Hey Everyone, A little while ago I mentioned I wanted to make a page available for those who want to see the behavior of nefarious ssh traffic. as you may know, I run SSH Honeypots around the web I have now aggregated the stats to one site where you can see the types of attacks […]
Splunk is a Big data tool that uses logs from many different devices that allow administrators to run analysis on and gather stats on the systems they are running. see the below video to learn how to install Splunk and run your first search
Thank you to Apricorn for sending me a demo unit of their Aegis secure USB drive to review Check out their website @ http://www.apricorn.com/ you can also watch my video below for my full review
Another cool gadget I saw at the Toronto Tech Security Conference was ultra-secure USB storage by Apricorn http://www.apricorn.com. Now, this is cool their product is a secure USB thumb drive or SSD portable hard-drive it features built-in encryption built into the chip meaning no software needed on the PC. They have a wide range
Let me know what you think I want to launch a podcast for network security and related topics i would like to get some vendors on to talk about their product. as well as share views on the security landscape let me know what you think?
So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see. One of the products that caught my eye was Darktrace they sell their product as the “Enterprise Immune System” essentially they are smashing
Introducing and thoughts on DARKtrace “The Enterprise Immune system”Read More »
I am a bit late to the game on this one It has been reported by ESET and SANS that the ransomware operators have shut down their operations and have released the master encryption key to decrypt infected computers data. This is surprising seeing as the market has been very lucrative for the ransomware developers
TeslaCrypt has shutdown and has released the master encryption key !Read More »
Its been and awesome day at the Toronto Tech Security Conference. I got to speak with alot of vendors and see some of the new stuff that is on the market. It is always good to come these events to stay current with the solutions that are in the market The Trends are clear in
My Day @ Toronto Tech Security Conference by Data ConnectorsRead More »
So I upgraded to 16.04 not too long ago Ive seen some bumps in the road so far but now I am seeing weird issues with updates W: http://dl.google.com/linux/chrome/deb/dists/stable/Release.gpg: Signature by key 4CCA1EAF950CEE4AB83976DCA040830F7FAC5991 uses weak digest algorithm (SHA1) W: http://dl.google.com/linux/chrome/deb/dists/stable/Release.gpg: Signature by key 3B068FB4789ABE4AEFA3BB491397BC53640DB551 uses weak digest algorithm (SHA1) W: The repository ‘http://ppa.launchpad.net/n-muench/programs-ppa/ubuntu xenial Release’
Hello Everyone , In this video I show you how you can enable MFA on Ubuntu System wide this installation will also work on any debian based operating system. The idea here is that you will have MFA enabled on your login,termina,root prompt and any where that you would be asked for a password. This
Enable System wide two Factor authentication in Ubuntu/DebainRead More »
Hello Everyone! In this video I show you how you can install the google authenticator PAM module to enable 2 factor aka MFA on your UBUNTU/Debian Login page this is a great way to add an extra layer of protection to your user login
Hey every one I am now using [email protected] for questions and comments in relation to my youtube channel or blog Thank you !
With the blow up in big data and the ease of use of big data related tools such as Splunk organizations are better empowered to track trends from devices and systems that were previously tedious and time-consuming and relied on human resources tools such as Splunk allow administrators to use the power of technologies such