.a Describe basic software architecture differences between IOS and IOS XE
1.1.a [i] Control plane and Forwarding plane
1.1.a [ii] Impact to troubleshooting and performances
1.1.a [iii] Excluding specific platform’s architecture
1.1.b Identify Cisco express forwarding concepts
1.1.b [i] RIB, FIB, LFIB, Adjacency table
1.1.b [ii] Load balancing Hash
1.1.b [iii] Polarization concept and avoidance
1.1.c Explain general network challenges
1.1.c [i] Unicast flooding
1.1.c [ii] Out of order packets
1.1.c [iii] Asymmetric routing
1.1.c [iv] Impact of micro burst
1.1.d Explain IP operations
1.1.d [i] ICMP unreachable, redirect
1.1.d [ii] IPv4 options, IPv6 extension headers
1.1.d [iii] IPv4 and IPv6 fragmentation
1.1.d [iv] TTL
1.1.d [v] IP MTU
1.1.e Explain TCP operations
1.1.e [i] IPv4 and IPv6 PMTU
1.1.e [ii] MSS
1.1.e [iii] Latency
1.1.e [iv] Windowing
1.1.e [v] Bandwidth delay product
1.1.e [vi] Global synchronization
1.1.e [vii] Options
1.1.f Explain UDP operations
1.1.f [i] Starvation
1.1.f [ii] Latency
1.1.f [iii] RTP/RTCP concepts
1.2 Network implementation and operation
1.2.a Evaluate proposed changes to a network
1.2.a [i] Changes to routing protocol parameters
1.2.a [ii] Migrate parts of a network to IPv6
1.2.a [iii] Routing protocol migration
1.2.a [iv] Adding multicast support
1.2.a [v] Migrate spanning tree protocol
1.2.a [vi] Evaluate impact of new traffic on existing QoS design
1.3 Network troubleshooting
1.3.a Use IOS troubleshooting tools
1.3.a [i] debug, conditional debug
1.3.a [ii] ping, traceroute with extended options
1.3.a [iii] Embedded packet capture
1.3.a [iv] Performance monitor
1.3.b Apply troubleshooting methodologies
1.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
1.3.b [ii] Design and implement valid solutions according to constraints
1.3.b [iii] Verify and monitor resolution
1.3.c Interpret packet capture
1.3.c [i] Using Wireshark trace analyzer
1.3.c [ii] Using IOS embedded packet capture
2.0 Layer 2 Technologies 15%
2.1 LAN switching technologies
2.1.a Implement and troubleshoot switch administration
2.1.a [i] Managing MAC address table
2.1.a [ii] errdisable recovery
2.1.a [iii] L2 MTU
2.1.b Implement and troubleshoot layer 2 protocols
2.1.b [i] CDP, LLDP
2.1.b [ii] UDLD
2.1.c Implement and troubleshoot VLAN
2.1.c [i] Access ports
2.1.c [ii] VLAN database
2.1.c [iii] Normal, extended VLAN, voice VLAN
2.1.d Implement and troubleshoot trunking
2.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning
2.1.d [ii] dot1Q
2.1.d [iii] Native VLAN
2.1.d [iv] Manual pruning
2.1.e Implement and troubleshoot EtherChannel
2.1.e [i] LACP, PAgP, manual
2.1.e [ii] Layer 2, layer 3
2.1.e [iii] Load-balancing
2.1.e [iv] Etherchannel misconfiguration guard
2.1.f Implement and troubleshoot spanning-tree
2.1.f [i] PVST+/RPVST+/MST
2.1.f [ii] Switch priority, port priority, path cost, STP timers
2.1.f [iii] port fast, BPDUguard, BPDUfilter
2.1.f [iv] loopguard, rootguard
2.1.g Implement and troubleshoot other LAN switching technologies
2.1.g [i] SPAN, RSPAN, ERSPAN
2.1.h Describe chassis virtualization and aggregation technologies
2.1.h [i] Multichassis
2.1.h [ii] VSS concepts
2.1.h [iii] Alternative to STP
2.1.h [iv] Stackwise
2.1.h [v] Excluding specific platform implementation
2.1.i Describe spanning-tree concepts
2.1.i [i] Compatibility between MST and RSTP
2.1.i [ii] STP dispute, STP bridge assurance
2.2 Layer 2 multicast
2.2.a Implement and troubleshoot IGMP
2.2.a [i] IGMPv1, IGMPv2, IGMPv3
2.2.a [ii] IGMP snooping
2.2.a [iii] IGMP querier
2.2.a [iv] IGMP filter
2.2.a [v] IGMP proxy
2.2.b Explain MLD
2.2.c Explain PIM snooping
2.3 Layer 2 WAN circuit technologies
2.3.a Implement and troubleshoot HDLC
2.3.b Implement and troubleshoot PPP
2.3.b [i] Authentication [PAP, CHAP]
2.3.b [ii] PPPoE
2.3.b [iii] MLPPP
2.3.c Describe WAN rate-based ethernet circuits
2.3.c [i] Metro and WAN Ethernet topologies
2.3.c [ii] Use of rate-limited WAN ethernet services
3.0 Layer 3 Technologies 40%

