lbnguyen02.blogspot.com
ITEC 5321 - Long Nguyen: LiveCDs Survey
http://lbnguyen02.blogspot.com/2007/09/livecds-survey-there-are-huge-number-of.html
ITEC 5321 - Long Nguyen. Enterprise Information Systems Security. Friday, September 21, 2007. There are a huge number of Linux liveCD distributions out there. In fact, each liveCD distribution has its own focus on several aspects such as project focus or target audiences, included software utilites and tools, update frequency, and available support. In this essay, I am going to discuss the similarities and differences of three well-known liveCDs: INSERT, BackTrack, and Knoppix STD. In terms of available ...
jie-wang.blogspot.com
Jie Wang's Blog for ITEC 5321: September 2007
http://jie-wang.blogspot.com/2007_09_01_archive.html
Jie Wang's Blog for ITEC 5321. Thursday, September 27, 2007. Lab Narrative for Hands-on Cryptography2. Hands-on Cryptography- Symmetric Key and File Exchange, Symmetric Decryption. Sep 22, 2007. Receive partner's file through open port and get his DES key for decrypting the encoded file then open the file with normal text. During this process, capture packets with Wireshark. Then demonstrate file integrity through the creation of file hashes. 1 Get my own ip. It shows my address is:. Wang's home in head.
jie-wang.blogspot.com
Jie Wang's Blog for ITEC 5321: October 2007
http://jie-wang.blogspot.com/2007_10_01_archive.html
Jie Wang's Blog for ITEC 5321. Monday, October 1, 2007. Lab Narrative for 3A-4. Trojans, Backdoors, DoS, and Buffer Overflows. Sep 29, 2007. Know about malicious programs or methods like Trojans, Backdoors by using Netbus to control partner's computer. 1 Choose one computer as the server- We choose Ivonne's computer as the server (the aim of attacker), IP: 129.7.236.137. 3 We start command console and type. To listen the port. The default port is 12345. It shows on Ivonne's computer:. Password and so on.
jie-wang.blogspot.com
Jie Wang's Blog for ITEC 5321: Lab Narrative for 3A-4
http://jie-wang.blogspot.com/2007/10/lab-narrative-for-3a-4.html
Jie Wang's Blog for ITEC 5321. Monday, October 1, 2007. Lab Narrative for 3A-4. Trojans, Backdoors, DoS, and Buffer Overflows. Sep 29, 2007. Know about malicious programs or methods like Trojans, Backdoors by using Netbus to control partner's computer. 1 Choose one computer as the server- We choose Ivonne's computer as the server (the aim of attacker), IP: 129.7.236.137. 3 We start command console and type. To listen the port. The default port is 12345. It shows on Ivonne's computer:. Password and so on.
lbnguyen02.blogspot.com
ITEC 5321 - Long Nguyen: Week 4 Lab Narrative
http://lbnguyen02.blogspot.com/2007/09/week-4-lab-narrative.html
ITEC 5321 - Long Nguyen. Enterprise Information Systems Security. Sunday, September 30, 2007. Week 4 Lab Narrative. Introduction to OpenSSL Cryptographic Toolkit. This lab helps you access relevant man pages and learn to work with OpenSSL from the command line. We used OpenSSLfrom a Knoppix console windows. The approximate time to complete this module would be 15-30 minutes. Openssl ciphers –v –ssl3. This part of lab you will learn about DES keys and how to use it to encrypt and decrypt documents. Openss...
lbnguyen02.blogspot.com
ITEC 5321 - Long Nguyen: Week 5 Lab Narrative
http://lbnguyen02.blogspot.com/2007/10/week-5-lab-narrative.html
ITEC 5321 - Long Nguyen. Enterprise Information Systems Security. Monday, October 8, 2007. Week 5 Lab Narrative. Windows OS Hardening and Local Policy. Using tools to update and strengthen windows operating systems. Internet Explore, MBSA, CIS Scoring. The approximate time to complete this module would be 20-30 minutes. Go to windowsupdate.microsoft.com and click Scan for updates. After the site scanned my system, I clicked review and install updates. Trojans, Backdoors, DoS, and Buffer Overflows. First ...
jie-wang.blogspot.com
Jie Wang's Blog for ITEC 5321: Lawyer Zhang
http://jie-wang.blogspot.com/2010/07/lawyer-zhang.html
Jie Wang's Blog for ITEC 5321. Friday, July 30, 2010. Free Quiz for CISSP. Special Publications 800 Series. Course Blog for Information System Security. View my complete profile.
lbnguyen02.blogspot.com
ITEC 5321 - Long Nguyen: January 2009
http://lbnguyen02.blogspot.com/2009_01_01_archive.html
ITEC 5321 - Long Nguyen. Enterprise Information Systems Security. Thursday, January 22, 2009. Credit Card Payment Network Security Breach. System that can catch the suspicious activities in real-time. You can read the full article here. Subscribe to: Posts (Atom). Credit Card Payment Network Security Breach. Goolge Online Security Blog. View my complete profile. Ethereal template. Powered by Blogger.
lbnguyen02.blogspot.com
ITEC 5321 - Long Nguyen: October 2007
http://lbnguyen02.blogspot.com/2007_10_01_archive.html
ITEC 5321 - Long Nguyen. Enterprise Information Systems Security. Monday, October 8, 2007. Week 5 Lab Narrative. Windows OS Hardening and Local Policy. Using tools to update and strengthen windows operating systems. Internet Explore, MBSA, CIS Scoring. The approximate time to complete this module would be 20-30 minutes. Go to windowsupdate.microsoft.com and click Scan for updates. After the site scanned my system, I clicked review and install updates. Trojans, Backdoors, DoS, and Buffer Overflows. First ...