dcsimg

Search:

Type: Posts; User: commodon; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    8
    Views
    2,854

    I am very familiar with the following scenario...

    I am very familiar with the following scenario whereupon the attacker's goal is to compromise Company "A".

    What the attacker(s) will first do is review the website and Internet presence of...
  2. Thread: IOT Devices

    by commodon
    Replies
    2
    Views
    3

    If we're talking about types of IoT devices found...

    If we're talking about types of IoT devices found in the common home, assuming they're are configured properly and up-to-date, there shouldn't be a need to separate them from the primary network....
  3. Replies
    4
    Views
    5

    No one should be able to do this, but if someone...

    No one should be able to do this, but if someone walks in into a wireless store claiming to be someone they're not, and provides a level of personal details known about their victim, there are bigger...
  4. Replies
    3
    Views
    17,856

    To me, the word "passive" implies...

    To me, the word "passive" implies non-interaction, which makes it impossible to perform a vulnerability scan against a target. Granted, there are tools that can be used to take educated guesses about...
  5. Replies
    2
    Views
    3

    Based on the description of the issue, it sounds...

    Based on the description of the issue, it sounds like your system has been compromised the result of a "Remote Access Trojan" or RAT. The best thing to do is what you've already been told, i.e....
  6. It is not wise to encrypt the entire drive as it...

    It is not wise to encrypt the entire drive as it can impact system performance. However I have several folders I encrypt which contain sensitive content.

    I use PGP Desktop to accomplish this, see...
  7. Replies
    7
    Views
    8

    Truth be told there is no way anyone can tell...

    Truth be told there is no way anyone can tell just by looking at a website if it is secure from compromise, but if you're asking if someone can perform a web application penetration test for you...
  8. Replies
    2
    Views
    3

    LastPass is the most popular among both personal...

    LastPass is the most popular among both personal and business users, see https://www.lastpass.com/
  9. Replies
    4
    Views
    5

    There are a lot of different "repair" CD/DVD's...

    There are a lot of different "repair" CD/DVD's available and I suspect everyone has their favorite.

    My favorite(s) is "EasyRE" Pro Edition from https://neosmart.net/EasyRE/

    and "RepairOS" from...
  10. If there is any method of interaction or...

    If there is any method of interaction or connectivity occurring on the system involved with anything external to it, i.e. the outside world, then there is an opportunity for compromise to occur.
    ...
  11. Replies
    4
    Views
    5

    I suspect the firewall you are using employs...

    I suspect the firewall you are using employs Network Address Translation, which means you need to ensure you have created a policy on the firewall to forward the incoming connection to port 31339 to...
  12. In looking at the output provided, it appears you...

    In looking at the output provided, it appears you are running nmap as a user and not as root or a privileged user, which is a requirement in order to take full advantage of its capabilities.

    I...
Results 1 to 12 of 12