- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,912,423 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
- Internet or network application slow? You may need to temporarily disable Nagle’s Algorithm
- Want a fast and safer browser? Try Brave
- Find rogue APs with Xirrus Wi-Fi Inspector using signal strength and sound
- How to get OpenWRT on a Rosewill RNX-N150RT Router? Flash it to DD-WRT then flash to a TP-Link TL-WR741N. Finish with OpenWRT or Gargoyle and out perform may AC routers.
- SSL not showing green lock? Here’s some things to try.
- Gas Pump Skimmer Sends Card Data Via Text Thursday, July 27, 2017 11:08 am
- How a Citadel Trojan Developer Got Busted Tuesday, July 25, 2017 4:11 pm
- Exclusive: Dutch Cops on AlphaBay ‘Refugees’ Thursday, July 20, 2017 6:14 pm
- After AlphaBay’s Demise, Customers Flocked to Dark Market Run by Dutch Police Thursday, July 20, 2017 4:23 pm
- Trump Hotels Hit By 3rd Card Breach in 2 Years Wednesday, July 19, 2017 3:43 pm
- Experts in Lather Over ‘gSOAP’ Security Flaw Tuesday, July 18, 2017 2:30 pm
- Porn Spam Botnet Has Evil Twitter Twin Sunday, July 16, 2017 12:11 pm
- Thieves Used Infrared to Pull Data from ATM ‘Insert Skimmers’ Thursday, July 13, 2017 3:28 pm
- Adobe, Microsoft Push Critical Security Fixes Tuesday, July 11, 2017 10:26 pm
- Self-Service Food Kiosk Vendor Avanti Hacked Saturday, July 8, 2017 3:09 pm
Tag Archives: Windows Security
What’s the top Pen Testing ISOs for 2017? Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading
Source: 9 Popular Password Manager Apps Found Leaking Your Secrets
OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading
Full credit goes to Dawn for this fix. We recently had an updated computer that had only users with just user rights. The Administrator account had been disabled. Need to get into the administrator account but the admin account … Continue reading
Microsoft wants to help protect companies from hack attacks, and it’s introducing a new Windows 10 feature soon to improve the operating system’s security capabilities. Windows Defender Advanced Threat Protection is aimed at helping businesses deal with serious threats by using … Continue reading
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
The Microsoft Baseline Security Analyzer provides a free look at how secure your computer is and provides the information needed to correct any security deficiencies that you have. The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing … Continue reading
In order to understand security properly, you should also have an understanding of hacking. Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network. A comprehensive guide can … Continue reading
Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
And after installing the updates, let’s reboot and get the rest…. Note: This is an isolated non-production lab server (an example of what happens when computers are ignored)
Go to a Command prompt, type the following commands Enter after each one. Netcfg -u MS_L2TP Netcfg -u MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_L2TP Another solution – 1. Click Start, and then … Continue reading
With IPv6, your computer may be exposed to the internet. Here’s a link that test your connection with NMap. Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security. Note … Continue reading
But in fairness to Apple, they have improved leaps and bounds in their security compared to their older operating systems. Their latest operating system OS X Lion makes up a lot of lost ground and has greatly improved security. Yet they still have further … Continue reading
Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security. Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading
With over 470+ tweaks, True System Security Tweaker allows you to easily tweak the security on your computer. Note: If you use this software, make note of the changes you make so they can be easily reversed.
Have a SID that you can see in a share? Running a security check on your network? Can you see the SID number of a user? You can use SID Resolver to find out the friendly name of the user. … Continue reading
How Secure is your password? Type in your password and see approximately how long it would take someone to crack it. Read the full review over at Rick’s blog “What’s On My PC“.