
blog.securityunwrapped.com
Security UnwrappedSecurity simplified for day to day life...
http://blog.securityunwrapped.com/
Security simplified for day to day life...
http://blog.securityunwrapped.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Thursday
LOAD TIME
12.1 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
23
SITE IP
172.217.6.83
LOAD TIME
12.12 sec
SCORE
6.2
Security Unwrapped | blog.securityunwrapped.com Reviews
https://blog.securityunwrapped.com
Security simplified for day to day life...
Security Unwrapped: January 2010
http://blog.securityunwrapped.com/2010_01_01_archive.html
Security simplified for day to day life. Monday, January 25, 2010. Good summary of Web Security Vulnerabilities. Nice article in Smashing Magazine. Summarizing all the different web security vulnerabilities: cross-site scripting, path transversal, sql injection, cross-site request forgery, etc. ( via Bruce Schneier. Thursday, January 14, 2010. Mikey Hicks, 8, Can’t Get Off U.S. Terror Watch List - NYTimes.com. Mikey Hicks, 8, Can’t Get Off U.S. Terror Watch List - NYTimes.com. Sunday, January 3, 2010.
Security Unwrapped: January 2009
http://blog.securityunwrapped.com/2009_01_01_archive.html
Security simplified for day to day life. Thursday, January 29, 2009. Virtual Machines and Sandboxes. From a security perspective, virtual machines (VMs) and sandboxes are methods of providing isolation. They have other uses as well, but in this post I'm going to focus on this ability to provide isolation. So what exactly does "isolation" mean? So what is the difference between a Sandbox and a virtual machine? Virtual machines (e.g. VMWare. Sandboxes (e.g. Sandboxie. Put simply, virtual machines provide a...
Security Unwrapped: Some good news: Cybersecurity Enhancement Bill passed by house
http://blog.securityunwrapped.com/2010/02/some-good-news-cybersecurity.html
Security simplified for day to day life. Friday, February 5, 2010. Some good news: Cybersecurity Enhancement Bill passed by house. The house passed what looks like a very well thought out CyberSecurity Enhancement Bill. Subscribe to: Post Comments (Atom). Some ports may be "how tos" and other tips that may not be for security newbies. Look at the tags at the bottom of a post if you aren't sure. You'll see a " beginner. Label on posts intended for those learning about security. Google and the NSA. I've al...
Security Unwrapped: March 2010
http://blog.securityunwrapped.com/2010_03_01_archive.html
Security simplified for day to day life. Monday, March 22, 2010. Cybersecurity Act of 2010. The proposed C ybersecurity Act of 2010. Sounds good. Funding scholarships and academic programs is very good - having more and better training people is ultimately the best thing we can do for cybersecurity (more so I believe than any technology advancement). This bill would be reconciled with the CyberSecurity Enhancement Bill I blogged about previous. Subscribe to: Posts (Atom). Cybersecurity Act of 2010. I've ...
Security Unwrapped: February 2009
http://blog.securityunwrapped.com/2009_02_01_archive.html
Security simplified for day to day life. Monday, February 23, 2009. A good security podcast for learning security. I've listened to a number of security podcasts and most are targeted at either IT professionals who need to know about the latest security threats for their job, or at security professionals with in-depth discussions of the latest research or threats. From these experiences, I wanted to mention the Security Now! Here are some specific observations about the show:. Steve and Leo are primarily...
TOTAL PAGES IN THIS WEBSITE
19
Von Welch: February 2011
http://blog.vonwelch.com/2011_02_01_archive.html
Sunday, February 13, 2011. My new position at IU CACR. Late in January I started my new position at Indiana University's Center for Applied Cybersecurity Research(CACR). As Deputy Director. I'm excited about this opportunity in that I'm joining a great existing team and working with CACR's Director, Fred Cate. Who is internationally renown policy and pricacy expert. CACR has a existing education and outreach program that includes an annual cybersecurity summit. Subscribe to: Posts (Atom).
Von Welch: May 2011
http://blog.vonwelch.com/2011_05_01_archive.html
Thursday, May 5, 2011. Some observations on the rekey of encrypted.google.com. This is a fairly technical post about monitoring changes in PKI infrastructure. Unless that sentence interests you, you probably don't want to read further.). Since the Comodo CA issue I've been playing around with some of the PKI monitoring infrastructure including Perspectives. And the Google Certificate Catalog. So when I heard. Then, I looked at Perspectives. Key = 94:47:cd:b3:15:94:94:0c:f5:fd:5c:1b:b7:3c:ee:ce start: Tue...
