- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,816,004 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
- An error has occurred; the feed is probably down. Try again later.
- Alleged vDOS Owners Poised to Stand Trial Monday, March 27, 2017 1:56 pm
- Phishing 101 at the School of Hard Knocks Friday, March 24, 2017 4:03 pm
- eBay Asks Users to Downgrade Security Wednesday, March 22, 2017 5:59 pm
- Student Aid Tool Held Key for Tax Fraudsters Tuesday, March 21, 2017 7:07 pm
- Govt. Cybersecurity Contractor Hit in W-2 Phishing Scam Friday, March 17, 2017 10:02 pm
- Google Points to Another POS Vendor Breach Friday, March 17, 2017 12:11 am
- Four Men Charged With Hacking 500M Yahoo Accounts Thursday, March 16, 2017 12:49 am
- Adobe, Microsoft Push Critical Security Fixes Tuesday, March 14, 2017 8:50 pm
- If Your iPhone is Stolen, These Guys May Try to iPhish You Tuesday, March 14, 2017 5:17 am
- Dahua, Hikvision IoT Devices Under Siege Friday, March 10, 2017 8:07 pm
Tag Archives: Security
What’s the top Pen Testing ISOs for 2017? Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading
BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet. Here’s the link to see if you have something that … Continue reading
The Microsoft Baseline Security Analyzer provides a free look at how secure your computer is and provides the information needed to correct any security deficiencies that you have. The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing … Continue reading
BSides has been in more than 16 countries and 74+ cities. If you missed an event, you should make sure you catch the next one. Learn security from the best.
Windows 2008 Server has Network Access Protection which is also known as NAP or NPS. This tool serves an administrative purpose to help organizations compare the security level in a computer on the network to the Server 2008’s policies. This … Continue reading
I encourage my students to go over and visit Rick, Paul and Bill’s blog. In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections. Great Article. With our students going through some … Continue reading
175 Vulnerabilities – Windows 8 Link 2066 Vulnerabilities – Apple Mac Link
Need to repair or reset Windows’ Firewall? Here’s a great utility to reset your firewall. Repair WMI and Windows Firewall (by PCWinTech an excellent site). PCWinTech WMI and Windows’ Firewall Repair
OK, it’s not a real secret but you can go to a cmd prompt (as the administrator) and generate a password using the following command: net user username /random Windows will create a random password and yes it works in … Continue reading
“….This training gap has resulted in serious problems for some companies, according to the Trustwave study. Enterprises experience some 14.4 incidents of data loss per year due to employee negligence, and 15 percent of them have reported an insider breach … Continue reading
Lockheed Martin’s secure future challenge – “Innovate the Future” ”Lockheed Martin recognizes that great ideas can come from anywhere. This campaign offers a global forum for participants to share their ideas for ways to enable a more secure future for … Continue reading
Though the second half of the year has been comparably calmer than the first half’s excitement over database breaches at RSA, Sony, and Epsilon, the breach numbers continued to roll in — especially at healthcare organizations, which made up a … Continue reading
Companies and universities look for specific algorithms that will help identify malicious insiders and compromised systems that are acting as insiders. Analyzing Data To Pinpoint Rogue Insiders – Dark Reading.
With hackers turning up the heat in 2011 and security breaches increasingly costing businesses more money in clean-up costs, notification resources and compliance fines, the stakes are high for SMBs to improve their security processes. “An attack that costs $20,000 … Continue reading
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices (PCs, Macs, servers, smartphones, iPads, etc.) are communicating with criminals Forensics for advanced threat activity.
An iPhone’s accelerometer is good for more than just games, according to computer security researchers from Georgia Tech and MIT. It can also be used to record keystrokes from a computer user’s keyboard when sitting nearby on a desk. via … Continue reading
Information Security Leaders, an independent security careers website, is now polling security professionals for its InfoSecLeaders Certification Survey to learn what they really think about security certifications. Are they valuable or meaningless to your career? Did they help you get … Continue reading
If you need network monitoring tools, DarkReading gives you a look at 10 free tools that can help you monitor your network. Read more .
Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security. Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading
The world\’s largest technology company has earned another accolade: it was responsible for the largest number of security flaws in the first half of 2010, knocking Oracle off the top spot. Microsoft is in third place. via Apple the new … Continue reading