Tag Archives: Security

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading

Rate this:

Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment

Are your IoT devices visible from the internet?

BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet.  Here’s the link to see if you have something that … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Hardware, higher ed, higher education, Information Technology, Internet, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft Windows, Mobile Computing, network, Networking, Technology | Tagged , , , , , | Leave a comment

Microsoft Baseline Security Analyzer

The Microsoft Baseline Security Analyzer provides a free look at how secure your computer is and provides the information needed to correct any security deficiencies that you have. The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing … Continue reading

Rate this:

Posted in Windows, Windows Security | Tagged , , | Leave a comment

BSides – If you missed an event, catch the next one

BSides has been in more than 16 countries and 74+ cities.  If you missed an event, you should make sure you catch the next one.  Learn security from the best.

Rate this:

Posted in Technology | Tagged , , | Leave a comment

Network Access Protection

Windows 2008 Server has Network Access Protection which is also known as NAP or NPS. This tool serves an administrative purpose to help organizations compare the security level in a computer on the network to the Server 2008’s policies. This … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Interesting facts from Secunia – Windows 8 vs. Apple Mac

175  Vulnerabilities – Windows 8  Link 2066 Vulnerabilities – Apple Mac Link  

Rate this:

Posted in Technology | Tagged , | Leave a comment

Repair Windows Firewall

Need to repair or reset Windows’ Firewall?  Here’s a great utility to reset your firewall.  Repair WMI and Windows Firewall (by PCWinTech an excellent site). PCWinTech WMI and Windows’ Firewall Repair

Rate this:

Posted in Computers | Tagged , , , , , , , , , , | Leave a comment

Secret Password Generator in Windows 7

OK, it’s not a real secret but you can go to a cmd prompt (as the administrator) and generate a password using the following command:    net user username /random Windows will create a random password and yes it works in … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , | 1 Comment

End User Security Awareness Gap Remains Wide, Experts Say – Dark Reading

“….This training gap has resulted in serious problems for some companies, according to the Trustwave study. Enterprises experience some 14.4 incidents of data loss per year due to employee negligence, and 15 percent of them have reported an insider breach … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Innovate the Future Challenge – Lockheed Martin

Lockheed Martin’s secure future challenge – “Innovate the Future” ‎”Lockheed Martin recognizes that great ideas can come from anywhere. This campaign offers a global forum for participants to share their ideas for ways to enable a more secure future for … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , | Leave a comment

Five Big Database Breaches Of 2011’s Second Half – Dark Reading

Though the second half of the year has been comparably calmer than the first half’s excitement over database breaches at RSA, Sony, and Epsilon, the breach numbers continued to roll in — especially at healthcare organizations, which made up a … Continue reading

Rate this:

Posted in Computers | Tagged , , | Leave a comment

Analyzing Data To Pinpoint Rogue Insiders

Companies and universities look for specific algorithms that will help identify malicious insiders and compromised systems that are acting as insiders.  Analyzing Data To Pinpoint Rogue Insiders – Dark Reading.

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

Top 10 Security Mistakes SMBs Make

With hackers turning up the heat in 2011 and security breaches increasingly costing businesses more money in clean-up costs, notification resources and compliance fines, the stakes are high for SMBs to improve their security processes. “An attack that costs $20,000 … Continue reading

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

Forensics for advanced threat activity

Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices (PCs, Macs, servers, smartphones, iPads, etc.) are communicating with criminals Forensics for advanced threat activity.

Rate this:

Posted in Computers | Tagged , , , , , , , | Leave a comment

Researchers can keylog your PC using your iPhone’s accelerometer

An iPhone’s accelerometer is good for more than just games, according to computer security researchers from Georgia Tech and MIT. It can also be used to record keystrokes from a computer user’s keyboard when sitting nearby on a desk. via … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , | Leave a comment

Security Certifications: Valuable Or Worthless?

Information Security Leaders, an independent security careers website, is now polling security professionals for its InfoSecLeaders Certification Survey to learn what they really think about security certifications. Are they valuable or meaningless to your career? Did they help you get … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Internet, network, Networking, Technology | Tagged , , , , , , | Leave a comment

Ten Free Security Monitoring Tools

If you need network monitoring tools, DarkReading gives you a look at 10 free tools that can help you monitor your network.  Read more .

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

Help Net Security – Free [IN] Secure Magazine

Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security.  Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Health, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , , , , , | Leave a comment

Apple the new world leader in software insecurity

The world\’s largest technology company has earned another accolade: it was responsible for the largest number of security flaws in the first half of 2010, knocking Oracle off the top spot. Microsoft is in third place. via Apple the new … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, Hacking, Information Technology, network, Technology | Tagged , , , , , | Leave a comment