Tag Archives: Network Security

OWASP Zed Attack Proxy (ZAP)- Using on your home network

OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, internet security;, IoT, Microsoft Windows, Microsoft Windows 10, Networking, Technology, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Security, Windows Server, Wireless | Tagged , , , , , , , | Leave a comment

Are your IoT devices visible from the internet?

BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet.  Here’s the link to see if you have something that … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Hardware, higher ed, higher education, Information Technology, Internet, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft Windows, Mobile Computing, network, Networking, Technology | Tagged , , , , , | Leave a comment

2016 Middle Tennessee Cyber Summit

Free – security conference with Man in the Middle demos, Capture the Flag and Industry leading speakers. The program will include presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector … Continue reading

Rate this:

Posted in Education, higher education, Technology | Tagged , , , , , , , , | Leave a comment

Check your router’s security – F-Secure Router Check

Has your router been compromised?  Is it secure?  With F-Secure’s Router Check, you can check to see if your router provides a secure connection to the internet. Many routers today are older and some manufacturers have abandoned firmware updates.   … Continue reading

Rate this:

Posted in Home Networking, Networking, Technology | Tagged , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

HACKMAGEDDON – An excellent website to view breaches and cyber attacks

HACKMAGEDDON is an excellent website where you can view breaches, security and other information.

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

3 REASONS HACKERS LOVE YOUR SMALL BUSINESS INFOGRAPHIC

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

What does the term MitM’d mean?

The term MitM’d means man in the middle.  Usually refers to a device or program that intercepts traffic between a source and a target.

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Free tool repairs critical Windows configuration vulnerabilities

“”Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and servers.”” Free tool repairs critical Windows configuration vulnerabilities (By AddThis – NetSecurity.org)   This excellent tool scans your system … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , | Leave a comment

FREE – Security engineering training by SAFECode

FREE – How can you beat it?  Once again, another excellent site has training that is Free.   While we have found Rackspace’s Cloud University,  Free Microsoft Training and virtualization this site adds an additional form of training that can … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Information Technology, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , , , , | 2 Comments

Nessus® – A vulnerability scanner for home or enterprise

What is one of the best vulnerability scanners on the market?  Nessus® by Tenable Network Security.  Nessus® provides an exceptional scanner that creates a server on your computer to scan your network or an individual device on your network.   … Continue reading

Rate this:

Posted in Computer Security, Computers, Information Technology, network, Networking, Technology, Windows | Tagged , | Leave a comment

Experts hope for another failure in next Anonymous attack

“Anonymous’ failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites. Anonymous plans to launch distributed denial of service (DDoS) … Continue reading

Rate this:

Posted in Information Technology | Tagged , , , , , | Leave a comment

Five Ways To Better Hunt The Zebras In Your Network – Dark Reading

“For the cybercriminal lions out on the Internet, your company is full of zebras. Defenders should not just protect the herd, but pay attention to those who stray, experts argue”  Five Ways To Better Hunt The Zebras In Your Network … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, Hacking, Information Technology, network, Networking, Technology | Tagged , , | Leave a comment

End User Security Awareness Gap Remains Wide, Experts Say – Dark Reading

“….This training gap has resulted in serious problems for some companies, according to the Trustwave study. Enterprises experience some 14.4 incidents of data loss per year due to employee negligence, and 15 percent of them have reported an insider breach … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Audit your network with LanSpy

LanSpy is a powerful yet small utility that scans your network and finds information about computers and devices.  Although an older program, the program is powerful and offers detailed information about computers Each computer or device can be clicked on … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Seemingly Insignificant SQL Injections Lead To Rooted Routers – Dark Reading

Black Hat researcher to show how vulnerable databases with temporary router information can lead to root-level access of Netgear routers   ..Seemingly Insignificant SQL Injections Lead To Rooted Routers – Dark Reading.

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

Over 50% use unauthorized file sharing apps at work

Sixty-six percent of those polled use free file-sharing platforms and, among these, 55 percent do so without alerting their IT departments. Without knowing which tools are being deployed within their organizations, IT administrators risk corporate assets, sensitive information and intellectual … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Install Snort on Windows

Just because you aren’t Linux proficient doesn’t mean you can’t install Snort.  You can use Ubuntu and follow the step by step instructions or you can install it on Windows. Here’s a tutorial on installing Snort on a Windows 7 … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Cyber Terrorism – Al Qaeda Video Calls for Electronic Jihad

The National Terror Alert Response Center has an excellent article Al Qaeda may be turning its destructive attention to cyber-warfare against the United States. In a chilling video, an al Qaeda operative calls for “electronic jihad” against the United States, and … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment