In the on air interview I discussed a kickstarter project on a book, but that did not go anywhere in time (as Stan Fine thought…
We perform the Alpha scan to perform the initial scans, and then use the information to perform penetration testing (or pentesting) with the Sigma scan to attack the site…
We are your network/Security shield. We defend your computer network and have done so for close to 20 years now – You will see our…
It is an old security methodology to review what is necessary in a Security Strategy: People = we know people can cause security holes,…
NIST has a computer Security division and they have revamped their The On-line Database: Access and Control policy and procedures There are many good areas to review…
I am not sure if anyone is saying this -but there are no guarantees on the Internet. We will be honest with you and tell…
Rapid7 has many tools like metasploit a software that runs many exploits against a target machine. “It is the world’s most used penetration testing software”. the hackers are…
Is there a weak link? Is your firewall all patched up? Does it have the latest firmware? Are all ports closed that should be closed?…
Violent Python is a book by TJ. O’Connor. http://mirror7.meh.or.id/Programming/Violent_Python_A_Cookbook_for_Hackers_Forensic_Ana.pdf It is interesting how Python can use nmap and other opensource tools (metasploit) to probe and…
Assessing Website structures, network infrastructure, and overall reviews of technology (wifi and anything computer related). The key with staying secure on the Internet is: Update…