Microsoft has combined two popular Sysinternals utilities, Filemon ( for monitoring and displaying file system activity of a […]
PhishTank, a free community site operated by the people from OpenDNS allows anyone to submit, verify,track and share […]
Information Security, privacy and ensuring that a company’s confidential data remains top secret and its protection are of pivotal importance in any business. The present day corporation employs multiple layers of security, deploying firewalls, IDS, IPS, HIPS etc. However, we all have chinks in our armor and corporations are no different. Leakages tend to occur at the seams of an organization. These days, we do not hear about cases of a lonely hacker toiling away to gain access to a company’s crown jewels whether it is a coca cola recipie or sensitive code or data, there are much more easier ways to gain access to a company’s data and assets. Read on for a detailed look at the information security hazards often found at a typical office workspace.
With these tools installed, it is possible to write Win32 console or GUI applications that make use of the standard Microsoft Win32 API and/or the Cygwin API. As a result, it is possible to easily port many significant Unix programs without the need for extensive changes to the source code. This includes configuring and building most of the available GNU software . Even if the development tools are of little to no use to you, you may have interest in the many standard Unix utilities provided with the package. They can be used both from the bash shell (provided) or from the standard Windows command shell.
While Cygwin would be an obvious choice for many Unix/Linux power users, there is an excellent and a much simpler alternative to using Cygwin. In this article, we will show you how to run your Unix commands right in the windows command prompt.
When system and network admins talk about plugging all the holes and securing their network of denial -of -service attacks, one of the least talked about but one of the most effective network security technique is sinkholing. So what exactly is this ‘sinkholing’? This article is part 1 of a two series each expanding an implementing a different kind of sinkhole.
A sinkhole is defined as a method in which we redirect specific IP network traffic for different security reasons including analysis, diversion of attacks and detection of anomalous activities. It has long been deployed by Tier-1 ISP’s globally usually to protect their downstream customers. However, for the network administrators, sinkholes are generally deployed to provide valuable intelligence regarding the security threats their networks are facing. Read on below for more information on sinkholes and the two kinds of sinkhole implementation — darknets and honeynets and how you can use them to obtain valuable information regarding threats and misconfigurations in your network.
Wi-Fi hotspots have become ubiquitous at cafes, airports, restaurants, and other public location. In fact, more and more cities are creating hotspots that blanket entire metropolitan areas. Many municipalities have joined with local community groups to help grow the free wireless network by contributing volunteer time, knowledge, and donations..
.Wi-Fi hotspots present a unique challenge with respect to security especially because of the unknown computers sharing the same local network with you. Unlike your network at home or dorms or office networks, public hotspots whether at cafe centers or hotels usually broadcast their SSID’s, more often than not lack WEP or WPA encryption and definitely do not implement any kind of MAC filtering. After all, turning on any of these functions would negate the “public” aspect of hotspots.That said, even if these public hotspots used closed networks and enabled encryption on their networks, making their customers go through hoops to get connected, there would still be no way to tell a “legitimate” client from a “malicious” one out to hack other customers’ data. Anyone with a credit card can sign up for hotspot service. So what can you do to protect yourself at a public hotspot? Plenty…
Installing an SSH Server on Windows
Local port forwarding requires an SSH server running on the Windows machine. OpenSSH is provided as part of Cygwin which is an environment similar to Linux for Windows. Cygwin provides an install and update utility (setup.exe) to retrieve packages from the Internet. When you install Cygwin, select the OpenSSH package (available in the Net category). Once installed, complete the Cygwin configuration as shown below…