So you want to run bare metal Virtualization such as ESXI but your hardware is not supported this video will show you an alternative that you can use to get as close to bare metal as possible
In my Latest video, I go over the differences between Application security and Network Security,
You may have heard of the cloud and you may want to start adopting this concept for your network. There are many implementations of the cloud for organizations Public Cloud, Private Cloud, Community cloud, Hybrid cloud. this article will hopefully help you choose which solution is for you First of all, what is the
Iaas vs Paas vs Saas What are they ? who needs them ?Read More »
Hello Everyone, Hope you all are having a good holiday. I have been recently playing around with the thousand eyes network monitoring tool. This tool is very powerful and useful for testing internet connections and troubleshooting issues from routing to SIP. While examining the tool the system provides the ability to monitor you external network
Hello All, I wanted to take this time to wish you all a Merry Christmas and a Happy Holiday!! May your networks stay safe and secure ! Sean Mancini
Hello All, In my latest youtube video, I show you how to perform a CSRF attack ( Cross Site Request Forgery). This type of attack allows an attacker to hijack a browser section to push a user to do something without knowing like changing his or her password. This type of attack can
Hello Everyone, I wanted to do a little write up on Cybrary.it So I don’t normally review things like this but I recently came across this site, I have personally been using it for skills training and it’s awesome. They offer their own certification path and the courses are very well created.
I took the time to explore the Endian UTM that I came across on the interwebs. This UTM is a good choice for the home user it comes with the standard tools like CLAMAV and SNORT its a light weight UTM. As with most LINUX based UTM’S such as Untangle and Sophos you will
In my latest video I show you how to monitor your Debian server with cacti
This is a question that security professionals must ask themselves. The notion that the private networks we rely on to be secured against public access can be compromised. What if I told you that your MPLS network is not 100% private you may ask how an attacker can gain access to a secured private network
The new wave of the internet is among us we are now in the era of IOT “Internet of things” sensors and devices that connect to the internet from home IP camera to your fridge. This wonderful new era comes with a new challenge for security professionals Some of the questions you need to
We have seen it time and time again DDoS attacks against organizations causing network interruptions and downtime . These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked what options does that
Yesterday we saw a massive DDOS attack against a crucial piece of internet infrastructure the DNS ( Domain Name Service) the DNS is responsible;e for name resolution, for example, resolving google.ca to its IP address. Without this service, a user would need to remember the IP address of their favorite website. Yesterday a major hosted
Massive DDOS takes down a key piece of internet infrastructureRead More »
Hello Everyone, In my recent video, I show you how fast a ransomware infection can spread to a machine even with antivirus Ransomware is a serious issue that is on the rise the issue with ransomware is its destruction and the rate of which it is spreading. Often leaving organizations with 2 options support the
Ransomware infection the least secure machine is the weakest linkRead More »