web-archive-net.com » NET » S » SHORTINFOSEC.NET

Total: 84

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Information Security Short Takes: The Benefits of Periodic Network Mapping
    Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities The Benefits of Periodic Network Mapping Having an accurate depiction of your network is a fundamental prerequisite to being able to successfully handle system management troubleshooting and growth With the advent of network mapping tools this process has become more simplified At the dawn of computer networking interconnected systems were often contained to a building if not a single room But today s corporate networks span cities countries and the globe This complexity has made network management an increasingly difficult task There are three techniques that are used to gather network information SNMP data is retrieved from routers and switches Active probes an IP address range using trace route type functionality Route analyze routing protocols Measurable improvements have been noted in the time it takes to perform network management tasks You can easily track inventory monitor host uptime and downtime services applications and a myriad of other options In addition administrators can better understand the relationship between devices and the transport layers that connect them This aids in faster identification of potential network issues Network maps

    Original URL path: http://www.shortinfosec.net/2010/05/benefits-of-periodic-network-mapping.html (2016-04-28)
    Open archived version from archive


  • Information Security Short Takes: Skipfish - New Web Security Tool from Google
    careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Skipfish New Web Security Tool from Google Google is continuing it s efforts into the web security area After ratproxy which was a passive security tool here comes skipfish an active security scanner Shortinfosec has compiled skipfish v1 11b on windows UPDATE Seeing that skipfish releases are changing twice a day I am starting a persistent post on my blog to publish the latest versions of skipfish compiled for Windows Here is the link to the post for future versions http www shortinfosec net 2010 03 compiling latest skipfish for windows html You can download compiled skipfish 1 11b for Windows here Verification sum skipfish 1 1b zip MD5 6D97FBCB65CAF57A7D74E99C0671AEDA In order to run it just unzip the archive it contains the cygwin run time libraries needed for running skipfish If you wish to compile skipfish yourself you need to install cygwin and compile it with make Do not forget to update your path variable to include c cygwin bin Quickstart To run it start a command line in the directory where skipfish is unzipped compiled create a report directory

    Original URL path: http://www.shortinfosec.net/2010/03/skipfish-new-web-security-tool-from.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: How To - Malicious Web SIte Analysis Environment
    Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities How To Malicious Web SIte Analysis Environment There are numerous sites and web server side scripts which perform malicious attacks or simply unpleasant problems to their visitors The latest one that gained prominence is the although not really causing much harm is the Want 2 C Something Hot It is an elegant CSRF Cross site request forgery which just shares itself on the facebook profile of the visitor The careful visitor will simply steer away from such links The careful but curious visitor would want to see what such code does but in a safe environment So here is a sample environment for a safe preliminary analysis of a malicious web site The analysis computer a Cleanly installed VMware Windows XP SP3 guest OS The guest OS should be configured with a bridged networking Configure your host OS firewall to block all communication from the guest OS IP address to the host OS IP address The protective shielding The guest OS should have a latest updated antivirus software We recommend AVIRA with active heuristics scanning Also include an anti malware software like Spybot Search and Destroy The analysis

    Original URL path: http://www.shortinfosec.net/2009/11/how-to-malicious-web-site-analysis.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Microsoft Patch Disclosure - March 2010 Out-of-Band
    Blog Archive 2014 1 January 1 2013 2 November 1 October 1 2012 8 July 1 June 1 March 1 February 1 January 4 2011 16 December 1 September 1 August 2 July 1 June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Microsoft Patch Disclosure March 2010 Out of Band March 2010 brings Microsoft an out of band patch by Microsoft with a total of ten vulnerabilities MS10 018 Cumulative Security Update for Internet Explorer 980182 The update covers nine privately reported

    Original URL path: http://www.shortinfosec.net/2010/03/microsoft-patch-disclosure-march-2010.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Internet Marketing - Attracting Good Numbers Of Customers
    3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Internet Marketing Attracting Good Numbers Of Customers In this 21st century the boom of the Internet medium is offering ample of opportunity to everyone If you look 10 to 15 years back then you can know that people were widely using the Internet for chatting downloading emailing and grabbing information Today people are hugely using the World Wide Web for Internet marketing Certainly the Internet marketing has become the buzzword of this millennium This marketing system is totally different from other types of marketing in which individual have to move the market place to promote or sale products In Internet marketing all types of advertising and promotion are done right on the online medium This method of promotion offers increase in sales traffic and can attract good numbers of customers from

    Original URL path: http://www.shortinfosec.net/2010/03/internet-marketing-attracting-good.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Compiling the latest Skipfish for Windows
    a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Compiling the latest Skipfish for Windows Seeing that skipfish releases are changing twice a day Shortinfosec is starting a persistent post to publish the latest versions of skipfish compiled for Windows Here you ll find the latest compiled versions as well as a historical trail of the previous versions In order to run it just unzip the archive it contains the cygwin run time libraries needed for running skipfish The compiled code is tested on Windows 7 and Windows XP Pro Download the latest version of skipfish for windows skipfish 1 29b Previous versions Download skipfish 1 26b for windows Download skipfish 1 25b for windows Download skipfish 1 22b for windows Download skipfish 1 18b for windows Download skipfish 1 13b for windows Download skipfish 1 11b for windows Related posts Skipfish New Web Security Tool from Google Ratproxy Google Web Security Assessment Tool 10 16 PM Email this post Labels How To information security penetration testing 6 comments Anonymous said I have problem in using this

    Original URL path: http://www.shortinfosec.net/2010/03/compiling-latest-skipfish-for-windows.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Ratproxy - Google Web Security Assessment Tool
    Software Tutorials that Count Blog Archive 2014 1 January 1 2013 2 November 1 October 1 2012 8 July 1 June 1 March 1 February 1 January 4 2011 16 December 1 September 1 August 2 July 1 June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Ratproxy Google Web Security Assessment Tool The Google security team has released a free open source Web app security assessment tool The tool is called Ratproxy and can be found here http code google com p

    Original URL path: http://www.shortinfosec.net/2008/07/ratproxy-google-web-security-assessment.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Microsoft Patch Tuesday - March 2010
    and others that care blogarama the blog directory Hardware and Software Tutorials that Count Blog Archive 2014 1 January 1 2013 2 November 1 October 1 2012 8 July 1 June 1 March 1 February 1 January 4 2011 16 December 1 September 1 August 2 July 1 June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Microsoft Patch Tuesday March 2010 The March update brings two advisories with eight vulnerabilities covered MS10 016 Potential Remote Code Execution in Windows Movie Maker covering

    Original URL path: http://www.shortinfosec.net/2010/03/microsoft-patch-tuesday-march-2010.html (2016-04-28)
    Open archived version from archive