Phishing Attacks & Defense

Blue Shield
,
Phishing is one of the most common (and effective) forms of cyber attacks today. In this short video, we’ll examine some simple techniques that can be used (by technical and non-technical individuals) to better defend against phishing attacks. For an in-depth exploration of phishing attacks and how you can defend against them enroll in the…
Read More

Why Do We Even Have That Server?!

White Shield
Wow! What an end to a good (albeit frustrating) week! In between multiple engagements for several clients this week, I somehow managed to learn that “flowers are like a picnic for butterflies…” Yep, busy week but I still managed to get in all the bedtime stories with the kids! I’ve seen an interesting trend during…
Read More

Seat Belts Save Lives…We Should Stop Using Them

White Shield
,
Sounds a bit crazy doesn’t it? Seat belts have been proven to significantly reduce the risk of death or serious injury in the event of a motor vehicle crash, and I’m recommending that we stop using them altogether? Why in the world would someone in their right mind make that kind of recommendation!? It’s simple,…
Read More

Quick Connection Info with ‘netstat’ (Linux)

Gray Shield
There are things in this world that will likely always be a mystery to me. For example, why are feminine hygiene products and toothpaste both stored in similar looking tubes? As both of these products are often found in bathrooms around the world it stands to reason that some poor guy (likely living in a…
Read More

Simple ICMP Host Discovery with Nmap

Gray Shield
The other day I needed to rapidly scan a range of IP addresses for hosts that responded to ICMP echo requests. I also needed the responding IP addresses to be in a simple list format (with a single IP per line). While there are many ways to do this I needed something quick (only had…
Read More

MIT(R)M Attacks – Your middle or mine?

Red Shield
Recently (actually months ago now) my wife went out to see some friends from Church which left me with a couple of hours to kill at home (after I put the kids bed of course). I decided to use this opportunity to look for security vulnerabilities in the wireless router provided by my ISP. I…
Read More
Menu