- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,786,906 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
Tag Archives: computer security
OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading
In order to understand security properly, you should also have an understanding of hacking. Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network. A comprehensive guide can … Continue reading
HACKMAGEDDON is an excellent website where you can view breaches, security and other information.
Qualys® BrowserCheck is a free online utility to check your browser for security. https://browsercheck.qualys.com/?scan_type=js Initial Scan After Java Update
The developers of one of the most advance open source operating system for penetration testing, ‘KALI Linux‘ have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device. Read more Kali Linux … Continue reading
So you want to work in Cyber Security? Here’s a Infographic from StaySafeOnline.org
Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users. List of all champions Activities you … Continue reading
I encourage my students to go over and visit Rick, Paul and Bill’s blog. In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections. Great Article. With our students going through some … Continue reading
So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs? You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading
According to the study, the most sought-after quality is a broad knowledge of security — more of a strategic understanding than technical know-how — followed by certifications. Read More Opinion – While certifications are an important part of IT, the … Continue reading
FREE – How can you beat it? Once again, another excellent site has training that is Free. While we have found Rackspace’s Cloud University, Free Microsoft Training and virtualization this site adds an additional form of training that can … Continue reading
The life of a file… 8:00 a.m. The executive secretary begins writing a credit memo for several clients. The file has sensitive data. 8:15 a.m. The file is saved to the documents folder on the secretary’s desktop. The … Continue reading
National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Free Security Check … Continue reading
The site Information is Beautiful gives a visualization of data breaches and other information about hacking over the past several years.
Need to repair or reset Windows’ Firewall? Here’s a great utility to reset your firewall. Repair WMI and Windows Firewall (by PCWinTech an excellent site). PCWinTech WMI and Windows’ Firewall Repair
HashTab provides the hash algorithms’ in several formats. How is it used? You can use HasTab by Implbits. HashTab installs a tab to the properties of a file. Once you verify the file and upload it or email it, you … Continue reading
“From the recent theft of counterterrorism data from Switzerland’s intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component” Five Significant Insider Attacks Of 2012 – Dark Reading.
“Metasploit sponsor Rapid7 is now offering a free service that scans browsers throughout an organization for vulnerabilities and security problems…” Free Browser Scan Service Debuts – Dark Reading. Browser Scan (Rapid 7) (Scan yours now) Example Below
Wired recently posted and excellent article on how hackers used vendors to erase the digital life of Mat Honan. See how the hackers used pieces of accounts to piece together his online accounts to gain access to his information and … Continue reading