- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,786,906 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
Tag Archives: Windows Security
OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading
Full credit goes to Dawn for this fix. We recently had an updated computer that had only users with just user rights. The Administrator account had been disabled. Need to get into the administrator account but the admin account … Continue reading
Microsoft wants to help protect companies from hack attacks, and it’s introducing a new Windows 10 feature soon to improve the operating system’s security capabilities. Windows Defender Advanced Threat Protection is aimed at helping businesses deal with serious threats by using … Continue reading
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
The Microsoft Baseline Security Analyzer provides a free look at how secure your computer is and provides the information needed to correct any security deficiencies that you have. The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing … Continue reading
In order to understand security properly, you should also have an understanding of hacking. Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network. A comprehensive guide can … Continue reading
Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
And after installing the updates, let’s reboot and get the rest…. Note: This is an isolated non-production lab server (an example of what happens when computers are ignored)
Go to a Command prompt, type the following commands Enter after each one. Netcfg -u MS_L2TP Netcfg -u MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_PPTP Netcfg -l %windir%\inf\netrast.inf -c p -i MS_L2TP Another solution – 1. Click Start, and then … Continue reading
With IPv6, your computer may be exposed to the internet. Here’s a link that test your connection with NMap. Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security. Note … Continue reading
But in fairness to Apple, they have improved leaps and bounds in their security compared to their older operating systems. Their latest operating system OS X Lion makes up a lot of lost ground and has greatly improved security. Yet they still have further … Continue reading
Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security. Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading
With over 470+ tweaks, True System Security Tweaker allows you to easily tweak the security on your computer. Note: If you use this software, make note of the changes you make so they can be easily reversed.
Have a SID that you can see in a share? Running a security check on your network? Can you see the SID number of a user? You can use SID Resolver to find out the friendly name of the user. … Continue reading
How Secure is your password? Type in your password and see approximately how long it would take someone to crack it. Read the full review over at Rick’s blog “What’s On My PC“.
Need to password protect a folder? Here’s a solution in Beta Format that works great. IOBit’s Password Folder Beta lets you protect sensitive documents, pictures or other information. If you have a family computer and need to protect your data, … Continue reading
Microsoft’s Technet has a great step by step guide to setup Security Audits In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously, there were nine basic … Continue reading