3.1 Addressing technologies
3.1.a Identify, implement and troubleshoot IPv4 addressing and subnetting
3.1.a [i] Address types, VLSM
3.1.a [ii] ARP
3.1.b Identify, implement and troubleshoot IPv6 addressing and subnetting
3.1.b [i] Unicast, multicast
3.1.b [ii] EUI-64
3.1.b [iii] ND, RS/RA
3.1.b [iv] Autoconfig/SLAAC, temporary addresses [RFC4941]
3.1.b [v] Global prefix configuration feature
3.1.b [vi] DHCP protocol operations
3.1.b [vii] SLAAC/DHCPv6 interaction
3.1.b [viii] Stateful, stateless DHCPv6
3.1.b [ix] DHCPv6 prefix delegation
3.2 Layer 3 multicast
3.2.a Troubleshoot reverse path forwarding
3.2.a [i] RPF failure
3.2.a [ii] RPF failure with tunnel interface
3.2.b Implement and troubleshoot IPv4 protocol independent multicast
3.2.b [i] PIM dense mode, sparse mode, sparse-dense mode
3.2.b [ii] Static RP, auto-RP, BSR
3.2.b [iii] BiDirectional PIM
3.2.b [iv] Source-specific multicast
3.2.b [v] Group to RP mapping
3.2.b [vi] Multicast boundary
3.2.c Implement and troubleshoot multicast source discovery protocol
3.2.c [i] Intra-domain MSDP [anycast RP]
3.2.c [ii] SA filter
3.2.d Describe IPv6 multicast
3.2.d [i] IPv6 multicast addresses
3.2.d [ii] PIMv6
3.3 Fundamental routing concepts
3.3.a Implement and troubleshoot static routing
3.3.b Implement and troubleshoot default routing
3.3.c Compare routing protocol types
3.3.c [i] Distance vector
3.3.c [ii] Link state
3.3.c [iii] Path vector
3.3.d Implement, optimize and troubleshoot administrative distance
3.3.e Implement and troubleshoot passive interface
3.3.f Implement and troubleshoot VRF lite
3.3.g Implement, optimize and troubleshoot filtering with any routing protocol
3.3.h Implement, optimize and troubleshoot redistribution between any routing protocol
3.3.i Implement, optimize and troubleshoot manual and auto summarization with any routing protocol
3.3.j Implement, optimize and troubleshoot policy-based routing
3.3.k Identify and troubleshoot sub-optimal routing
3.3.l Implement and troubleshoot bidirectional forwarding detection
3.3.m Implement and troubleshoot loop prevention mechanisms
3.3.m [i] Route tagging, filtering
3.3.m [ii] Split horizon
3.3.m [iii] Route poisoning
3.3.n Implement and troubleshoot routing protocol authentication
3.3.n [i] MD5
3.3.n [ii] Key-chain
3.3.n [iii] EIGRP HMAC SHA2-256bit
3.3.n [iv] OSPFv2 SHA1-196bit
3.3.n [v] OSPFv3 IPsec authentication
3.4 RIP [v2 and v6]
3.4.a Implement and troubleshoot RIPv2
3.4.b Describe RIPv6 [RIPng]
3.5 EIGRP [for IPv4 and IPv6]
3.5.a Describe packet types
3.5.a [i] Packet types [hello, query, update, and such]
3.5.a [ii] Route types [internal, external]
3.5.b Implement and troubleshoot neighbor relationship
3.5.b [i] Multicast, unicast EIGRP peering
3.5.b [ii] OTP point-to-point peering
3.5.b [iii] OTP route-reflector peering
3.5.b [iv] OTP multiple service providers scenario
3.5.c Implement and troubleshoot loop free path selection
3.5.c [i] RD, FD, FC, successor, feasible successor
3.5.c [ii] Classic metric
3.5.c [iii] Wide metric
3.5.d Implement and troubleshoot operations
3.5.d [i] General operations
3.5.d [ii] Topology table, update, query, active, passive
3.5.d [iii] Stuck in active
3.5.d [iv] Graceful shutdown
3.5.e Implement and troubleshoot EIGRP stub
3.5.e [i] Stub
3.5.e [ii] Leak-map
3.5.f Implement and troubleshoot load-balancing
3.5.f [i] equal-cost
3.5.f [ii] unequal-cost
3.5.f [iii] add-path
3.5.g Implement EIGRP [multi-address] named mode
3.5.g [i] Types of families
3.5.g [ii] IPv4 address-family
3.5.g [iii] IPv6 address-family
3.5.h Implement, troubleshoot and optimize EIGRP convergence and scalability
3.5.h [i] Describe fast convergence requirements
3.5.h [ii] Control query boundaries
3.5.h [iii] IP FRR/fast reroute [single hop]
3.5.8 [iv] Summary leak-map
3.5.h [v] Summary metric
3.6 OSPF [v2 and v3]
3.6.a Describe packet types
3.6.a [i] LSA yypes [1, 2, 3, 4, 5, 7, 9]
3.6.a [ii] Route types [N1, N2, E1, E2]
3.6.b Implement and troubleshoot neighbor relationship
3.6.c Implement and troubleshoot OSPFv3 address-family support
3.6.c [i] IPv4 address-family
3.6.c [ii] IPv6 address-family
3.6.d Implement and troubleshoot network types, area types and router types
3.6.d [i] Point-to-point, multipoint, broadcast, non-broadcast
3.6.d [ii] LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
3.6.d [iii] Internal router, ABR, ASBR
3.6.d [iv] Virtual link
3.6.e Implement and troubleshoot path preference
3.6.f Implement and troubleshoot operations
3.6.f [i] General operations
3.6.f [ii] Graceful shutdown
3.6.f [iii] GTSM [Generic TTL Security Mechanism]
3.6.g Implement, troubleshoot and optimize OSPF convergence and scalability
3.6.g [i] Metrics
3.6.g [ii] LSA throttling, SPF tuning, fast hello
3.6.g [iii] LSA propagation control [area types, ISPF]
3.6.g [iv] IP FRR/fast reroute [single hop]
3.6.g [v] LFA/loop-free alternative [multi hop]
3.6.g [vi] OSPFv3 prefix suppression
3.7 BGP
3.7.a Describe, implement and troubleshoot peer relationships
3.7.a [i] Peer-group, template
3.7.a [ii] Active, passive
3.7.a [iii] States, timers
3.7.a [iv] Dynamic neighbors
3.7.b Implement and troubleshoot IBGP and EBGP
3.7.b [i] EBGP, IBGP
3.7.b [ii] 4 bytes AS number
3.7.b [iii] Private AS
3.7.c Explain attributes and best-path selection
3.7.d Implement, optimize and troubleshoot routing policies
3.7.d [i] Attribute manipulation
3.7.d [ii] Conditional advertisement
3.7.d [iii] Outbound route filtering
3.7.d [iv] Communities, extended communities
3.7.d [v] Multi-homing
3.7.e Implement and troubleshoot scalability
3.7.e [i] Route-reflector, cluster
3.7.e [ii] Confederations
3.7.e [iii] Aggregation, AS set
3.7.f Implement and troubleshoot multiproctocol BGP
3.7.f [i] IPv4, IPv6, VPN address-family
3.7.g Implement and troubleshoot AS path manipulations
3.7.g [i] Local AS, allow AS in, remove private AS
3.7.g [ii] Prepend
3.7.g [iii] Regexp
3.7.h Implement and troubleshoot other features
3.7.h [i] Multipath
3.7.h [ii] BGP synchronization
3.7.h [iii] Soft reconfiguration, route refresh
3.7.i Describe BGP fast convergence features
3.7.i [i] Prefix independent convergence
3.7.i [ii] Add-path
3.7.i [iii] Next-hop address tracking
3.8 ISIS [for IPv4 and IPv6]
3.8.a Describe basic ISIS network
3.8.a [i] Single area, single topology
3.8.b Describe neighbor relationship
3.8.c Describe network types, levels and router types
3.8.c [i] NSAP addressing
3.8.c [ii] Point-to-point, broadcast
3.8.d Describe operations
3.8.e Describe optimization features
3.8.e [i] Metrics, wide metric
4.0 VPN Technologies 15%

