Tag Archives: Linux Security

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading

Rate this:

Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

FREE – Security engineering training by SAFECode

FREE – How can you beat it?  Once again, another excellent site has training that is Free.   While we have found Rackspace’s Cloud University,  Free Microsoft Training and virtualization this site adds an additional form of training that can … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Information Technology, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , , , , | 2 Comments

October is National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Free Security Check … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Linux, Medical, network, Networking, Technology, Ubuntu, Windows | Tagged , , , , , , , , , | 1 Comment

Testing your IPv6 security

With IPv6, your computer may be exposed to the internet.  Here’s a link that test your connection with NMap.  Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security.  Note … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , , | Leave a comment

Cyber Terrorism – Al Qaeda Video Calls for Electronic Jihad

The National Terror Alert Response Center has an excellent article Al Qaeda may be turning its destructive attention to cyber-warfare against the United States. In a chilling video, an al Qaeda operative calls for “electronic jihad” against the United States, and … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Linux Users Beware: Patch New Samba Flaw ‘Immediately’ – Dark Reading

The open-source Samba group this week released an update to the Samba program to fix a bug that could allow an attacker to remotely acquire root access to the targeted server. The bug in Samba versions 3.6.3 and previous versions … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking | Tagged , , , , , , | Leave a comment

Help Net Security – Free [IN] Secure Magazine

Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security.  Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Health, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , , , , , | Leave a comment

Open-Source Project Server Hacked, Software Rigged With Backdoor Trojan

Open-Source Project Server Hacked, Software Rigged With Backdoor Trojan – Darkreading. Open Source – more backdoors and trojans on board?

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

New Local Linux Kernel Root Exploit Published

New Local Linux Kernel Root Exploit Published. Another Exploit

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Linux Kernel Flaw Coughs Up Root Rights

Linux Kernel Flaw Coughs Up Root Rights. See Also- Linux kernel exploit gives hackers a foot in back door. Linux is still one of the most secure operating systems but as they grow, so do the vulnerabilities.

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

Can NAT be circumvented? Are Firewalls Failing?

Can someone write code to circumvent a NATed network?  No – If your firewall is adequately secured and configured properly.   An interesting article from Bit-Tecn.net has an article stating that a hacker has created a piece of code that allows NAT … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , | 2 Comments