Category Archives: Computer Security

Should you disable 8dot3 for performance and security?

Microsoft did recommend to disable short names  in a security guide some times back.  There is evidence that file operations in directories (folders) that contain a large number of file can be slowed by short file name creations.  So does … Continue reading

Rate this:

Posted in Computer Security, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows Security, Windows Server | Tagged , , , , , , | Leave a comment

Brute Force Username and Passwords with Ncrack – Security / Educational

Disclaimer: You must own or have permission to run Ncrack on any network or device.  This post is used for educational purposes. IT admin personnel can test different devices and their setups with ncrack.  If devices are set up in … Continue reading

Rate this:

Posted in Computer Security, Education, Free Software, Hacking, Information Technology, IoT, Technology | Tagged , , , , , | Leave a comment

BackBox – What is it and how do I update it?

BackBox is more than an operating system, it is a Free Open Source Community Project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. BackBox Linux is … Continue reading

Rate this:

Posted in Computer Security, Computer Software, higher ed, higher education, Information Technology, Linux, Software, Technology | Tagged , , , | Leave a comment

Why hiding your SSID is not secure.

Have you heard that hiding your SSID is a good idea?  Think again. With BackBox or Kali (in fact in form of Linux), you can run sudo airodump-ng phy1.mon at a terminal (replace phy1.mon with your network card number) – onboard … Continue reading

Rate this:

Posted in Computer Security, higher ed, Home Networking, Information Technology, internet security;, network, Networking, Technology, Wireless | Tagged , | Leave a comment

Running Wireshark in Linux

Are you running Wireshark in Linux?  You may have to give permission to a non-root user to sniff packets.  How do you do this? Open Terminal Next, type – sudo dpkg-reconfigure wireshark-common Enter YES in the screen that ask for … Continue reading

Rate this:

Posted in Computer Security, Computers, Free Software, freeware, higher education, Linux, Technology | Tagged , , | Leave a comment

Are you leaking DNS information?

Are you leaking DNS Information? “Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS … Continue reading

Rate this:

Posted in Apple, Computer Security, Education, Information Technology, Linux, Mac, Technology, Windows | Tagged , | Leave a comment

Have a web server you’ve recently added a SSL certificate on and SQL is not starting?

Here’s a solution if you SQL isn’t starting –  SQL Dude’s Blog NARTAC also makes a software to help you tweak and strengthen ciphers and protocols.  IIS Crypto can be downloaded here. You can also test your site or other … Continue reading

Rate this:

Posted in Business, Computer Security, computer troubleshooting, Free Software, freeware, Information Technology, Technology, troubleshooting, Windows Security, Windows Server | Tagged , , , | Leave a comment

Think home automation or IoT is safe? Think again.

Think IoT and home automation is secure?  Think again.  During the 2018 Middle TN Cyber Summit, the first thing that was owned was an automated outlet.  How long did it take?   Seven seconds. See our post on the summit here.

Rate this:

Posted in Computer Security, Hacking, higher education, Information Technology, Internet of Things, IoT, Technology | Tagged , , | Leave a comment

Middle Tennessee Cyber Summit 2018

The program included presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector cyber security partners. Speakers addressed business and industry intrusions, incidence handling and response, identifying vulnerabilities, understanding threats, and … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, Information Technology, Internet of Things, IoT, Technology, Windows Security | Tagged , , , | Leave a comment

2018 Middle TN Cyber Security Conference

Registration and conference information: https://www.2018cyberconf.com/ThruHackersEyes  

Rate this:

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Technology, Windows Security | Tagged , , | Leave a comment

Save the date for the 2018 Middle TN Cyber Security Conference.

Save the date for the Middle TN Cyber Security Conference. Website and registration details will be posted soon.      

Rate this:

Posted in Computer Security, higher ed, higher education, internet security;, Technology, Windows Security | Tagged , , , | Leave a comment

Need to check your PC for Meltdown or Spectre?

Need to check your PC for Meltdown or Spectre?  Use  Steve Gibson’s free tool to check if you are vulnerable. https://www.grc.com/inspectre.htm

Rate this:

Posted in Computer Security, Computer Software, Free Software, freeware, help desk, higher ed, higher education, Information Technology, malware, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1 | Tagged , , , , , , | Leave a comment

Wi-Fi networks will emerge in 2018 as part of Wi-Fi CERTIFIED WPA3™

New Wi-Fi® security features available in 2018 Las Vegas, NV – January 8, 2018 – Wi-Fi Alliance® …Read more

Rate this:

Posted in Computer Security, Technology, Wireless | Tagged , , | Leave a comment

Windows Updates – Double check by visiting Microsoft’s Update site

Want to make sure your Windows is up-to-date?  Here’s a tip.  You can go to setup in Windows 10 by clicking the gear and then clicking Update and Security. Once you click update and Security, you can see if your … Continue reading

Rate this:

Posted in Computer Security, Computer Software, Computers, Education, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips | Tagged , , , , | Leave a comment

Want a fast and safer browser? Try Brave

Brave browser is an excellent browser for speed and safety. Speed and Safety Blocks trackers and intrusive ads Prevents the 60% page load time latency by blocking ads Prevents the 20% load time latency from underlying code or scripts try … Continue reading

Rate this:

Posted in Computer Security, Computer Software, Computers, Education, Free Software, freeware, Information Technology, Linux, Mac, Mac Tips, Microsoft Windows, Microsoft Windows 10, Technology, Windows 10 Quick Tips | Tagged , , , | 1 Comment

SSL not showing green lock? Here’s some things to try.

Recently we did a certificate request with an IIS server and loaded the received certificates under Enterprise Trust and imported the certificate into IIS. When we visited the website, we noticed that the newly loaded server did not present a … Continue reading

Rate this:

Posted in Computer Security, Education, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, network, Networking, Technology, troubleshooting, Windows, Windows Security, Windows Server | Tagged , , , , , , | Leave a comment

Bookmark4Techs link updated

Need access to one of the largest listings of technical bookmarks? Go over and visit – https://whatsonmypc.blog/bookmarks4techs/

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Hardware, Home Networking, Industry, Information Technology, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Technology, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Security | Leave a comment

Cyber Summit – Memphis, TN June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

2017 Cyber Security Conference – Memphis, TN – June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, higher ed, higher education, Information Technology, internet security;, Technology, Windows Security | Tagged , , , , | Leave a comment

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading

Rate this:

Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment