Are You a Google Dork?

| 0 comments

Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the darker side of Google, well depending upon how the search engine is used can often lead to information that you would never think would be indexed by Google. Before you begin thinking Google is evil here take note that the data is placed online by anyone with an Internet connection, therefore Google is doing nothing evil rather the search engine …

Continue reading

Website Mirroring Using GNU Wget

| 0 comments

GNU Wget is a free software package for retrieving files using HTTP, HTTPS, and FTP – the most widely-used Internet protocols. It is a non-interactive command-line tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc. Why would you want to use this application? The fact is the black hats often use this to mirror a given site in order to review the content for anything that may be of value. This concept falls into the area of information gathering. So you may be asking your what possibly could be of value that a …

Continue reading

The Four Goals of Cryptography

| 0 comments

Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. There are four goals of cryptography, these are: Privacy Authentication Integrity Non-repudiation

Encrypting File System in Windows

| 0 comments

Did you know that you can encrypt and decrypt files and folders within Windows without the need of any third party software? Encrypting File System (EFS) is a feature within New Technology File System (NTFS) where the individual who is currently logged into the operating system (OS) has the ability to perform encryption. If you encrypt a folder then any files that you move or copy into this folder also become encrypted and this all happens on the fly. The beauty of this is if you have a computer that is shared by multiple individuals this is a good way …

Continue reading

The Future of Cybersecurity Technology and Policy

| 0 comments

Only when a comprehensive understanding of the cyber threat is taken into consideration can organizations utilize process, tools, and technologies to find, correct, and combat those who launch a cyber-attack. This paper takes a look at the past, present, and future in order to present a concept that works. The idea here is a partnership with both private and public sectors in a type of responsibility where everyone works together to achieve the goal of cyber defense. This includes tools, technologies, methodology, and a common sense approach to the problem. The days of standing alone have failed and it is …

Continue reading

Open Source and Commericial Security Tools

| 0 comments

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools available. Toolkits Network Security Toolkit: This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in …

Continue reading