Search:
Type: Posts; User: cabby80; Keyword(s):
Search:
Search took 0.03 seconds.
-
It appears I was just a "lucky" person who was early on their list of calls.
This link has more details on how the call goes and what happens if you don't tell them off...
...
-
June 30th, 2010, 12:47 AM
From a security perspective I like
"Protect Your Windows Network" by Jesper Johansson and Steve Riley - Microsoft's "original" security gurus
The Microsoft security and threats and...
-
June 15th, 2010, 12:56 AM
http://www.zdnet.com.au/topic/security/ - Australian Specific though
http://www.darkreading.com/index.jhtml
http://isc.sans.edu/index.html
http://www.theregister.co.uk/security/
...
-
June 11th, 2010, 01:12 AM
I was cooking dinner, I couldn't be bothered following it through.
I guess they would have either:
1. Asked for Credit Card details and email address to send you the 'latest and greatest "Virus...
-
Hi All,
I was cooking dinner last night and the phone rang, straight away I was suspicious as that is when these types of calls usually happen.
I answer, "Hello" and there is silence on the end...
-
The exact Model I use is the F5D7050 - http://www.belkin.com/iwcatproductpage.process?product_id=179211
Which according to what I have been able to find out uses the Chipset: Ralink 2570
From...
-
I used to log on every 2nd day and go through all the posts (of which there was heaps), never posted that much as only tried to post when I could offer meaningful input or ask a meaningful question...
-
I run the Aircrack-NG VMware image available from http://www.aircrack-ng.org/ with a Belkin USB Wireless adapter similar to the one here:...
-
I have used pointsec and safeguard easy in previous roles(as they are the ones approved for Govt use within Australia).
Pointsec was better as it allowed for more centralised management of...
-
Thanks to some help from the tomcat-users mailing list the solution to my problem was as follows:
Stop all Tomcat instances/service. Open the "tomcat monitor" application and open the "configure"...
-
Hi All,
I am writing a Tomcat 6 on Windows hardening guide at the moment and I am looking at the process for enabling the security manager. On the Tomcat 6 documentation website...
-
April 16th, 2009, 12:39 AM
Hi All,
Verizon have released the 2009 Data Breach investigations report, whilst it doesn't tell IT Security professionals much that we don't already know (or could not have guessed) it can be an...
-
March 18th, 2009, 11:08 PM
http://online.wsj.com/article/SB123735124997967063.html
I am not sure this is a good thing - I would think bad for competition as particularly the server hardware market becomes more of an...
-
March 16th, 2009, 12:05 AM
I too use the Secunia tool at home and I think it is great. Especially for reviewing if things like Java, Flash, Acrobat etc are vulnerable or not. When I ran this for the first time I was surprised...
-
March 10th, 2009, 11:41 PM
Hi All,
As usual the Microsoft Security Bulletins have been released, nothing new here but I wanted to draw your attention to MS09-007
March advisories -...
-
February 25th, 2009, 11:46 PM
I think the problem with harassment is that it is almost impossible to define what it is (i.e. what are the boundaries between harassment and a joke or harassment and an annoyance). Since there are...
-
February 23rd, 2009, 11:18 PM
Hi all,
Another interesting article I found today:
http://www.theregister.co.uk/2009/02/23/insider_threat_survey/
How people handle staff that leave their organisation so I thought I would...
-
February 23rd, 2009, 11:06 PM
I thought this article was interesting:
http://www.theregister.co.uk/2009/02/23/cybersecurity_gold_standard/
Not necessarily for the 20 controls listed as these are reasonably obvious but for...
-
February 23rd, 2009, 11:01 PM
That is my understanding of what needs to be done (only addition is making sure you run the AD prep commands from the 2008 Server install source, obvious to some, maybe not to others).
The relevant...
-
February 19th, 2009, 01:51 AM
Well here in Oz we call those little mens swimming costumes (the ones that are like briefs - generally made by speedo) Budgie smugglers (a budgie is a very small parrot often kept as a pet)
...
-
February 19th, 2009, 01:41 AM
Telstra CEO (our main phone carrier and largest ISP), Sol Trujillo was provided a pre-release smartphone that included unreleased hardware and software. It appears that he or one of his executives...
-
February 2nd, 2009, 11:28 PM
I will preface this by saying that most of the work I do is with the Federal Govt and they are generally more conservative.
Basically their rules say that your (govt agencies) sensitive data...
-
February 2nd, 2009, 11:18 PM
Here in Australia this is a VERY hot topic at the moment, with the government about to go through first trials of ISP level content filtering. This will be administered (the filter list) by the...
-
February 2nd, 2009, 11:04 PM
When I studied for CISSP, I focused allot on doing practice exam questions because the folks at ISC2 have an interesting way of phrasing those questions. In my experience the questions on the CD that...
-
February 8th, 2007, 10:23 AM
I am sure everyone has heard about this but I was pretty shocked for a couple of reasons.
1. For the first time that I can remember a IT Security story was the lead story on news.com.au
2. The...
|
|