Cisco Umbrella is a good solution for blocking unwanted websites on your network.
Why Cisco Umbrella is a good solution for a business to provide safe and secure Internet access.
Read MoreWhy Cisco Umbrella is a good solution for a business to provide safe and secure Internet access.
Read MoreHow to best manage Internet Security in 2023, this is more and more important these days.
Read MoreHow to best secure a computer network and ensure a data breach never happens.
Read MoreCybersecurity is more important than ever in 2022. Take steps today to be more secure.
Read MoreMy Waterfox Classic installation is becoming increasingly broken because of not updating it in a very long time, and since I’m pretty much forced to upgrade I decided to take some time to analyze what the new version is doing since everything that’s happened with it has made me a…
Read MoreMy Waterfox Classic installation is becoming increasingly broken because of not updating it in a very long time, and since I’m pretty much forced to upgrade I decided to take some time to analyze what the new version is doing since everything that’s happened with it has made me a…
Read MoreThe world of information security has always been beset by various threats that have ranged from the simple viruses that were distributed on floppy disks, to the complex computer viruses that are distributed as E-mail borne attachments that can be opened by careless users. The need for better training for…
Read MoreThe databases and internal software of the Twitch video streaming platform have been leaked on the Internet. Twitch is an American video live streaming service that focuses on video game live streaming, including broadcasts of esports competitions, operated by Twitch Interactive, a subsidiary of Amazon.com, Inc. This leak includes the…
Read MoreWindows security on a local area network Windows security on a local area networkStrong passwordsSecuring the Windows systemsPhysical securityEducating usersOnline security Strong passwords Enforcing strong passwords with Active Directory is another way to keep the network safe. Users may be tempted to use something like passwordme1 or mypasswordisStrong1 but those…
Read MoreRules concerning passwords can be different depending upon the use case. A normal home user can get away with a standard 8 – 12 character password as long as it has some upper-case characters and numbers in it. A business would require more security, physical security of the actual hardware…
Read MoreFootprinting Footprinting is defined as the process of gathering information on computer systems and networks. This is the first step in information gathering and provides a useful insight into the network you are planning to attack. Zero-day exploits These are exploits that are found before there are patches for these…
Read MoreWhen a user runs a program on Linux, the program runs with the same permissions as that user account. For example, if user Joe doesn’t have permission to modify the files in /etc, any program that Joe runs won’t have permission either. There’s an exception to every rule. Files that…
Read MoreInstalling the wpscan utility on Ubuntu allows non-invasive scanning of a website running WordPress to find any vulnerabilities. This is very useful to run on your own website, then you may fix any problems presented after the scanning is complete. This helps ensure that your WordPress blog is as secure…
Read MoreInformation Security is very important these days, I have made a listing below of a few penetration testing tools that are very useful for finding weaknesses in the security of your business. This is good when you have a network connected to the Internet, you must ensure that only necessary…
Read MoreThe many Linux distributions out there are very interesting in how they work. The passwords for the users are stored in a file in /etc/shadow. This is only readable by the system administrator account and are encrypted with different levels of encryption. This example is using the outdated MD5 encryption…
Read MoreThe security of WIFI networks is getting better, but they still need work. Many routers with the default configuration have settings for WPS that limit the number of tries for each PIN attempt. But it is still possible to de-authenticate a user on the Wireless network and then capture a…
Read MoreScanning a Linux system for vulnerabilities can be a lot of fun. I have used Nessus to find SSH vulnerabilities like Heartbleed. I was doing penetration testing on a Linux machine and I found a Heartbleed bug. Vulnerability Explanation: The installation of OpenSSL on the Linux webserver was found to…
Read MoreWindows security on a local area networkStrong passwordsSecuring the Windows systemsPhysical securityEducating usersOnline securityDo not use WEP at allUse RADIUS servers for greater securityClient isolation settingWhat not to do when deploying WIFI What you should and should not do when deploying a WIFI network for your business. Do not use…
Read MoreIt is still possible to find anything on the Internet. Backups of websites containing passwords and information. It is all out there, and not everyone is getting the message that this is a bad idea. This could be used to harvest e-mail addresses and decrypt passwords. Do not store website…
Read MoreThis is a Windows 10 computer with a virus infestation, this person was asking if this was a serious problem or not. I mean really? Of course it is. As long as I had Windows 10 installed, I shouldn’t have had anything at all to worry about. The problem is…
Read More