Subscribe via RSS

Social

www.flickr.com
This is a Flickr badge showing public photos and videos from kalel71. Make your own badge here.
Clicking on these helps me out

Search Site
Hobby Photography
Twitter
Amazon Stuff

Entries in security (3)

Monday
Jun082009

Testing your IT Security defenses

The best way to make sure your infrastructure is secure, is to test its defenses. Just like with backups, you don't know if your system is fully functional until you've attempted a restore and succeeded. No matter how thorough you may be with your firewalls and network systems, we all make mistakes. Not only could you have missed something, but there are constant exploits & holes being released and tested on systems everywhere.

Hence, we need to try Hacking into your own system(s). This technique is commonly referred to as Pen-Testing (Penetration Testing). This is a deep field to go into, so I will just point you in a direction to start off with, by listing some of the common tools used in this field. That being said, the tools required for Pen-Testing, are the same used by hackers, so use caution.

Click to read more ...

Friday
May222009

Suspect malicious bots on your PC ?

Do you think your computer has been compromised by a botnet? Malicious software called Bots can quietly take control of computers making them participate in networks called “Botnets.” Without you knowing, these botnets can use your internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.

Trend Micro has a tool called RUBotted that can help you determine whether you've been Botted. It is small, lightweight and easy to use. It's available for Windows 2000, Windows XP, Windows 2003 Server, and Windows Vista.

  1. Grab the program for free here.
  2. Install it and check the box to run the program after installation.
  3. Once installed, RUBotted should run and place an icon in your system tray.
  4. If your system is clean, you will get a green check mark, and a message saying "No Bots Found".
  5. The program will remain running in your system tray to constantly monitor your computer from now on, unless you disable it.
Monday
Apr272009

Removing Malware/Spyware

For OSX and Linux users, this isn't such an issue at the moment. However, for those who have to work in a Windows environment, you are forced to deal with Malware/Spyware sooner or later.

There are many solutions out there, some better than others, some free, some commercial. Here's a list of known apps I've used in the field...

Click to read more ...