Jump to content
Stef's Coding Community

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Community Lounge and FAQ
    • Forum News
    • Open Forum
    • New Members Forum - Start Here!
  • StudioWeb
    • StudioWeb
    • StudioWeb News
    • StudioWeb Projects
  • Programming
    • Python
    • Javascript
    • PHP
  • Entrepreneurship, Business and Marketing
    • Social Media Marketing & Web Marketing
    • Entrepreneurship
    • Career Questions - Asked and Answered
  • Web Design
    • Beginners Web Design
    • HTML/XHTML
    • Dreamweaver
    • CSS
    • Advanced Web Design
    • Business of Web Design
    • Web Design News
  • Miscellaneous
    • Cybersecurity
    • Miscellaneous Software
    • Blogs and CMS
    • Web Accessibility
    • Peer-to-Peer Reviews
    • Website Templates
    • Web Design Jobs
  • Archives
    • Beginners Web Design
    • Course: The Complete Entrepreneur
    • Web Accessibility
    • Photoshop
    • CSS
    • Forum Rules and Etiquette
    • Flash
    • ASP
    • General Programming
    • Expression Web
    • Beginners Ruby
    • Killersites University
    • Actionscript

Categories

There are no results to display.

There are no results to display.

Product Groups

  • Business & Entrepreneur Courses

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website


LinkedIn


Facebook


Twitter


AIM


Yahoo


Other


Location


Interests

Found 14 results

  1. I plan to add future posts to this as I come across anything worthwhile. As computers grow faster the ability to crack passwords improves. If you are still using 8 character passwords, it can be cracked in minutes. Add to that the eventual use of quantum computers by governments and one day maybe all of us... ANY password will be cracked in minutes. A computer can compare pre-listed common hashes at about 350 Billion a second. Also stay away from dictionary words. There are two primary attack types: Brute force: The attacker will just run his computer through combinations (a, ab, ab
  2. Here I will be listing videos I come across on the subject of securit. There is now way to denote new one so you need to just keep coming back, I will add the dates as of all new ones: CIS / MS-ISAC (Center for Internet Security & Multi-State Information Sharing and Analysis Center) Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [in]security (58 min.) - You will be surprised and I hope disturbed by what all your "Devices" (some of those being devices you did not even know about) and what they are collecting about you and selling for their profit and
  3. Do we have any members down under? I believe we used to. Well Australia has me on the fence this week. One one side they made what I consider a bad call, and have weakened Australians rights to privacy to support fear mongering (Assistance and Access Bill 2018) by making it easier for law enforcement and government to crack your encryption and access private user data. On the other they have decided that e-voting is a bad call and have turned it down. I think it is easier to manipulate voting per computer than is is paper ballots shipped in armored cars like we used to do back in the day.
  4. As You Read This, It's Cyber Monday. How To Avoid The Top 10 Security Threats https://blog.knowbe4.com/as-you-read-this-its-cyber-monday.-how-to-avoid-the-top-10-security-threats
  5. Top Tactics for Researching IoT Technology Security This Holiday Season https://blog.rapid7.com/2018/11/19/top-tactics-for-researching-iot-technology-security-this-holiday-season/
  6. I have mentioned this before and must do so again so that you understand what we are speaking about when discussing Security vs. Privacy. Also let me state that I often come across a bit judgmental, that is not my intention here. Win 10 is a very solid and well secured OS, but not good for those looking for privacy and anonymity. Privacy vs. Security At a quick glance you will think that they are more or less the same, and that would be the case if we were speaking of material privacy. If your Laptop is secure than your Private photos remain private. But in cyber security we are speaki
  7. How to Start a Career in Cybersecurity: All You Need to Know https://thehackernews.com/2018/10/cybersecurity-jobs-salary.html
  8. Your Windows Security Updates Might Stop!? https://www.stationx.net/windows-security-updates-might-stop/ The the Excel sheet he links to to see if your AV is covered or not.
  9. You might want to pass this to any soldiers you know regardless of the country. Internet of Things (IoT) people, the Internet and your friends do not need to know where you are and what your are doing. Fitness apps, GPS geo-logging on photos you take, it all gives out info bad guys do not need to know. US soldiers are revealing sensitive and dangerous information by jogging https://www.adn.com/nation-world/2018/01/28/us-soldiers-are-revealing-sensitive-and-dangerous-information-by-jogging/
  10. Even serious subjects can get a laugh out of the best of us, so welcome to the lighter side of cyber security. My first installment Cat-mapping, Warkitten or simply how to weaponize your cat. Is your wifi cat proof? How to Weaponize your Cat to Hack Neighbours’ Wi-Fi Passwords
  11. You may have seen my two recent posts about Cyber Threats, Bad Rabbit and CoinHive. In the first I said top block all Flash, in the second block all JavaScript. Flash: As many of you know this is dying out and has always been a major security vulnerability. As it is dying out you can usually block it without much issue. JavaScript (JS): I have always preached against JS, before because it was not always supported like with early cell phones and because people like me often turned it off and web site readers could have issues with it. But face it, web sites still use it and it has gro
  12. I think this is important enough to warrant it's own thread. A vulnerability has been found in the WPA2 standards for wifi security. This is the standard security you all should be using on your access points/routers. This is also a vulnerability in the standards, not in a proiduct, so it effects everyone using WPA2 regardless of what systems you are using. I should also add that this is a proof of concept. That means researchers have found this flaw and already announced it to manufacterers so they can work on patches before it goes public as not only do we now know it exists, but so do
  13. This is a loaded question, because it is dictated by you and what angle you are looking at it. So, the very first question before you go further is: “What/Who am I?” then you follow that with “Who do I think I am up against?” Private Folk: This is the primary target for this forum. Who – You, your kids, family & friends Opposition – Cyber Crime, Hacker Groups, Lone Hackers, or Script Kitties, Government Business person at home: Looking at more mom & Pop to smallish business for our readers. Who – Shall we say for argument small business like you doing web design or the busin
  14. Welcome to the Killersites Cybersecurity forum. Many of you likely give only minor thought to security in general. You online banking and maybe email and figure you are relatively safe. You are not and I will get into that eventually. Everyone here should take an interest in security and if you really don’t, read it anyways, maybe you will change your mind. But consider this, we are most all web developers of one type or another here, and you should be interested in security as not to compromise your customers systems and maybe give them some good security tips as well. Feel free t
×
×
  • Create New...