You are here: Home

Search results

12 items matching your search terms.
Filter the results.
Item type







New items since



Sort by relevance · date (newest first) · alphabetically
Do Not Use ISPConfig
Against my decades of experience and better judgement, and giving into laziness, I went ahead and installed ISPConfig about a year ago. Big mistake!
Getting Started in Information Security and Information Technology
I frequently get asked "how do I get started" in information security specifically, and information technology in general. Of course there are many paths to success, and this is not the only route to take...
Google Chrome OS Developers made Critical Technology Decisions Based on my SANS Institute Research Paper.
I stumbled across something that might indicate that Google (correctly in my view), stubbornly refused to include one of the most popular VPN (Virtual Private Network) technologies, the Point to Point Tunneling Protocol (PPTP), because of all the flaws published in my research paper by the SANS Institute, and in a discussion with a Google Chrome OS volunteer developer directly linked to my paper as the reason why they refuse to implement this very popular technology that is in just about every other operating system...
How much do you actually value transparency, privacy, and security for you, your business, and your clients?
My response to a discussion on Alignable: "For small business owners : I have noticed and experienced uptick in legal issues and cybersecurity concerns with some of my clients. What do you small biz owners have in place to help and protect you legally and what do you have in place to not only help to prevent an attack on your company /clients / employees /devices but also to restore the identities and stop the bleeding? "
Important Plone Hotfix 20150910
Important to apply Plone Hotfix 20150910 for registration spam and other security issues.
InfoSec Beginners Reading List
This is a reading list for those interested in learning more about Information Security (InfoSec).
Is the Jan.ai executable infected?
January 9th, 2024, 10:00 am Pacific Time, BitDefender Total Security Alert: @janhq\inference-nitro-extension\dist\bin\win-cpu\nitro.exe is infected with Gen:Variant.Tedy.258323 !
Jailbreaking now legal under DMCA for smartphones, but not tablets
Arbitrary rulings illustrate fundamental brokenness of the DMCA.
New attack bypasses HTTPS protection on Macs, Windows, and Linux
"Hack can be carried out by operators of Wi-Fi hotspots, where HTTPs is needed most." - From Ars Technica, by Dan Goodin - Jul 26, 2016 5:14 pm UTC, referencing upcoming conference...
OpenSuse Information Security Repository
In preparation for my demonstrations at the upcoming Spokane 2600 meeting, I found that Suse was missing a LOT of standard security/penetration testing tools in the repositories. Fortunately there is a specialized repo that helps somewhat...