Von Welch: May 2014
http://blog.vonwelch.com/2014_05_01_archive.html
Tuesday, May 27, 2014. Quantum Experiment Threat Modeling. I'm enjoying Jonathan Dowling's "Schrödinger's Killer App: Race to Build the World's First Quantum Computer. And it's interesting to read as he describes physicists eliminating not only random errors to their experiments to prove quantum effects versus hidden local variables, but even imagining intelligent, malicious ones. Ah, to be a physicist :-). Subscribe to: Posts (Atom). Quantum Experiment Threat Modeling.
Von Welch: Quantum Experiment Threat Modeling
http://blog.vonwelch.com/2014/05/quantum-experiment-threat-modeling.html
Tuesday, May 27, 2014. Quantum Experiment Threat Modeling. I'm enjoying Jonathan Dowling's "Schrödinger's Killer App: Race to Build the World's First Quantum Computer. And it's interesting to read as he describes physicists eliminating not only random errors to their experiments to prove quantum effects versus hidden local variables, but even imagining intelligent, malicious ones. Ah, to be a physicist :-). Subscribe to: Post Comments (Atom). Quantum Experiment Threat Modeling.
Von Welch: July 2010
http://blog.vonwelch.com/2010_07_01_archive.html
Saturday, July 3, 2010. The National Strategy for Trusted Identities in Cyberspace. The White House announced. A draft National Strategy for Trusted Identities in Cyberspace. NS-TIC). I've seen some strong negative takes on the government getting involved in this aspect of security cyberspace (e.g. Lauren Weinstein. But I'm cautiously optimistic. In this space - alas, my pond is not as big as I might hope. With regards to the first role - what I mean is that the Government should be a provider of service...
Von Welch: Cyberdefense is hard...
http://blog.vonwelch.com/2012/03/cyberdefense-is-hard.html
Thursday, March 8, 2012. One thing that caught my attention in the recent arrest of the anonymous hackers is how the hacker who goes by "Sabu" was apparently caught. He apparently logged into an IRC chat service forgetting to hide his IP address just once. This is a good example of what cybersecurity is so hard - defense has to be perfect. If attackers have to play defense too though, that will level the field some. Subscribe to: Post Comments (Atom).
Von Welch: Some observations on the rekey of encrypted.google.com...
http://blog.vonwelch.com/2011/05/some-observations-on-rekey-of.html
Thursday, May 5, 2011. Some observations on the rekey of encrypted.google.com. This is a fairly technical post about monitoring changes in PKI infrastructure. Unless that sentence interests you, you probably don't want to read further.). Since the Comodo CA issue I've been playing around with some of the PKI monitoring infrastructure including Perspectives. And the Google Certificate Catalog. So when I heard. Then, I looked at Perspectives. Key = 94:47:cd:b3:15:94:94:0c:f5:fd:5c:1b:b7:3c:ee:ce start: Tue...
Von Welch: September 2010
http://blog.vonwelch.com/2010_09_01_archive.html
Monday, September 20, 2010. Interpol scammed by FaceBook: A lesson in identity providers. Interpol] Security chief Ronald K. Noble revealed that two fake accounts were created in his name and used to find the details of highly-dangerous criminals. It is believed the cyber-criminals created Facebook profiles claiming to be Mr Noble. From there they gathered sensitive information about the suspects. Subscribe to: Posts (Atom). Interpol scammed by FaceBook: A lesson in identity.
Von Welch: December 2012
http://blog.vonwelch.com/2012_12_01_archive.html
Monday, December 3, 2012. Two open positions at CACR. I've got two open positions that offer the exciting opportunity to work on cybersecurity for computational science. The first is in the new NSF-funded Center for Trustworthy Scientific Cyberinfrastructure. The second is with by new DOE-funded project, Advanced Identity Management for Extreme-scale Scientific Computing. Both of these positions are exciting opportunities to work in both cybersecurity and with cool science projects. To apply, visit t...
Von Welch: March 2012
http://blog.vonwelch.com/2012_03_01_archive.html
Thursday, March 8, 2012. One thing that caught my attention in the recent arrest of the anonymous hackers is how the hacker who goes by "Sabu" was apparently caught. He apparently logged into an IRC chat service forgetting to hide his IP address just once. This is a good example of what cybersecurity is so hard - defense has to be perfect. If attackers have to play defense too though, that will level the field some. Subscribe to: Posts (Atom). Indiana University Center for Applied Cybersecurity Research.
