General

Last Updated on 13 Jan. 2015, Total: 156 Blog Posts

  1. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on wigle.net to determine possible locations... Read More

  2. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  3. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  4. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com August monthly newsletters... Read More

  5. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  6. Sharing Responsibilities in Cloud Environments

    Cloud Computing elements such as, guest operating systems, physical platforms and others are easily associated with one party (provider or customer) being responsible for both management and security but what about responsibilities when elements overlap boundaries between the provider and the customer? Cloud Computing has brought about new challenges and most importantly, a distributed control environment. Although, some argue that... Read More

  7. Skype is reading everything you write

    According to the German security firm Heise Security, Microsoft monitors users’ instant messages and SMSs on Skype... Read More

  8. Software Defined Networking

    The key characteristic of Software Defined Networking is the separation of the virtual network from the physical network, through a layer of software that hides the physical topology from the applications... Read More

  9. Submarine cables – Internet’s physical infrastructure

    If you're into the physical infrastructure of the Internet then this map should be your starting point. The Submarine Cable Map is a free resource from TeleGeography. Data contained in this map is drawn from Global Bandwidth Research Service and is updated on a regular basis. The map is rich of information including cable capacity, provider name and other elements;... Read More

  10. System Update Readiness Tool for Windows 7and Windows Server 2008 R2

    Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More

Featured Links