Search:

Type: Posts; User: cabby80; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    3
    Views
    29,743

    Lucky me...

    It appears I was just a "lucky" person who was early on their list of calls.

    This link has more details on how the call goes and what happens if you don't tell them off...
    ...
  2. Replies
    3
    Views
    9,690

    General or Security in particular?

    From a security perspective I like

    "Protect Your Windows Network" by Jesper Johansson and Steve Riley - Microsoft's "original" security gurus

    The Microsoft security and threats and...
  3. Replies
    12
    Views
    8,957

    http://www.zdnet.com.au/topic/security/ -...

    http://www.zdnet.com.au/topic/security/ - Australian Specific though

    http://www.darkreading.com/index.jhtml

    http://isc.sans.edu/index.html

    http://www.theregister.co.uk/security/
    ...
  4. Replies
    3
    Views
    29,743

    no idea

    I was cooking dinner, I couldn't be bothered following it through.

    I guess they would have either:
    1. Asked for Credit Card details and email address to send you the 'latest and greatest "Virus...
  5. Replies
    3
    Views
    29,743

    Cyber security related phone scam

    Hi All,

    I was cooking dinner last night and the phone rang, straight away I was suspicious as that is when these types of calls usually happen.

    I answer, "Hello" and there is silence on the end...
  6. Replies
    8
    Views
    22,890

    Exact Model

    The exact Model I use is the F5D7050 - http://www.belkin.com/iwcatproductpage.process?product_id=179211

    Which according to what I have been able to find out uses the Chipset: Ralink 2570

    From...
  7. Replies
    204
    Views
    134,657

    shocked

    I used to log on every 2nd day and go through all the posts (of which there was heaps), never posted that much as only tried to post when I could offer meaningful input or ask a meaningful question...
  8. Replies
    8
    Views
    22,890

    Aircrack NG VM

    I run the Aircrack-NG VMware image available from http://www.aircrack-ng.org/ with a Belkin USB Wireless adapter similar to the one here:...
  9. Replies
    6
    Views
    15,658

    Safeguard Vs Pointsec

    I have used pointsec and safeguard easy in previous roles(as they are the ones approved for Govt use within Australia).

    Pointsec was better as it allowed for more centralised management of...
  10. The solution

    Thanks to some help from the tomcat-users mailing list the solution to my problem was as follows:

    Stop all Tomcat instances/service. Open the "tomcat monitor" application and open the "configure"...
  11. Tomcat 6 on Windows - Enabling Security Manager

    Hi All,

    I am writing a Tomcat 6 on Windows hardening guide at the moment and I am looking at the process for enabling the security manager. On the Tomcat 6 documentation website...
  12. Replies
    0
    Views
    3,349

    2009 Data Breach Investigations Report

    Hi All,

    Verizon have released the 2009 Data Breach investigations report, whilst it doesn't tell IT Security professionals much that we don't already know (or could not have guessed) it can be an...
  13. Replies
    0
    Views
    5,248

    IBM in Talks to Buy Sun

    http://online.wsj.com/article/SB123735124997967063.html

    I am not sure this is a good thing - I would think bad for competition as particularly the server hardware market becomes more of an...
  14. Secunia Software Inspector

    I too use the Secunia tool at home and I think it is great. Especially for reviewing if things like Java, Flash, Acrobat etc are vulnerable or not. When I ran this for the first time I was surprised...
  15. Replies
    0
    Views
    4,698

    Microsoft March Security Bulletins

    Hi All,

    As usual the Microsoft Security Bulletins have been released, nothing new here but I wanted to draw your attention to MS09-007

    March advisories -...
  16. Replies
    19
    Views
    13,741

    I think the problem with harassment is that it is...

    I think the problem with harassment is that it is almost impossible to define what it is (i.e. what are the boundaries between harassment and a joke or harassment and an annoyance). Since there are...
  17. Replies
    5
    Views
    4,866

    Poll: Employees "leaking" data as they leave

    Hi all,

    Another interesting article I found today:

    http://www.theregister.co.uk/2009/02/23/insider_threat_survey/

    How people handle staff that leave their organisation so I thought I would...
  18. Replies
    0
    Views
    2,590

    Collaboration on "top 20 controls"

    I thought this article was interesting:

    http://www.theregister.co.uk/2009/02/23/cybersecurity_gold_standard/

    Not necessarily for the 20 controls listed as these are reasonably obvious but for...
  19. Replies
    7
    Views
    9,561

    That is my understanding

    That is my understanding of what needs to be done (only addition is making sure you run the AD prep commands from the 2008 Server install source, obvious to some, maybe not to others).
    The relevant...
  20. Replies
    2
    Views
    2,259

    Confused?

    Well here in Oz we call those little mens swimming costumes (the ones that are like briefs - generally made by speedo) Budgie smugglers (a budgie is a very small parrot often kept as a pet)
    ...
  21. Replies
    1
    Views
    3,325

    Whoops by the Telstra CEO

    Telstra CEO (our main phone carrier and largest ISP), Sol Trujillo was provided a pre-release smartphone that included unreleased hardware and software. It appears that he or one of his executives...
  22. Replies
    1
    Views
    4,696

    we Aussies are trustworthy - but we don't trust you

    I will preface this by saying that most of the work I do is with the Federal Govt and they are generally more conservative.

    Basically their rules say that your (govt agencies) sensitive data...
  23. Replies
    5
    Views
    27,461

    Australian perspective

    Here in Australia this is a VERY hot topic at the moment, with the government about to go through first trials of ISP level content filtering. This will be administered (the filter list) by the...
  24. Replies
    40
    Views
    26,552

    My study

    When I studied for CISSP, I focused allot on doing practice exam questions because the folks at ISC2 have an interesting way of phrasing those questions. In my experience the questions on the CD that...
  25. Replies
    0
    Views
    2,417

    DoS attack on DNS servers

    I am sure everyone has heard about this but I was pretty shocked for a couple of reasons.

    1. For the first time that I can remember a IT Security story was the lead story on news.com.au

    2. The...
Results 1 to 25 of 98
Page 1 of 4 1 2 3 4