Are You a Google Dork?

| 0 comments

Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the darker side of Google, well depending upon how the search engine is used can often lead to information that you would never think would be indexed by Google. Before you begin thinking Google is evil here take note that the data is placed online by anyone with an Internet connection, therefore Google is doing nothing evil rather the search engine …

Continue reading

Learning BackTrack 5: The Art Of Penetration Testing

| 0 comments

BackTrack is an absolutely amazing Linux based penetration testing environment that is entirely dedicated to hacking. I must say that you should use common sense when you begin digging into the security tools provided because the last thing you want to do is break the law and find yourself in trouble. Now to say that there are many security tools available in BackTrack would be an understatement. In fact there is so many available that I would never start to list theme here. If you wish to see for yourself, simply execute the following within your terminal instance: dpkg –list …

Continue reading

Microsoft Baseline Security Analyzer

| 0 comments

If you’re running a Windows platform then you must secure your operating system and the Microsoft Baseline Security Analyzer (MBSA) makes it a breeze. Securing your operating system is absolutely the single most important step you can take to protect yourself. Computers have become so mainstream in homes today that often daily activities that they were previously down with pen and paper are all but extinct. There are a number of actions that should be taken which include staying up to date with patches and of course controlling user account but this just begins to scratch the surface. Unless you’re …

Continue reading

Free Security Vulnerability Guides From Veracode

| 0 comments

Veracode focuses on security for organizations to accurately identify and manage application security risk. They offer a number of resources to include podcast, whitepapers, cheat sheets, and much more. SQL Injection Cheat Sheet The SQL Injection Cheat Sheet provides a summary of everything you need to know about SQL Injection. The SQL Injection Cheat Sheet contains the key concepts of SQL Injection and a SQL Injection example and tips for prevention of SQL Injection attacks. Note that you must register with Veracode in order to obtain these cheat sheets. Download the FREE SQL Injection Cheat Sheet Cross-Site Scripting (XSS) Cheat …

Continue reading

Poor Man Backup Using Robocopy, 7Zip and DropBox

| 0 comments

Rather than talking about how important data backups are I thought I would take the time to show you how you can use tools that are free or low cost to automate backups using Dropbox. If you don’t have a Dropbox account then I strongly urge you to grab on and why not since it free for the first 2Gb. By using Dropbox you can access your data from any device that has internet connectivity. However the purpose of this article is to show you just how easy it is to perform backups. Tools Robocopy: is a command-line directory replication …

Continue reading

How To Use ScreenFlow To Capture Netflix Streaming Media

| 1 Comment

First things first, I am not advocating violating copyright laws and you should clearly understand the Digital Millennium Copyright Act surrounding digital media before you try capturing media. Previously I wrote about How to Backup DVDs with Handbrake and this article is very different in nature. Because you do not own the content that you wish to capture you will likely find yourself in a legal battle should you distribute such content. That being said since I am a paying NetFlix subscriber there are often times that I may be traveling and I don’t have access to the internet. Because …

Continue reading