4.1 Tunneling
4.1.a Implement and troubleshoot MPLS operations
4.1.a [i] Label stack, LSR, LSP
4.1.a [ii] LDP
4.1.a [iii] MPLS ping, MPLS traceroute
4.1.b Implement and troubleshoot basic MPLS L3VPN
4.1.b [i] L3VPN, CE, PE, P
4.1.b [ii] Extranet [route leaking]
4.1.c Implement and troubleshoot encapsulation
4.1.c [i] GRE
4.1.c [ii] Dynamic GRE
4.1.c [iii] LISP encapsulation principles supporting EIGRP OTP
4.1.d Implement and troubleshoot DMVPN [single hub]
4.1.d [i] NHRP
4.1.d [ii] DMVPN with IPsec using preshared key
4.1.d [iii] QoS profile
4.1.d [iv] Pre-classify
4.1.e Describe IPv6 tunneling techniques
4.1.e [i] 6in4, 6to4
4.1.e [ii] ISATAP
4.1.e [iii] 6RD
4.1.e [iv] 6PE/6VPE
4.1.g Describe basic layer 2 VPN —wireline
4.1.g [i] L2TPv3 general principals
4.1.g [ii] ATOM general principals
4.1.h Describe basic L2VPN — LAN services
4.1.h [i] MPLS-VPLS general principals
4.1.h [ii] OTV general principals
4.2 Encryption
4.2.a Implement and troubleshoot IPsec with preshared key
4.2.a [i] IPv4 site to IPv4 site
4.2.a [ii] IPv6 in IPv4 tunnels
4.2.a [iii] Virtual tunneling Interface [VTI]
4.2.b Describe GET VPN
5.0 Infrastructure Security 5%

