Category: Uncategorised
Hello All, I have made several posts about the benefits of using VPN services to protect your online experiencing when on the road now I am launching a VPN service for my readers and the public I will have a free limited service and a paid for restriction free service I have not come up
Hello everyone ! in this article i would like to relay my views of this subject recently there has been a trend in the market called byod this basically is where the employee of an organization is allowed to use their own personal devices such as laptops and mobile phones to perform work functions this
The issues with the BYOD (bring your own device) trendRead More »
Hello all, In this post I will go over what I think should be part of every businesses security process What is establishing a base line ? the purpose of establishing a baseline is to know what is normal and what is not normal activity on your network for example if you have a website
Apple is reporting being attacked by hackers the attack affected a small number of Apple corporate computers after a hacker crafted a sophisticated attack which took advantage of an exploit in the java browser plugin after the exploit was successful the attacker was able to install malware on the affected computers the attack was started
Hey all, I have recently launched a youtube channel so I make nake tutorial videos on the topics I cover on my blog as well as video contect from when I do my public speaking My channel is located at http://www.youtube.com/user/seanmancini I will also post my videos in the video section of this blog as
Hello all, In this post, I will provide my view on the future of the username and password With the recent attacks against Twitter/Dropbox, the need for more websites to adopt 2factor authentication has never been higher 2-factor authentication is the future authentication mechanism which should be widely deployed in the corporate world and for
How 2factor authentication will soon replace passwordsRead More »
Hello All, In this post I will show you how you can protect yourself against data theft using free open source software You have heard it on the news someone working for some company was taking an usbstick/portable hard drive from one place to another and lost it and now there are thousands of people’s
In this post I will talk about drive by downloads what they and the risks they pose and how to stop them First off what are drive by downloads? Drive by downloads are downloads that occur when a web browser surf to a page that hosts a script to download unwanted software on a user’s
Protecting Web-browsers against drive by downloadsRead More »
With the popularity of free public WIFI new precautions need to be taken when using your mobile device on the road free public wifi is a great public service but it can come with severe security risks In this post I will show you how to protect your connection on a public wifi connection using
Protecting Laptops/Mobile devices with VPN while on public WiFiRead More »
Hey all, Just wanted to let you all know I am still active with my blog, I Have not had alot of time on my hands lately I Have some topics I think might be interesting to talk about I should be back to post regular content next week Thanks all Until Then stay secure
To all my readers wishing you all the best in 2013 ! Thank you for all your support and comments and suggestions during 2012 lets see what 2013 brings to the technology and network security world My predictions ; More mobile exploits/maleware More hacktivists group attacks a rise advanced maleware A rise in Mac maleware/viruses
Hello all, In this post I want to cover ways to mitigate against unauthorized devices connecting to a switch for instance in a public library or a internet cafe where the access switch can be access by the public just to set the stage for this example there is a internet cafe called bobs internet
Preventing unathorized devices from connecting to cisco switchRead More »
Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list What is the bogon list? The bogon list is a list of ip subnets that are either invalid non routable ip blocks such as