Sunday, 22 August 2010
The 20 Coolest Jobs in Information Security
#1 Information Security Crime Investigator/Forensics Expert
#2 System, Network, and/or Web Penetration Tester
#3 Forensic Analyst
#4 Incident Responder
#5 Security Architect
#6 Malware Analyst
#7 Network Security Engineer
#8 Security Analyst
#9 Computer Crime Investigator
#10 CISO/ISO or Director of Security
#11 Application Penetration Tester
#12 Security Operations Center Analyst
#13 Prosecutor Specializing in Information Security Crime
#14 Technical Director and Deputy CISO
#15 Intrusion Analyst
#16 Vulnerability Researcher/ Exploit Developer
#17 Security Auditor
#18 Security-savvy Software Developer
#19 Security Maven in an Application Developer Organization
#20 Disaster Recovery/Business Continuity Analyst/Manag...
SSH from ypur Mobile Phone
Here are a few nice little ready-to-use applications that implement SSH clients for some popular cell phones to connect to maintain your server or your home network from anywhere:
- TuSSH
This is written in C and it works with PalmOS and SonyOS
http://go2.wordpress.com/?id=725X1342&site=xorl.wordpress.com&url=http%3A%2F%2Fwww.tussh.com%2F
- MidpSSH
This application is written in Java (J2ME using MIDP 1.0/2.0) and it works with any Java enabled cell phone. It also includes a telnet...
Thursday, 19 August 2010
Port Scanning Techniques
Port numbers are 16-bit unsigned numbers and can be broadly classified into three categories. Port 0-1023 is "well known ports", 1024 - 49151 are "registered ports" and 49152 - 65535 is "dynamic or private ports".
One problem with port scanning is that it is effortlessly logged by the services listening at the scanned ports. This is because they detect an incoming connection, but do not receive any data, thereby generating an application error log.
To scan UDP ports, an empty UDP datagram is sent to the port. If the port is listening, the services will send back an error message or ignore the incoming datagram. If the port is closed, the operating system send back "ICMP Port Unreachable" (Type 3) message.
Port scanning can be broadly classified into:Open...
CISCO PACKET TRACER
Packet Tracer Tutorial | Cisco Video Training Packet Tracer Tutorial | Cisco Video Training | 916 MB
English | H264 1108 Kbps | 1902x1080 25fps | MP3 125Kbps | 916 MBGenre: Video Training
Description:Cisco Systems Packet Tracer
Packet Tracer OSPF
Packet Tracer Subinterfaces
Packet Tracer Video
Packet Tracer VLANS
Switch VLAN
WAN connection ADSL
EIGRP,FRAME RELAY, HTTP AND DNS Packet Tracer
configuration frame relay
How to configure OSPF in Packet Tracer.
OSPF Authentication Lab using...
Friday, 6 August 2010
Famous Google Hack Jobs
Famous Google Hack Jobs
The top 6 security breaches and near-disasters that have been keeping Google on its toes.
digg_url = 'http://digg.com/security/Famous_Security_Breaches_at_Google';
Millions of people trust Google with their personal data every day. While we'd all like to assume that our information is safe, the fact of the matter is that even Google is not hack-proof. All technology is prone to mechanical and human errors that can leave security holes open for exploit, and Google is no exception. Regards:HackfreakFortunately, nothing catastrophic has happened yet, but that's not to say that Google hasn't experienced any bumps along the way. Here are 6 of the most famous Google crack jobs, both real and imagined. Official Google Blog HackedIn October 2006, a...
The Essential Guide to Vulnerability Scanning
The Essential Guide to Vulnerability ScanningWhile it's important to link business networks to the Internet for the free exchange of information, a Net connection also opens the door to potential security breaches by malicious attackers. Fortunately, there's a way to protect your network's susceptible areas. Vulnerability scanning utilizes technology that seeks out security flaws and tests systems for weak points. Most scanning systems generate a report of their findings so that a business can use the information to tighten its network's security. Though it usually refers to the practice of scanning Internet-linked networks, vulnerability scanning can also be applied to system audits conducted on internal networks that assess the threats posed by rogue software or malicious...
103 Best Security Utilities in d World
Firewalls1. Comodo Personal Firewall: Comodo categorizes over 10,000 applications as safe, spyware, adware, and more to simplify your firewall management. All you have to do is download it for free.
2. Look 'n’ Stop Firewall: Look 'n' Stop's firewall is now compatible with Windows Vista. The first 30 days are free; after that the cost is $29.
3. SoftPerfect Personal Firewall: SoftPerfect's firewall supports multiple network configurations and has a flexible filtering system — all for free.
4. Bit Defender 10: Labeled by PC World as a “best buy” in 2006, Bit Defender's firewall is now available for free.
5. Securepoint Security: German-style security for free — what more could you want?
6. FWTK.org: Build your own firewall with free programs from this Web site.
7. WiseChoice.Net:...
DNS Poisoning Summary

########################################################################
##
## DNS CACHE POISONING DETAILED ANALYSIS REPORT Version 2
##
## (by Kyle Haugsness and the ISC Incident Handlers)
##
########################################################################
########################################################################
## Summary
########################################################################
Around 22:30 GMT on March 3, 2005 the SANS Internet Storm Center began
receiving...