Techie Talks
-
IT Security
Safety Topics
Safety Topics: Security is a priority for every administrator, but it cannot be the only priority: security cannot forsake all…
Read More » -
Security+
Penetration Testing
Penetration Testing: It is becoming more common for companies to hire penetration testers to test their system’s defense. Essentially, a…
Read More » -
Security+
Security and the Cloud
Security and the cloud: Since this is a certification exam on security and not just on memorization of cloud-based terminology,…
Read More » -
Security+
Databases and Technology
Databases & Technology: One key reason why computers are installed is for their ability to store, access, and modify data.…
Read More » -
Security+
Identifying Critical Systems and Components
Identifying Critical Systems & Components: Â Sometimes your systems are dependent on things that you would not normally consider, basic utilities…
Read More » -
Security+
Risks Associated with Cloud Computing
Risks with Cloud Computing: The Term cloud computing has grown in popularity recently, but few agree on what it truly…
Read More » -
Security+
Risks Associated with Virtualization
Risks Associated with Virtualization: If cloud computing has grown in popularity, virtualization has become the technology du jour. Virtualization consists…
Read More » -
Security+
Burp Suite
Burp Suite: For our purposes, we will use Burp Suite Intercept (or just Burp for short) as our proxy as…
Read More » -
Black Hat
BRUTE FORCE AUTHENTICATION ATTACKS
Brute Force Attacks: Authentication actually takes place in many other parts of the web application other then the main login…
Read More »
