Cisco Umbrella is a good solution for blocking unwanted websites on your network.
Why Cisco Umbrella is a good solution for a business to provide safe and secure Internet access.
Why Cisco Umbrella is a good solution for a business to provide safe and secure Internet access.
How to best manage Internet Security in 2023, this is more and more important these days.
How to best secure a computer network and ensure a data breach never happens.
Cybersecurity is more important than ever in 2022. Take steps today to be more secure.
My Waterfox Classic installation is becoming increasingly broken because of not updating it in a very long time, and since I’m pretty much forced to upgrade I decided to take some time to analyze what the new version is doing since everything that’s happened with it has made me a bit uncomfortable. I thought I’d … Read more
My Waterfox Classic installation is becoming increasingly broken because of not updating it in a very long time, and since I’m pretty much forced to upgrade I decided to take some time to analyze what the new version is doing since everything that’s happened with it has made me a bit uncomfortable. I thought I’d … Read more
The world of information security has always been beset by various threats that have ranged from the simple viruses that were distributed on floppy disks, to the complex computer viruses that are distributed as E-mail borne attachments that can be opened by careless users. The need for better training for any staff that are in … Read more
The databases and internal software of the Twitch video streaming platform have been leaked on the Internet. Twitch is an American video live streaming service that focuses on video game live streaming, including broadcasts of esports competitions, operated by Twitch Interactive, a subsidiary of Amazon.com, Inc. This leak includes the following. Entirety of twitch.tv, with … Read more
Windows security on a local area network Windows security on a local area networkStrong passwordsSecuring the Windows systemsPhysical securityEducating usersOnline security Strong passwords Enforcing strong passwords with Active Directory is another way to keep the network safe. Users may be tempted to use something like passwordme1 or mypasswordisStrong1 but those passwords are not secure enough … Read more
Rules concerning passwords can be different depending upon the use case. A normal home user can get away with a standard 8 – 12 character password as long as it has some upper-case characters and numbers in it. A business would require more security, physical security of the actual hardware and a stronger password, like … Read more
Footprinting Footprinting is defined as the process of gathering information on computer systems and networks. This is the first step in information gathering and provides a useful insight into the network you are planning to attack. Zero-day exploits These are exploits that are found before there are patches for these problems. These can cause many … Read more
When a user runs a program on Linux, the program runs with the same permissions as that user account. For example, if user Joe doesn’t have permission to modify the files in /etc, any program that Joe runs won’t have permission either. There’s an exception to every rule. Files that have the SetUID bit set … Read more
Installing the wpscan utility on Ubuntu allows non-invasive scanning of a website running WordPress to find any vulnerabilities. This is very useful to run on your own website, then you may fix any problems presented after the scanning is complete. This helps ensure that your WordPress blog is as secure as you can make it. … Read more
Information Security is very important these days, I have made a listing below of a few penetration testing tools that are very useful for finding weaknesses in the security of your business. This is good when you have a network connected to the Internet, you must ensure that only necessary ports are open to the … Read more
The many Linux distributions out there are very interesting in how they work. The passwords for the users are stored in a file in /etc/shadow. This is only readable by the system administrator account and are encrypted with different levels of encryption. This example is using the outdated MD5 encryption scheme, which should never be … Read more
The security of WIFI networks is getting better, but they still need work. Many routers with the default configuration have settings for WPS that limit the number of tries for each PIN attempt. But it is still possible to de-authenticate a user on the Wireless network and then capture a WPA handshake that can be … Read more
Scanning a Linux system for vulnerabilities can be a lot of fun. I have used Nessus to find SSH vulnerabilities like Heartbleed. I was doing penetration testing on a Linux machine and I found a Heartbleed bug. Vulnerability Explanation: The installation of OpenSSL on the Linux webserver was found to be vulnerable to the Heartbleed … Read more
Windows security on a local area networkStrong passwordsSecuring the Windows systemsPhysical securityEducating usersOnline securityDo not use WEP at allUse RADIUS servers for greater securityClient isolation settingWhat not to do when deploying WIFI What you should and should not do when deploying a WIFI network for your business. Do not use WEP at all The WEP … Read more
It is still possible to find anything on the Internet. Backups of websites containing passwords and information. It is all out there, and not everyone is getting the message that this is a bad idea. This could be used to harvest e-mail addresses and decrypt passwords. Do not store website backups in publically accessible directories. … Read more
This is a Windows 10 computer with a virus infestation, this person was asking if this was a serious problem or not. I mean really? Of course it is. As long as I had Windows 10 installed, I shouldn’t have had anything at all to worry about. The problem is that I was getting messages … Read more