MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam will prepare you to pass the CISSP® Certification Exam. This course is an accelerated review course that focuses solely on the ten domains of knowledge as determined by ISC2. Test-taking tips and strategies are also discussed.
This author has not written his bio yet.
But we are proud to say that admin contributed 269 entries already.
Entries by admin
On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access. White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.
The FCC will be ruling on the usage of “White Space” for wireless networking access today (9/23/2010). White Space is the frequencies that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.
Stuxnet appeared on the scene earlier this summer, though it was written more than a year ago. The code, its mechanics, the way it moved from system to system using Zero-Day vulnerabilities in Windows, everything about it was both frightening and shady. The hype given to it was justified, if only because it was a targeted payload, aimed at critical infrastructure.
Earlier in the day a security flaw turned Twitter’s Website into a chaotic and potentially unsafe place, filled with annoying pop-up windows that activated just by rolling the mouse over another user’s tweets.
The EnCase evidence file can also be referred to as a forensic image file. The concept of an image file is where the entire drive contents of a target media is copied to a file and checksum values are calculated to verify the integrity (useful in court cases) of the image file (often referred to […]
ulnerability Assessment, according to wikipedia.org, is the process of
identifying and quantifying vulnerabilities in a system. Vulnerability assessment
can be used against many different types of systems such as a home security
alarm, the protection of a nuclear power plant or a military outpost. Note that
vulnerability assessment is different from risk assessments even though they share
some of the same commonalities. Vulnerability Assessment concerns itself with
the identification of vulnerabilities, the possibilities of reducing those
vulnerabilities and improving the capacity to manage future incidents. This paper
will focus primarily on vulnerability assessment as it pertains to information
technology infrastructure and how utilizing QualysGuard can ease the burden on
your technology staff.
Last week a hacker named, “Iraq resistance” who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the “Here you have” worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.
For the second time in nearly a week, Adobe Systems is warning users about a zero-day vulnerability under attack.
From the shutdown of McColo to last week’s disruption of the Pushdo botnet, spammers have continually found ways to stay in business.
Nearly 20 of the 30 command and control (CnC)servers associated with Pushdo were taken offline last week due to efforts by security vendor LastLine. The servers were supported by eight hosting providers, some of which did not respond to the vendor’s requests for action.
Bellow are some interesting links for you! Enjoy your stay :)
Our support Hotline is available 24 Hours a day: (240) 880-8947
- Monday-Friday: 9am to 5pm
- Saturday: 10am to 2pm
- Sunday: Closed