Hello Everyone ! I have added a new Section Where i will post spam emails and show an analysis of what makes them spam and also will show where they are coming from For now you can find this new section under home security > email security > Spam messages
Often I wonder why many people ignore mobile security measures such as password protecting their cellphones ? why do people think mobile security is not as important than the security on their computer ? in this post I just wanted to explain why I think its imperative you put a password on your cellphone as
Hello All so the switch to wordpress went smooth and the blog is now up I will start posting in this blog actively starting on Monday ! I hope you all like the switch let me know what you think ! Thanks all
Hello All, I am currently in the process of upgrading my blog to a wordpress blog which allows me to present information in a much better way and the ability to catagorize my sibjects in a website form i will still update this blog until ive completed the switch i will provide the new link
Recently i was able to capture some real data from my servers fail2ban logs this is how fail2ban logs look for banning ips 2012-10-21 12:54:16,032 fail2ban.actions: WARNING [ssh] Ban 112.4.172.217 2012-10-22 17:05:48,080 fail2ban.actions: WARNING [ssh] Ban 222.73.24.10 2012-10-22 18:36:55,892 fail2ban.actions: WARNING [ssh] Ban 202.96.199.150 2012-10-22 23:23:10,053 fail2ban.actions: WARNING [ssh] Ban 111.74.82.33 2012-10-23 05:06:53,861 fail2ban.actions: WARNING
Hello All, Latley in the news we have been hearing alot about online bullying or cyber bullyingthis is brings a new issue that today parents have to deal with some parents are asking them selves what can be done to protect thier children again such attacks here are some tips parents can use 1.) parental
Protecting your public servers is crucial we have talked before on a previous post on how to mitigate Ssh attacks on a cisco router now let’s talk Ssh on a server an ssh server is no different you still have the same issues to fend off from DDOS attacks to brute force attacks ssh servers
Here is what a ssh bruteforce attack looks like from a cisco router log uthentication Failed] at 01:13:18 UTC Sun Sep 30 2012*Sep 30 01:13:18.463: %SEC_LOGIN-1-QUIET_MODE_ON: Still timeleft for watching failures is 0 secs, [user: root] [Source: 211.144.68.163] [localport: 22] [Reason: Login Authentication Failed] [ACL: 100] at 01:13:18 UTC Sun Sep 30 2012*Sep 30 01:13:24.967:
SSH bruteforce attack on cisco routers and ways to stop it !Read More »
Hello All , sorry it has been a very long time since I posted on this blog I will be making regular updates to this blog starting this week we will still follow the same weekly topics ! if you have any suggestions or a topic you wish to be covered please contact me !
Emailed from [email protected] Ashirin Jamilah & Nor (K.Sel)No. 9A, Jalan Melati 3/21,Bandar Melawati.45000 Kuala LumpurSelangorTel:+60163722712 Dear Sean, I am Ashirin Jamilah,an attorney at law. A deceased client of mine, by name MrAdams Mancini,who was here and after shall be referred as my client,he died with hisfamilyin gulf air flight crashes in Persian gulf near Bahrain
Network security news from networksecurity.tk be advised everyone the team supporting wikileaks has said on thier twitter account they are voting to take down a companies website that was apart of the wikileaks.org take down
Today i recived a new scam email from a “dr” say he would like to transfer money from a bank in africa that has been unclaimed to a sum of $12,000,000 this is a common scam going around where the scammer steal your idenity by luring you to give up certain info like account numbers
Read this interesting pdf on how sinkhole works to kill ddos bots on the internet let me know what you think you will find the pdf here Link from www.cert.org
Hey eveyone Been a while since my last post if you are wondering i have transferd my blog from one site to blogger the key to keeping your data safe is having a secure computer here are some free tools you can use to scan your computer for viruses and secure it from hackers Antivirus
this is a classic scam here are the 4 signs this is a fake 1.) spelling notice some of the spelling mistakes 2) any reputable back would never correspond with you via email for security issues you most definitely would be contacted by phone 3) look at the copyright first mistake the corporate name is