This is a presentation I’ve been doing at a few infosec events recently. I talk about how hackers and stalkers harass you online, and how they get into your devices, email, and social media accounts.The post Electronic Stalking and Harassment
In this episode: I discuss why you should be testing your web application security, and perform periodic vulnerability scans. This one is short, and the first I’ve posted after a long break. I’ll get more into what’ s been keeping me away from
Security in Depth is FailingI’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for that. I think this comes down to talent, training, and learning to communicate with our busin
The SHA-1SumSHA-1Sum is a Linux that calculates and verifies SHA-1 hashes. It is commonly used to verify the integrity of files. The has values should be the same as long as the file hasn’t been modified. This is an effective way to check if
lsof and fuser commands in Linux – Episode 2 Show Noteslsof is a command in Linux that lists open files. running lsof gives you information such as Command, PID, TID, USER, FD, TYPE, DEVICE, SIZE/OFF, NODE, and NAME:The lsof command effectiv
Network Security LoggingNetwork Security Logging is one of the basic elements you should have for your infrastructure. Proper logging of your network devices will help you build an audit trail and understand the who, what, when, where, and how