Here’s the Best Tools for Windows NTFS Permission Auditing and Reporting – [ Analyze Active Directory, Shares, Files/Folder and More with These DOWNLOADS! ]
Solarwinds’ Response Time Viewer for Wireshark is a standalone tool that analyzes the packets captured by Wireshark, so you can get in-depth information about your network in a dedicated viewer. This tool is a great one for troubleshooting network problems as you can analyze most common packet formats. Typically, you should use Wireshark for capturing […]
Auditing Active Directory, File Permissions, File Shares and More is Now Easier than Ever from a Centralized Location using Solarwinds Access Rights Manager, Here’s why!
Port Scanners are an important tool when you want to investigate any remote or local network for security considerations. Used by programmers and network administrators, these port scanners are used to mainly know what ports are being used by what applications, so you can identify malicious programs right away. These port scanners can also be […]
Advanced Port Scanner is a Versatile Port Scanner that is 100% FREE – You can scan local networks and remote Networks (LAN & WAN) Fast & Free from Any computer!
GlassWire is a new type of graphical network monitor for Windows that focuses on endpoint monitoring. The software runs on Windows 7, 8, and 10, and there is also a version of the app for Android. Setting up GlassWire for Windows is fairly simple and only requires using a Windows installer that can be downloaded […]
Finding Vulnerabilities and Exploits/Holes in your network infrastructure should be something you Do before a Hacker finds them – We’ve highlighted the Top Tools for Network Security Assessment, Vulnerability Scanning and much more!
WordPress is one of the most popular website platforms for bloggers and businesses as of 2017. It is easy to use and flexible as well as highly supported by developers and designers, but its security should also be considered. WordPress Security Issues It is a sad fact that a great many websites have been hacked […]
We wrote about blocking particular IP addresses with the route command here. If you are already using iptables, or want to start, a better way is to block particular hosts: iptables -I INPUT -s 22.214.171.124 -j DROP This command will simply drop any packet coming from the address 126.96.36.199. To list the chains: iptables -L […]
First off, let’s test ssh access: host user $ ssh x.y.z.w ssh: connect to host x.y.z.w port 22: Connection timed out host user $ Let’s add ssh access. Go to Applications->System Settings->Security Level: If you are not root, you will get a prompt to enter the root password: Be default nothing is enabled as trusted. […]
Conventional encryption is where there are no keys involved. This can be done with the -c option on GnuPG. When you use this option you will be asked for a passphrase. To decrypt the file the same passphrase is needed. This is ideal for password lists, where you have the ability to share the passphrase […]
Nmap can make quick of work of doing a ping sweep of your network: [usr-1@srv-1 ~]$ nmap -sP 10.50.100.1-255 Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2005-06-13 15:50 PDT Host 10.50.100.1 appears to be up. Host 10.50.100.2 appears to be up. Host 10.50.100.22 appears to be up. Host mondo (10.50.100.72) appears to be up. Host […]
One key to check on Windows boxen is the Run key. The run key is located in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. When a user logs on, the programs specified in the run key also run. Many times a trojan will install itself here. A lesser evil is the hordes of small little apps that like to run some […]
The first step to secure PHP is from the system perspective. Only provide what you have to. Of course, the code needs to be secure as well by using proper input validation, encryption, etc., but as systems administrators, we can head off some problems. First off, you can view a complete rundown of your current […]
When I was a kid in 1975, my dad brought home a terminal with an accoustical coupler on the top where I could put a standard phone handset in, and communicate with a Microdata minicomputer at his work. [Dick Pick developed the operating system for the Microdata. To make it fast, he programmed it using […]
There is a false sense of security when you envision your network as inside and outside, with a firewall protecting you from hostile users on the outside. One particularly nasty problem is when users bring their laptops home, surf, read email, and then plug it right back in to the corporate LAN on Monday morning. […]
There is a most fabulous utility available for free download from Shavlik Technologies here that will scan your Windows boxen for needed security/bug fixes. The command line version doesn’t require registration, and is quite easy to use. The cool thing is that the status of current patches is downloaded at run time. Let’s run this […]
We have noticed a surge in traffic on port 12345. This could be NetBus, or a variant. We suspect that some trojan backdoor is in the wild tacked on to a new worm. The worm is looking for other friendly hosts listening on port 12345. To see a historical chart of activity on this port, […]
Yet another worm making the rounds via email. This one has a nasty payload. More info here. Removal tool here. Additional info for administrators and operators on IRC networks here.
One important component of securing a system is to use a file integrity checker.There are multiple tools out there that can do this, including AIDE, and Tripwire. One project that does what we need, has few installation requirements, is fairly easy to install, and is multi platform is AFICK. In this article we will install […]