Tag Archives: computer security

Cyber Summit – Memphis, TN June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

OWASP Zed Attack Proxy (ZAP)- Using on your home network

OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, internet security;, IoT, Microsoft Windows, Microsoft Windows 10, Networking, Technology, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Security, Windows Server, Wireless | Tagged , , , , , , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

HACKMAGEDDON – An excellent website to view breaches and cyber attacks

HACKMAGEDDON is an excellent website where you can view breaches, security and other information.

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Qualys® BrowserCheck

Qualys® BrowserCheck is a free online utility to check your browser for security. https://browsercheck.qualys.com/?scan_type=js Initial Scan After Java Update

Rate this:

Posted in Technology | Tagged , , , | Leave a comment

3 REASONS HACKERS LOVE YOUR SMALL BUSINESS INFOGRAPHIC

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Kali Linux “NetHunter” — Turn Your Android Device into Hacking Weapons

The developers of one of the most advance open source operating system for penetration testing, ‘KALI Linux‘ have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.  Read more Kali Linux … Continue reading

Rate this:

Posted in Technology | Tagged , , , | Leave a comment

So you want to work in Cyber Security?

So you want to work in Cyber Security?  Here’s a Infographic from StaySafeOnline.org

Rate this:

Posted in Technology | Tagged , , , , , | Leave a comment

National Cyber Security Awareness Month 2014

Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users. List of all champions Activities you … Continue reading

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Your business and home needs a firewall…why?

So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs?   You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading

Rate this:

Posted in Apple, Computer Security, Education, Health, Home Networking, Information Technology, Internet, Linux, Technology, Windows | Tagged , , , , , | Leave a comment

Solving The Security Workforce Shortage – DarkReading

According to the study, the most sought-after quality is a broad knowledge of security — more of a strategic understanding than technical know-how — followed by certifications.  Read More Opinion – While certifications are an important part of IT, the … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, Information Technology, Linux, Mobile Computing, network, Networking, Technology, Windows | Tagged , , , | Leave a comment

FREE – Security engineering training by SAFECode

FREE – How can you beat it?  Once again, another excellent site has training that is Free.   While we have found Rackspace’s Cloud University,  Free Microsoft Training and virtualization this site adds an additional form of training that can … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Information Technology, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , , , , | 2 Comments

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

October is National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Free Security Check … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Linux, Medical, network, Networking, Technology, Ubuntu, Windows | Tagged , , , , , , , , , | 1 Comment

Visualization of Data Breaches

The site Information is Beautiful gives a visualization of data breaches and other information about hacking over the past several years.

Rate this:

Posted in Technology | Tagged , , , , , , , | Leave a comment

Repair Windows Firewall

Need to repair or reset Windows’ Firewall?  Here’s a great utility to reset your firewall.  Repair WMI and Windows Firewall (by PCWinTech an excellent site). PCWinTech WMI and Windows’ Firewall Repair

Rate this:

Posted in Computers | Tagged , , , , , , , , , , | Leave a comment

What is HashTab and how can it be used to verify files?

HashTab  provides the hash algorithms’ in several formats.  How is it used? You can use HasTab by Implbits.   HashTab installs a tab to the properties of a file. Once you verify the file and upload it or email it, you … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , , | 1 Comment

Five Significant Insider Attacks Of 2012 – Dark Reading

“From the recent theft of counterterrorism data from Switzerland’s intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component”    Five Significant Insider Attacks Of 2012 – Dark Reading.

Rate this:

Posted in Technology | Tagged , , | Leave a comment

Free Browser Scan Service Debuts – Dark Reading

“Metasploit sponsor Rapid7 is now offering a free service that scans browsers throughout an organization for vulnerabilities and security problems…” Free Browser Scan Service Debuts – Dark Reading. Browser Scan (Rapid 7)  (Scan yours now) Example Below

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment