securitybytes.blogspot.com
Security Bytes: March 2010
http://securitybytes.blogspot.com/2010_03_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Thursday, March 25, 2010. Common Threats and Safeguards to Be Aware of. A Denial of Service Attack (DoS). Are very common as more people are being connected. You can have spam, phishing, and malware sent though e-mail. How do you safeguard against these types of attacks? Links to this post. Saturday, March 20, 2010. The Linux...
securitybytes.blogspot.com
Security Bytes: December 2010
http://securitybytes.blogspot.com/2010_12_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, December 5, 2010. Social Culture of Hackers. A couple of well known hacker underground sites include:. Http:/ forums.hackerscenter.com/index.php. Http:/ www.hacker.org/. Http:/ www.2600.com/. Http:/ www.defcon.org/. Most of the hacker community never meets face-to-face. They hang out on irc, chat sites, and IM. Hacker...
securitybytes.blogspot.com
Security Bytes: July 2011
http://securitybytes.blogspot.com/2011_07_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, July 24, 2011. I just finished reading a new book from some of the guys at Offensive. Metasploit: The Penetration Tester's Guide. And all I can say is that it is amazing. Be sure to check it out and get yours from Amazon.com. Or your favorite bookseller. Overall I give this book a 4 out of 5 stars only because I wish ...
securitybytes.blogspot.com
Security Bytes: May 2013
http://securitybytes.blogspot.com/2013_05_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, May 5, 2013. Customizing Windows 8 Tips. Why buy a Windows 8 machine only to get rid of the Modern Interface. Lock Screen Apps: While we are customizing our lock screen we might as well provide some useful information. While the screen is locked you can also tell how much battery is left, the time, number emails a...
securitybytes.blogspot.com
Security Bytes: Gray Hat Hacking 3rd Edition Review
http://securitybytes.blogspot.com/2011/06/gray-hat-hacking-3rd-edition-review.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Friday, June 10, 2011. Gray Hat Hacking 3rd Edition Review. I have just finished reading Gray Hat Hacking: The Ethical Hacker's Handbook 3rd Edition. By: Shon Harris. The book has been updated and expanded with new content and expended chapters and techniques. The chapters on Malware Analyst is excellent. It builds on the...
securitybytes.blogspot.com
Security Bytes: Customizing Windows 8 Tips
http://securitybytes.blogspot.com/2013/05/customizing-windows-8-tips.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, May 5, 2013. Customizing Windows 8 Tips. Why buy a Windows 8 machine only to get rid of the Modern Interface. Lock Screen Apps: While we are customizing our lock screen we might as well provide some useful information. While the screen is locked you can also tell how much battery is left, the time, number emails a...
securitybytes.blogspot.com
Security Bytes: April 2010
http://securitybytes.blogspot.com/2010_04_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Thursday, April 8, 2010. Risk Analysis Life Cycle. Identify the Risk: Determine your assets and identify threats that are likely to attack those assets. Assess the Risks: Determine the asset value. Produce a risk matrix to determine which risk is greater given the company’s environment. Links to this post. The Mike Tech Show.
securitybytes.blogspot.com
Security Bytes: Social Culture of Hackers
http://securitybytes.blogspot.com/2010/12/social-culture-of-hackers.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, December 5, 2010. Social Culture of Hackers. A couple of well known hacker underground sites include:. Http:/ forums.hackerscenter.com/index.php. Http:/ www.hacker.org/. Http:/ www.2600.com/. Http:/ www.defcon.org/. Most of the hacker community never meets face-to-face. They hang out on irc, chat sites, and IM. Hacker...
securitybytes.blogspot.com
Security Bytes: December 2009
http://securitybytes.blogspot.com/2009_12_01_archive.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, December 13, 2009. TV On the Desktop. I have been using Hulu Desktop. It is a new product from www.hulu.com. Back to Hulu Desktop. You can edit your profile, subscribe to "channels", and add friends and also discuss shows and offer your opinions on what you thought of the shows. Adding friends and all brings a soc...
securitybytes.blogspot.com
Security Bytes: Metasploit Book Unleashed
http://securitybytes.blogspot.com/2011/07/metasploit-book-unleashed.html
Computer security news tips and general computer advise. If you have a computer related question please post a comment or e-mail me and I will try to answer you the best that I can. Sunday, July 24, 2011. I just finished reading a new book from some of the guys at Offensive. Metasploit: The Penetration Tester's Guide. And all I can say is that it is amazing. Be sure to check it out and get yours from Amazon.com. Or your favorite bookseller. Overall I give this book a 4 out of 5 stars only because I wish ...