Search:
Type: Posts; User: sysmin770; Keyword(s):
Search:
Search took 0.01 seconds.
-
July 22nd, 2005, 03:19 PM
This seems to be the big thing lately. Security companies using all of their effort to market their products that they forget what they were doing in the first place. It is sad, buy my product and I...
-
The_Captain,
You left quite a few pieces of the puzzle out. There are questions that I am sure people are wondering such as what operating systems are the laptops? Is there any need to access...
-
March 9th, 2005, 07:10 PM
Well, the recent buzz about MD5 and SHA1 would definitely be something worth mentioning. There are still a lot of applications that use these hashing functions. Here is a useful link you might want...
-
March 3rd, 2005, 02:46 AM
Don't study from just one source. The CISSP is a very broad range certification and covers many different areas. You will fare better if you study from multiple sources. Even though I have not used...
-
March 3rd, 2005, 01:19 AM
Security is sort of a fad right now. Like most things organizations freak out about everything up front, and then cut members out of their IT staff later. There will always be a need for security...
-
February 24th, 2005, 02:02 AM
You should be good to go with your current configuration. Just remember, even though you may live in a residential area doesn’t mean that someone won’t wardrive your house. I really wouldn’t...
-
February 18th, 2005, 08:56 PM
The only way to do that is with a server product and not using ICS, using Routing and Remote Access instead. That way you can give the clients and address range via DHCP and route those elsewhere.
-
December 19th, 2004, 08:33 AM
That is an instant messenger hoax. Don't get caught up in hoaxes, make sure you research everything before believing things you receive in your email. Hope that helps.
-
November 23rd, 2004, 03:50 AM
Man, you have to be more specific. What exactly are you looking for? Without knowing exactly what you are talking about, I would say you could start logging privilage useage and object access. That...
-
November 22nd, 2004, 11:20 PM
I have a solution to that problem, run Linux or at least use Windows with a decent browser. I can't believe so many people still use IE after all of the publicized vulnerabilities.
-
November 22nd, 2004, 11:14 PM
It's good if you are doing some sort of awareness training or something of that nature. Maybe you could try to use it to convince a manager that security is important, hence the nice little cartoon...
-
November 14th, 2004, 04:21 AM
I suggest using Ncrypt http://ncrypt.sourceforge.net
It is available for both windows and *nix and it is very easy to use. It also has a good file wiper that allows you to securely delete files.
-
November 7th, 2004, 06:36 PM
Stegonagraphy basically means hidden writing. You can actually hide data in many different file carriers; pictures, music, video, binary exe's, and more. Carrier files can be big problems. Some files...
-
November 7th, 2004, 06:21 PM
Obviously the university did not practice due care and due diligence in the protection of their systems. The reason, as best practices, you are supposed to put up banners and even minimal protection...
-
November 7th, 2004, 06:08 PM
I personally do not think that Bluetooth is going to go anywhere anytime soon. Many companies have been investing in this technology. The problems I have with Bluetooth is in the way it operates. Its...
-
October 11th, 2004, 10:37 PM
And that sends your login credentials in plaintext.
-
August 23rd, 2004, 02:37 AM
Also, most routers store their operating system in NVRAM. There are really no "interesting" files on a router like you might find on a PC. Things you would consider "interesting" on a router would be...
-
August 23rd, 2004, 02:27 AM
You could also use Ncrypt which is a pretty cool product. It comes with a pretty good file wiper and it is also free. http://ncrypt.sourceforge.net/
-
July 28th, 2004, 12:10 AM
I knew you could update it by downloading the updates and installing them individually. I guess new things have came out since my friend had it installed on that computer. I don't worry either since...
-
July 27th, 2004, 06:20 PM
Correct me if I am wrong, but I could have swore that the priated version of Windows XP does not allow you to do updates. Well, directly from the web that is using the Windows update feature. When...
-
July 26th, 2004, 04:47 PM
*Kerry's campaign is based around the fact that "I'm not Bush, so vote for me".
pwaring,
Even if that was right, that is enough for me. As a veteran who has been deployed overseas, I am tired of...
-
July 26th, 2004, 04:03 PM
HackQuest,
I can't speak too much about the Cyber Corps program, but I can speak from a private sector point of view. Just recently companies are starting to understand the importance of Security in...
-
July 26th, 2004, 03:44 PM
LeeBkr311,
I don't know if you noticed or not, but the guy is a newbie and he is using Windows boxes. Can you imagine what would happen with a misconfigured *nix box set up as a firewall on his...
-
To recover a RAR file with something like SmartPar you need the accompanying .PAR files for the .RAR files. Basically .PAR files are like super-checksums that can be used to repair the archive if it...
-
June 26th, 2004, 04:21 AM
Ncrypt. It is also multi-platform. It also comes with a nice file wiper that works really well and wipes the slack-space.
http://ncrypt.sourceforge.net/
|
|