5.1 Device security
5.1.a Implement and troubleshoot IOS AAA using local database
5.1.b Implement and troubleshoot device access control
5.1.b [i] Lines [VTY, AUX, console]
5.1.b [ii] SNMP
5.1.b [iii] Management plane protection
5.1.b [iv] Password encryption
5.1.c Implement and troubleshoot control plane policing
5.1.d Describe device security using IOS AAA with TACACS+ and RADIUS
5.1.d [i] AAA with TACACS+ and RADIUS
5.1.d [ii] Local privilege authorization fallback
5.2 Network security
5.2.a Implement and troubleshoot switch security features
5.2.a [i] VACL, PACL
5.2.a [ii] Stormcontrol
5.2.a [iii] DHCP snooping
5.2.a [iv] IP source-guard
5.2.a [v] Dynamic ARP inspection
5.2.a [vi] port-security
5.2.a [vii] Private VLAN
5.2.b Implement and troubleshoot router security features
5.2.b [i] IPv4 access control lists [standard, extended, time-based]
5.2.b [ii] IPv6 traffic filter
5.2.b [iii] Unicast reverse path forwarding
5.2.c Implement and troubleshoot IPv6 first hop security
5.2.c [i] RA guard
5.2.c [ii] DHCP guard
5.2.c [iii] Binding table
5.2.c [iv] Device tracking
5.2.c [v] ND inspection/snooping
5.2.c [vii] Source guard
5.2.c [viii] PACL
5.2.d Describe 802.1x
5.2.d [i] 802.1x, EAP, RADIUS
5.2.d [ii] MAC authentication bypass
6.0 Infrastructure Services 15%

