Search:

Type: Posts; User: commodon; Keyword(s):

Search: Search took 0.01 seconds.

  1. Thread: IOT Devices

    by commodon
    Replies
    6
    Views
    30,090

    Thank you. Personally speaking I strive to...

    Thank you.

    Personally speaking I strive to keep everything up-to-date, but it's truly dependent on the device manufacturer(s).

    For safety and security, I enable the Guest WiFi for my access...
  2. Replies
    10
    Views
    41,970

    I am very familiar with the following scenario...

    I am very familiar with the following scenario whereupon the attacker's goal is to compromise Company "A".

    What the attacker(s) will first do is review the website and Internet presence of...
  3. Thread: IOT Devices

    by commodon
    Replies
    6
    Views
    30,090

    If we're talking about types of IoT devices found...

    If we're talking about types of IoT devices found in the common home, assuming they're are configured properly and up-to-date, there shouldn't be a need to separate them from the primary network....
  4. Replies
    8
    Views
    42,364

    No one should be able to do this, but if someone...

    No one should be able to do this, but if someone walks in into a wireless store claiming to be someone they're not, and provides a level of personal details known about their victim, there are bigger...
  5. Replies
    4
    Views
    101,042

    To me, the word "passive" implies...

    To me, the word "passive" implies non-interaction, which makes it impossible to perform a vulnerability scan against a target. Granted, there are tools that can be used to take educated guesses about...
  6. Replies
    2
    Views
    20,618

    Based on the description of the issue, it sounds...

    Based on the description of the issue, it sounds like your system has been compromised the result of a "Remote Access Trojan" or RAT. The best thing to do is what you've already been told, i.e....
  7. It is not wise to encrypt the entire drive as it...

    It is not wise to encrypt the entire drive as it can impact system performance. However I have several folders I encrypt which contain sensitive content.

    I use PGP Desktop to accomplish this, see...
  8. Replies
    7
    Views
    30,884

    Truth be told there is no way anyone can tell...

    Truth be told there is no way anyone can tell just by looking at a website if it is secure from compromise, but if you're asking if someone can perform a web application penetration test for you...
  9. Replies
    3
    Views
    19,660

    LastPass is the most popular among both personal...

    LastPass is the most popular among both personal and business users, see https://www.lastpass.com/
  10. Replies
    4
    Views
    19,525

    There are a lot of different "repair" CD/DVD's...

    There are a lot of different "repair" CD/DVD's available and I suspect everyone has their favorite.

    My favorite(s) is "EasyRE" Pro Edition from https://neosmart.net/EasyRE/

    and "RepairOS" from...
  11. If there is any method of interaction or...

    If there is any method of interaction or connectivity occurring on the system involved with anything external to it, i.e. the outside world, then there is an opportunity for compromise to occur.
    ...
  12. Replies
    4
    Views
    18,889

    I suspect the firewall you are using employs...

    I suspect the firewall you are using employs Network Address Translation, which means you need to ensure you have created a policy on the firewall to forward the incoming connection to port 31339 to...
  13. In looking at the output provided, it appears you...

    In looking at the output provided, it appears you are running nmap as a user and not as root or a privileged user, which is a requirement in order to take full advantage of its capabilities.

    I...
Results 1 to 13 of 13