Tag Archives: Windows Security

OWASP Zed Attack Proxy (ZAP)- Using on your home network

OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, internet security;, IoT, Microsoft Windows, Microsoft Windows 10, Networking, Technology, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Security, Windows Server, Wireless | Tagged , , , , , , , | Leave a comment

Microsoft unveils Windows 10 feature designed to stymie advanced hack attacks-PCWorld

Microsoft wants to help protect companies from hack attacks, and it’s introducing a new Windows 10 feature soon to improve the operating system’s security capabilities. Windows Defender Advanced Threat Protection is aimed at helping businesses deal with serious threats by using … Continue reading

Rate this:

Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows Security | Tagged , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Microsoft Baseline Security Analyzer

The Microsoft Baseline Security Analyzer provides a free look at how secure your computer is and provides the information needed to correct any security deficiencies that you have. The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing … Continue reading

Rate this:

Posted in Windows, Windows Security | Tagged , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

3 REASONS HACKERS LOVE YOUR SMALL BUSINESS INFOGRAPHIC

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

Your server is a little out of date

And after installing the updates, let’s reboot and get the rest…. Note: This is an isolated non-production lab server (an example of what happens when computers are ignored)

Rate this:

Posted in Technology | Tagged , , | Leave a comment

VPN stuck on Verifying Username and Password

Go to a Command prompt, type the following commands Enter after each one. Netcfg -u MS_L2TP Netcfg -u MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_L2TP Another solution – 1. Click Start, and then … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Testing your IPv6 security

With IPv6, your computer may be exposed to the internet.  Here’s a link that test your connection with NMap.  Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security.  Note … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , , | Leave a comment

Cyber Terrorism – Al Qaeda Video Calls for Electronic Jihad

The National Terror Alert Response Center has an excellent article Al Qaeda may be turning its destructive attention to cyber-warfare against the United States. In a chilling video, an al Qaeda operative calls for “electronic jihad” against the United States, and … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Windows More Secure Than OS X

But in fairness to Apple, they have improved leaps and bounds in their security compared to their older operating systems. Their latest operating system OS X Lion makes up a lot of lost ground and has greatly improved security. Yet they still have further … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | 1 Comment

Help Net Security – Free [IN] Secure Magazine

Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security.  Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Health, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , , , , , | Leave a comment

Tweak the security on your computer

With over 470+ tweaks, True System Security Tweaker allows you to easily tweak the security on your computer. Note:  If you use this software, make note of the changes you make so they can be easily reversed.

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

Windows SID Resolver

Have a SID that you can see in a share?    Running a security check on your network?  Can you see the SID number of a user? You can use SID Resolver to find out the friendly name of the user.  … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

How Secure is Your Password? Test it!

How Secure is your password?  Type in your password and see approximately how long it would take someone to crack it.  Read the full review over at Rick’s blog “What’s On My PC“.

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

Password Protect a Folder

Need to password protect a folder?  Here’s a solution in Beta Format that works great. IOBit’s Password Folder Beta lets you protect sensitive documents, pictures or other information.  If you have a family computer and need to protect your data, … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , | Leave a comment

Step by step guide for Windows Server 2008 R2 Security Audits

Microsoft’s Technet has a great step by step guide to setup Security Audits In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously, there were nine basic … Continue reading

Rate this:

Posted in Computers | Tagged , , | Leave a comment