TOTAL LINKS TO THIS WEBSITE
23
blog.securityscreenmasters.com
Security Screen Masters
Tuesday, July 27, 2010. Security Screen Masters launched its new website today. Posted by Security Screen Masters. Subscribe to: Posts (Atom). Security Screen Masters is proud to introduce to Arizona quality security screens and security doors. Call or Email Today For A Free Price Quote! Tucson: 520.790.1256. Phoenix: 623.466.0136.
blog.securitysolutionsarlington.com
Arlington, TX Security Blog
System Design and Engineering Support. Installation and Project Management. System Configuration and Remote Management. On-Site Service and Support. Megapixel Technology: Be Prepared. 10 Reasons You Should Consider Using IP Technology. Are IP Cameras Right for You? The Advantages of Megapixel. Wide Coverage: Problems and Solutions for Securing Large Areas. Why You Should Focus on Lenses. Understanding Wide Dynamic Range WDR. Infrared Illumination Buying Tips. The Benefits of Digital Noise Reduction.
blog.securitysolutionsfortworth.com
Fort Worth, TX Security Blog
System Design and Engineering Support. Installation and Project Management. System Configuration and Remote Management. On-Site Service and Support. Megapixel Technology: Be Prepared. 10 Reasons You Should Consider Using IP Technology. Are IP Cameras Right for You? The Advantages of Megapixel. Wide Coverage: Problems and Solutions for Securing Large Areas. Why You Should Focus on Lenses. Understanding Wide Dynamic Range WDR. Infrared Illumination Buying Tips. The Benefits of Digital Noise Reduction.
AfterMarket.pl
The domain securitystandard.pl. Was registered on AfterMarket.pl, polish largest domain marketplace. Is more than 180000 attractive domains for sale. We are the fastest growing domain registrar in Poland, which is trusted by over 60,000 customers. The lowest price, the simplest procedure, the best deals - that's why you should use our services! Contact the owner of the domain. If you are interested in purchasing this domain, you may use the contact form to send a message to the owner of the domain.
SecurityTargets Blog
Penetration Testing and Security Solutions. Thursday, 14 October 2010. Hardening CentOS kernel with grsecurity. Hardening the server's kernel is one of the most important things we need to consider when speaking about OS hardening. This is mini-howto install and configure grsecurity on CentOS server. Is powerful and easy to use Linux kernel security enhancement. It gives you a lot of security features:. Change root (chroot) hardening. Prevention of arbitrary code execution in the kernel. You can find the...
Security Unwrapped
Security simplified for day to day life. Thursday, May 6, 2010. FaceBook: It's not just about privacy, it's the principle. Lots of people are annoyed at FaceBook with its deployment of Instant Personalization. And what it has done for privacy, and I'm one of them. So, first, what exactly has FaceBook done? So every time they add a new partner, you have to go opt-out from that new partner. I have no problem with sites that don't give you privacy - I use Twitter. Without problem, the difference is Twitter ...
securitywatch.ie |
September 12, 2012. Unless you are prepared to spend your entire life protecting your property by sitting in your hallway with a large stick, you have no option but to consider for yourself the benefits or otherwise of what is available on the market. Best practice suggests that you start with all the simple things a little [.]. Comments { 0 }. Cameras as part of your security needs. September 12, 2012. Comments { 0 }. Security makes sense when insuring your property. September 12, 2012. Comments { 0 }.
blog.securitywatchindia.org.in
default.secureserver.net
Security Whole
Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...
Congratulations! You have successfully set up your website!
You have successfully set up your website! This is the default server page. There are a few possible reasons why you see this page instead of your own:. If you have just created this new host, please be patient until the server updates your configuration. It may take up to 10 minutes. If you think this page is an error, please contact our support team via a help desk ticket. If you are not the owner of the website, please access this page later.
security zealot
Keflex used for uti. Rantings of a security pragmatist. Excel Tip – Transform Name Order. I had a spreadsheet of over 300 names in the format “Last, First” and needed to transform them to “First Last”. The following is a self contained formula that does just that:. TRIM(CONCATENATE(RIGHT(A2,LEN(A2)-FIND(“,”,A2) , ” “, LEFT(A2,FIND(“,”,A2)-1) ). When evaluating a formula, I work from the inside out. FIND(“,” , A2) tells us the location of the first comma encountered in cell A2. November 12th, 2013 by admi...
SOCIAL ENGAGEMENT