Verizon’s Report Outlines Time to Respond for Web Incidents
42% takes days before a web incident can be contained.
No Comments »
Filed under: Computing, Security
42% takes days before a web incident can be contained.
No Comments »
Filed under: Computing, Security
I had the occasion to download a blacklist of IPs. The problem was that this machine generated list padded zeros in front of it. For example, instead of 1.2.3.4 it was listed as 001.002.003.004. I didnt relish having to manually edit all 10,000 IP addresses. So I did research. This post gave a formula to […]
No Comments »
Filed under: Computing, Security
Have you been hit with a lot of xmlrpc based attacks on your wordpress installation? Are attackers planning to insert malware into your wordpress installation (soak-soak)? I have a simple solution to share with you. Since this website uses BNShosting web mirror service, i thought of using the squid service to block the tons of […]
No Comments »
Filed under: Computing, Security
I was asked to help with a webserver whose web pages could not be browsed/accessed from outside. The first thing i did was to check for network connectivity. If i could ping the server and it responded, then it means there is a valid network connection between the web server and my PC. c:\>ping 202.91.xxx.xx5 […]
No Comments »
Filed under: Computing, Security, SEO
Two security researchers Wednesday [August 03, 2011] unveiled a remote-controlled, unmanned aerial vehicle (UAV) that is capable of cracking Wi-Fi passwords, exploiting weak wireless access points, and mimicking a GSM tower to intercept cell phone conversations The Wi-Fi Aerial Surveillance Platform (WASP) was built by Mike Tassey and Richard Perkins, two security researchers seeking to […]
No Comments »
Filed under: Security