Category Archives: Hacking

One in four wireless networks are still unsecure

Annually our class studies wireless technology and its implementation into homes and industry.   Surveys are conducted to analyze security used, transmit power and geographic location of wireless technology. According to Wigle.net, Security has improved over past years.  Home users … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Internet, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

OWASP Zed Attack Proxy (ZAP)- Using on your home network

OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, internet security;, IoT, Microsoft Windows, Microsoft Windows 10, Networking, Technology, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Security, Windows Server, Wireless | Tagged , , , , , , , | Leave a comment

Phone news

iPhone and Android woes Rootkit found pre-installed on 3 million Android Phones iPhone sends call information to Apple? iPhone Access can be bypassed? Some Android phones sending information to China

Rate this:

Posted in Apple, Hacking, Information Technology, Technology | Tagged , | Leave a comment

Are your IoT devices visible from the internet?

BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet.  Here’s the link to see if you have something that … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Hardware, higher ed, higher education, Information Technology, Internet, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft Windows, Mobile Computing, network, Networking, Technology | Tagged , , , , , | Leave a comment

An interview with Shannon Morse, Internet Media Host & Producer

Image Source Over the next several months we plan on interviewing technical experts and leaders across the globe to find out how they got started in the technology industry, what their favorite operating systems are, information security trends and more. This … Continue reading

Rate this:

Posted in Computer hardware, Computer Security, Computers, Hacking, Information Technology, internet security;, Linux, Microsoft, Technology | Tagged , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

The easy way to subnet your network

Why?  The Golden Question All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet? Subnets … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , | 2 Comments

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

See who’s on your wireless network – SoftPerfect WiFi Guard

Want to see who is on your wireless?  SoftPerfect’s  WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Computers, freeware, Hacking, Home Networking, Information Technology, Linux, network, Networking, Software, Technology, Windows | Tagged , , , , , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Security Onion- IDS, NSM, and log management

What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network?  And what if you want an easy setup that provides you with information that … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Industry, Information Technology, Linux, Manufacturing, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , | Leave a comment

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

Defending your network with Snort for Windows

When you hear about Snort, the De facto of Intrusion Detection Systems, you think of Linux.  Snort offers a Windows setup and signatures that can be used with any operating system. Snort should be a dedicated computer in your network. … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, freeware, Hacking, Information Technology, network, Networking, Software, Windows | Tagged , , , , , | 1 Comment

What should you do with an old computer? Create a home router/firewall!

ITX-motherboards can often be found in older computers from garage sales or thrift stores.  What is the practical use for these motherboards or older computers? Here’s a small project that involves protecting your home. After finding an ITX motherboard and … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Computers, Education, freeware, Hacking, Home Networking, Information Technology, Internet, Linux, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , | Leave a comment

US businesses suffered 666,000 internal security breaches

Over 666,000 internal security breaches took place in US businesses in the last 12 months, an average of 2,560 per working day, new research has revealed. The findings, revealed by IS Decisions, also found that despite this regular occurrence, only … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Information Technology, Linux, Medical, Networking, Windows | Tagged , | Leave a comment

800M exposed records make 2013 record year for data breaches

While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading

Rate this:

Posted in Apple, Business, Computers, Education, Hacking, Home Networking, Information Technology, Linux, Medical, network, Networking, Organizations, Technology, Windows | Tagged , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

How long will it take to crack your password?

Mickey found a great site that gives the approximate time it will take to break your password.  The site, howsecureismypassword.net gives the  approximate time and a background color that indicates how secure your password is.  There are other things to … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Hacking, Home Networking, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , , , | 1 Comment