Techie Talks
-
Black Hat
Working with Email
Working with Email: Email is one of the tools that a business relies on today to get its mission done.…
Read More » -
Black Hat
The Value of Job Sites
The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites…
Read More » -
Security+
Using a Honeypot in Practice
Honeypot in Practice: A honeypot is ideally suited to get a clearer picture of the activity on or around the…
Read More » -
Security+
Biometrics: Installing Biometric Devices
Biometrics: Biometrics systems use some kind of unique biological trait to identify a person, such as fingerprint, patterns on the…
Read More » -
Security+
Directory Traversal/Command Injection
Directory Traversal and Command Injection: If an attacker is able to gain access to restricted directories (such as the root…
Read More » -
Black Hat
Malicious Add-Ons
Malicious Add-Ons: There are any numbers of add-ons that have the potential to harm a system. Some do so unintentionally…
Read More » -
Security+
Antimalware
Antimalware: To keep all hosts safe from malware, there are a number of actions you should take at minimum: Install…
Read More » -
Security+
Smart Cards
Smart Cards are generally used for access control and security purposes. The card itself usually contains a small amount of…
Read More » -
Security+
Wi-Fi Encryption
Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share…
Read More » -
Virus
How to Stop a Virus or Worm That Is Out of Control
How to Stop a Virus or Worm that is Out of Control: A large private university has over 30,000 students…
Read More »