Related Articles
Cisco’s Embedded Packet Capture
Cisco’s embedded packet capture is an immensely useful command. It allows one to capture network traffic from any point within a router.
Cybersecurity Threat Report for May 18th, 2020
U.S. Center for Internet Security Alert Level GUARDED: indicates a general risk of increased hacking, virus, or other malicious activity. From the Center for Internet…
Our Corporate Facebook Policy
It recently came to my attention that someone posted a strange comment on a Facebook post I had created that had the audience set by default as “Friends”. After noticing this comment by this person that I did not recognize as someone I knew I checked the audience for the post and it was, in fact, set as “Friends”. I was left confused because I attempted to click on the name of the person who made the post and the it was not clickable indicating no link actually existed. I then searched her by name and the profile did not come up in the results. Again, I was left confused. I had the impression that someone who was not a “Friend” on my Facebook was somehow able to post a comment and subvert Facebooks security.
Using Linguistic Phonetics for Secure Passwords
How to use linguistic phonetics and phonetic segments to generate a secure password or passhrase. Based on the “Human Condition” one can remember up to 5 phonetic…
Web Server Cyber-attack
This video gives an idea of how often a cyber-attack takes place. We see on average up to 172,800 a day. That’s about 7,200 every hour.
Verify Your Version of Mozilla Firefox
The following guide provides instructions on how to verify your version of Mozilla Firefox. Open Mozilla Firefox. Move your cursor to the upper right corner of the browser and click the three vertical lines.
Meet CYBER7, The Mobile Internet Truck
Meet CYBER7, The Mobile Internet Truck. Providing 4G access to customers whose internet access is down.
Verify Your Version of Google Chrome
Open Google Chrome. Move your cursor to the upper right corner of the browser and click the three vertical dots. Select “Help”. Select “About Google Chrome”. Note the version of Google Chrome.
Cybersecurity Threat Report for May 14th, 2020
GUARDED: indicates a general risk of increased hacking, virus, or other malicious activity. There are 4 other levels. There’s Low, Elevated, High, and Severe. From the Center for Internet Security, “The potential exists for malicious cyber activities, but no known exploits have been identified, or known exploits have been identified but no significant impact has occurred.”
Cybersecurity Threat Report for May 21st, 2020
Catilan Cimpanu of Zero Day reports that a vulnerability exists in DNS based software and may be used to launch a Distributed Denial of Service (DDoS) attack. The vulnerability was discovered by Israeli researchers.