Archives

All Posts Tagged Tag: ‘tutorial’

  • Malware Network Communication

    How to find malicious communication leaving your network | Fox-IT

    0

    Most Zeus trojan infections use HTTP for communication. There are however versions of Zeus that use P2P technology, but they are the exception. Once a computer is infected, Zeus must connect to the command and control (CnC) server for settings and instructions. The usual way [...]

    Read More →  
  • Keys

    Segregating DBA And Admin Duties – Dark Reading

    0

    Keeping platform admins out of your database. A reader’s question via email asked for an elaboration on separation of duties (SoD) between DBAs and IT administrators. SoD gets lumped in with compliance requirements, but, in reality, it’s a critical security concern, so I thought it [...]

    Read More →  
  • Oracle Security

    Keeping Privileged Users Under Control in Oracle Database – infosec island

    0

    As I have mentioned in my previous post Harnessing Privileged Database Users, Relational Database Management System (RDBMS) software is not designed to provide sufficient protection against database users that hold certain privileges such as like system privileges. These privileges are usually granted to database and [...]

    Read More →  
  • Logging

    A guide to better logging – SC Magazine AU

    0

    Logs are more important than many think. o build a good security monitoring program, logs are critical. They feed almost everything we do in monitoring from event correlation to auditing.  We need logs from things such as security tools, network devices, servers, databases and applications [...]

    Read More →  
  • Codecademy: A Slick, Fun Way To Teach Yourself How To Program – TechCrunch

    0

    You’ve read the inspirational posts on Hacker News. You’ve purchased the recommended books. You’ve bookmarked the online tutorials. You even plopped down $80 on a set of instructional videos, promising yourself that the investment would only make you more motivated. And for some reason, you [...]

    Read More →  
  • Mobile VPN: staying secure on the go – The H Security

    0

    Unencrypted public Wi-Fi networks are convenient for smartphone users because they usually offer much faster internet access than typical 3G connections. However, using email or social networking services like Facebook or Twitter will typically send private data, such as access credentials, in plain text, which [...]

    Read More →  
  • How to create a Windows rescue USB stick – techradar

    0

    Tutorial: Avert PC disaster with a bootable system recovery USB stick. Anyone who’s been on the receiving end of a PC disaster can testify to the pain that they can cause, and recovering from a major crash can be a long and difficult process. The [...]

    Read More →  
  • Get smart on Phishing! Learn to read links!

    0

    If you came here, you probably received an email like the one to the right. They are fake messages intended to lure you to fake websites that are made to look like e.g. a bank website, but in reality set up by data thieves. If [...]

    Read More →  
  • How to update Google Chrome

    0

    If there is an update available for Google Chrome, it will be displayed as a part of the About Google Chrome window. To find the About Google Chrome, click on the little wrench icon, located on the right side of the toolbar: Google will automatically [...]

    Read More →  
  • How to update Adobe Flash on Windows

    0

    Updates for Adobe Flash in Windows need to be installed separately for each browser – Internet Explorer, Firefox, Chrome, etc. 1. First, download the Adobe Flash uninstaller here. 2. Save the uninstaller file in a location that you can find it – your Windows desktop [...]

    Read More →  
    No Twitter Messages.