Skip to main content

Posts

Keeping your software updated.

There is a software called " Secunia PSI ". Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus and are therefore increasingly popular among criminals. The only solution to block these kind of attacks is to apply security updates, commonly referred to as patches. Patches are offered free-of-charge by most software vendors, however, finding all these patches is a tedious and time consuming task. Secunia PSI automates this and alerts you when your programs and plug-ins require updating to stay secure.   Pro's Provides links to update programs Can be ran as background service   Free for personal use only Compares you to other users in the city/state Rates how updated the programs are Con's May not have all specific applications You can download beta version at ht...

Using GnuPG

GnuPG is a free software alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. GnuPG is a basic program that has a command line interface, there exist various front-ends that provide it with a graphical user interface. For example, GnuPG encryption support has been integrated into KMail and Evolution, the graphical e-mail clients found in the most popular Linux desktops KDE and GNOME. The cross-platform plugin Enigmail provides GnuPG support for Mozilla Thunderbird and SeaMonkey. Similarly, Enigform and FireGPG provide GnuPG support for Mozilla Firefox. “From Wikipedia”. To understand how PGP you can read about at http://en.wikipedia.org/wiki/Pretty_Good_Privacy .   GnuPG File Name: GnuPG.pdf File Type: PDF File Size: 2.36 MB Download Now

DTS Enterprise is back!!!

Get ready world that the new article/tutorials are going to be release tomorrow. Danny Tech Security was busy with reconstructing website at dtsenterprise.tech.officelive.com . Now that that site is almost fully functional here's a preview what type of new tutorials are coming in the next few weeks. GnuPG is the open source of PGP which means "Pretty Good Privacy" I can show more images of what is coming up in the next few week, but I don't to spoil anyone.

What is Metasploit?

The Metasploit is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development and a tool for developing and executing exploit code against a remote target machine. Metasplot can be installed in Microsoft Windows, Linux, or MAC OS X. Metasploit can check for the latest exploits on the web. Installation is simple for Microsoft Windows or Linux. As you see in the picture below. Read the PDF to get started. File Name: What is Metasploit.pdf File Type: PDF File Size: 991 KB Download Now

Webgoat

WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson. From http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat is a platform independent environment. It utilizes Apache Tomcat and the JAVA development environment. The only thing required from the user is Java which can be downloaded from http://java.sun.com/downloads/ . Webgoat allows the user to practice in a safe environment with in the user’s network and webgoat can be run in Windows Linux, or MAC OS X. First let’s download the latest copy of webgoat http://code.google.com/p/webgo...

Lack of formal end-user training program makes IT look bad

The Author: Toni Bowers talks about how some companies don’t see the value of proper end-user training. They’re willing to pay thousands of dollars for a new product that is supposed to improve productivity but aren’t willing to do the one thing that will help with that product’s adoption in the enterprise. A good end-user training strategy will make new software deployments more cost effective. It is good post to read on your down time. http://blogs.techrepublic.com.com/career/?p=2152&tag=main;banner

Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting hidden networks, and inferring the presence of non-beaconing networks via data traffic. Kismet Features 802.11b, 802.11g, 802.11a, 802.11n sniffing Standard PCAP file logging (Wireshark, Tcpdump, etc) Client/Server modular architecture Multi-card and channel hopping support Runtime WEP decoding Tun/Tap virtual network interface drivers for real-time export of packets Hidden SSID de-cloaking Distributed remote sniffing with Kismet drones XML logging for integration with other tools Linux, OSX, Windows, and BSD support Read more about it on the PDF. Kismet File Name: Kismet.pdf File Type: PDF File Size: 1.60 MB Download Now