6.1 System management
6.1.a Implement and troubleshoot device management
6.1.a [i] Console and VTY
6.1.a [ii] telnet, HTTP, HTTPS, SSH, SCP
6.1.a [iii] [T]FTP
6.1.b Implement and troubleshoot SNMP
6.1.b [i] v2c, v3
6.1.c Implement and troubleshoot logging
6.1.c [i] Local logging, syslog, debug, conditional debug
6.1.c [ii] Timestamp
6.2 Quality of service
6.2.a Implement and troubleshoot end-to-end QoS
6.2.a [i] CoS and DSCP mapping
6.2.b Implement, optimize and troubleshoot QoS using MQC
6.2.b [i] Classification
6.2.b [ii] Network based application recognition [NBAR]
6.2.b [iii] Marking using IP precedence, DSCP, CoS, ECN
6.2.b [iv] Policing, shaping
6.2.b [v] Congestion management [queuing]
6.2.b [vi] HQoS, sub-rate ethernet link
6.2.b [vii] Congestion avoidance [WRED]
6.2.c Describe layer 2 QoS
6.2.c [i] Queuing, scheduling
6.2.c [ii] Classification, marking
6.3 Network services
6.3.a Implement and troubleshoot first-hop redundancy protocols
6.3.a [i] HSRP, GLBP, VRRP
6.3.a [ii] Redundancy using IPv6 RS/RA
6.3.b Implement and troubleshoot network time protocol
6.3.b [i] NTP master, client, version 3, version 4
6.3.b [ii] NTP Authentication
6.3.c Implement and troubleshoot IPv4 and IPv6 DHCP
6.3.c [i] DHCP client, IOS DHCP server, DHCP relay
6.3.c [ii] DHCP options
6.3.c [iii] DHCP protocol operations
6.3.c [iv] SLAAC/DHCPv6 interaction
6.3.c [v] Stateful, stateless DHCPv6
6.3.c [vi] DHCPv6 prefix delegation
6.3.d Implement and troubleshoot IPv4 network address translation
6.3.d [i] Static NAT, dynamic NAT, policy-based NAT, PAT
6.3.d [ii] NAT ALG
6.3.e Describe IPv6 network address translation
6.3.e [i] NAT64
6.3.e [ii] NPTv6
6.4 Network optimization
6.4.a Implement and troubleshoot IP SLA
6.4.a [i] ICMP, UDP, Jitter, VoIP
6.4.b Implement and troubleshoot tracking object
6.4.b [i] Tracking object, tracking list
6.4.b [ii] Tracking different entities [e.g. interfaces, routes, IPSLA, and such]
6.4.c Implement and troubleshoot netflow
6.4.c [i] Netflow v5, v9
6.4.c [ii] Local retrieval
6.4.c [iii] Export [configuration only]
6.4.d Implement and troubleshoot embedded event manager
6.4.d [i] EEM policy using applet
6.4.e Identify performance routing [PfR]
6.4.e [i] Basic load balancing
6.4.e [ii] Voice optimization



QUESTION 1
Refer to the exhibit.

If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the
interface Fa0/1 port state?
A. It transitions to the listening state, and then the forwarding state.
B. It transitions to the learning state and then the forwarding state.
C. It transitions to the blocking state, then the learning state, and then the forwarding state.
D. It transitions to the blocking state and then the forwarding state.
Answer: C
Explanation:

QUESTION 2
Refer to the exhibit.

Which configuration is missing that would enable SSH access on a router that is running Cisco
IOS XE Software?
A. int Gig0/0/0
management-interface
B. class-map ssh-class
match access-group protect-ssh
policy-map control-plane-in
class ssh-class
police 80000 conform transmit exceed drop
control-plane
service-policy input control-plane-in
C. control-plane host
management-interface GigabitEthernet0/0/0 allow ssh
D. interface Gig0/0/0
ip access-group protect-ssh in
Answer: C
Explanation:

QUESTION 3
Which two options are causes of out-of-order packets? (Choose two.)
A. a routing loop
B. a router in the packet flow path that is intermittently dropping packets
C. high latency
D. packets in a flow traversing multiple paths through the network
E. some packets in a flow being process-switched and others being interrupt-switched on a transit
router
Answer: D,E
Explanation:

QUESTION 4
A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but
attempts to transmit larger amounts of data hang and then time out. What is the cause of this
problem?
A. A link is flapping between two intermediate devices.
B. The processor of an intermediate router is averaging 90 percent utilization.
C. A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a
port that has a sniffer attached.
D. There is a PMTUD failure in the network path.
Answer: D
Explanation:

QUESTION 5
Refer to the exhibit.

ICMP Echo requests from host A are not reaching the intended destination on host B. What is the
problem?
A. The ICMP payload is malformed.
B. The ICMP Identifier (BE) is invalid.
C. The negotiation of the connection failed.
D. The packet is dropped at the next hop.
E. The link is congested.
Answer: D
Explanation: