Violent Python is a book by TJ. O’Connor. http://mirror7.meh.or.id/Programming/Violent_Python_A_Cookbook_for_Hackers_Forensic_Ana.pdf It is interesting how Python can use nmap and other opensource tools (metasploit) to probe and…
When trying to login to WordPress I got this message instead: (output started at public_html/wp-content/plugins/twitter/widget_twitter_vjck.php:171) in public_html/wp-includes/pluggable.php on line 896) Which is interesting to say…
It is a good idea to get in the habit of patching your systems consistently. Not wanting to reboot is sometimes a wish of all…
On patch Tuesday Microsoft has decided to roll up all the vulnerabilities found in the last month on one day, otherwise as each vulnerability gets…
Assessing Website structures, network infrastructure, and overall reviews of technology (wifi and anything computer related). The key with staying secure on the Internet is: Update…
In the last 25 years the most common vulnerabilities are? From VRT-Blog at snort.org Total vulnerabilities and highly critical vulnerabilities were up in 2012 after a significant…
CRN.com Website Has a discussion of a warning about an analysis about a new toolkit that makes it easier to create malware or other attacks on…
Just fixed a computer with the Harbinger ‘rootkit’ virus. Typical tools used to clean the computer, plus the Kaspersky bootkit removal tool called TDSSKiller Kaspersky webpage…
Not just the shield, but we will help you Oversite your IT department. We are helping simplify security, helping you oversee your security exposure, security…