Postformat Gallery: Multiple images with different sizes
Nullam dictum felis eu pede mollis pretium. Integer tincidunt. Cras dapibus. Vivamus elementum semper nisi. Aenean vulputate eleifend tellus. Aenean leo ligula, porttitor eu, consequat vitae, eleifend ac, enim. Aliquam lor
Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem.
Patch Management Survey
A Doctoral Student in Information Assurance is conducting a survey with the goal of understanding the collective IT perception of patch management along with any associated misconceptions relative to how vendors actually handle patch releases/cycles.
Accordingly, He would deeply appreciate your assistance by virtue of completing the following survey. The survey itself takes approximately 10 minutes to finish.
You can access the survey here or by accessing the full link:
Indented Quotes and Images – beautiful
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus.
Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem.
Information Privacy Issues with People Search Websites: What can you do to protect yourself?
At one time, when you wanted to know something about someone you would use a search engine like Google or Yahoo, but that is not the case anymore. There are hundreds of websites with your personal information listed that will provide your information to someone for a fee and some even for free. Many people always ask, “How did my information get on this site?”, and I often state, “You put it there.” Maybe not directly, but through various online activities such as Facebook and Twitter updates as well as signing up to purchase items online. All of that information is eventually collected and stored in some company’s database.
There is big business in collecting and selling your information from social networking sites as many of us have read in recent months on how Facebook what to collect and share our information. People search websites such as Spokeo.com, Intelius.com and PeopleFinder.com to name a few are among some of the sites that are out there to benefit from your collected information. On Spokeo.com, information about you, your family, income and even religious, political affiliation and hobbies are listed. In some cases, pictures of individual participating in activities and hobbies are available for viewing. Detailed information such as that was very likely pulled from your Facebook and twitter account.
Many people may think the information on the people search websites are harmless, but how harmless would you consider your address, a map to your house and the number of kids living at the house when it is complied in the wrong hands.
We are at a point where we need to continuously monitor our online identity to make sure nothing we do not want displayed is available to the public. We need to think of our digital identity like our personal credit report and periodically checking it to make sure it is fine.
Some simple recommendations are think before you post information on social networking sites, that information is searchable thus making it collectable. When asked for your birth date when filling an online application, make sure it is for a legitimate reason, if not lie about it. Lastly, and I know this is the toughest one, read those long privacy policies, they will tell you what the website will do with your information.
Once your information is out there, can you reclaim it? Yes and no, some sites make it easy, all you have to do is “opt-out” or request to be deleted, while others are more difficult and may require legal action or law enforcement’s assistance. In addition, services such as ReputationDefender.com which is one of many entities that can help individuals for a fee. It not guaranteed all of your personal or negative information will go away but is can help. That is why we stress, what you put online now will shape your digital legacy. It was said information about us online would outlive us long after we are gone.
Feb Edition of Hackin9 – Network Security
Another exciting edition of Hackin9 is out and you can download it here. Information about this edition is located below:
· Wuala – Secure Online Storage
There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works.
– MICHAEL MUNT
· A Beginners Guide to Ethical Hacking
– SHYAAM SUNDHAR
· A Security System That Changed The World
Enterprise data is a valuable corporate asset, and therefore ensuring it’s over integrity is an issue of superior business cycle model to any commercial or government organization.
– YURY CHEMERKIN
· Get in through the backdoor: Post exploitation with Armitage
IT professionals have a dated image of hacking. Many picture the process as running nmap, finding an exploit, and running it to compromise a server.
– RAPHAEL MUDGE
· Breaking The Code: Brute Forcing The Encryption Key
There’s no way around it, cryptography is an aspect of our digital lives that’s becoming more and more prevalent.
– RICH HOGGAN
· Is Data Secure on the Password Protected Blackberry Device?
People who have ever heard of password utility think the usage of it can protect their private data. There are, however, several ways to steal a lot of information in spite of the fact that device locked by password. These ideas are not complicated to first-time malware developer.
– YURY CHEMERKIN
· Examine your Network With Nmap What is network Scanning?
Network scanning is an important part of network security that any system administrator must be comfortable with. Network scanning usally consists of a port scanner and vulnerability scanner.
– MOHSEN MOSTAFA JOKAR
· Network Security – Data Breaches
There doesn’t appear to be a day that passes where we don’t hear about a corporate or government network data breach (http://datalossdb.org/) in the media. Whatever individuals or businesses do, we all fail miserably when it comes to protecting our most valued assets – personal and financial information.
– JULIAN EVANS
· What is Good Enough Coverage?
Everything we buy, build, or test in the security space calls itself full coverage, complete coverage, or all you’ll ever need. But we all know no product could possibly say they can be full coverage, as in they’ll cover every threat you could be faced with.
– MATTHEW JONKMAN
· Exploring GCIH certification for fun and employability
Do you remember the time when you used to read everything you got on Internet from underground e-zines to README files? How many years of professional experience do you have? This really counts. Enhance your skill set by challenging this certification exam! There’s no more room to discuss whether it’s good or bad being certified. The market needs it.
– ALEXANDRE TEIXEIRA
· Certification Smart?
A job in computers is a position of experience; if you don’t have experience the next best thing is a computer certification.
Parents’ Internet Monitoring Study by NetSmartz.org
NetSmartz is a very informative site geared towards aiding with the awareness efforts on how to better protect our kids while online. They have an excellent collection of data pertaining to how bad the situation is on the gap between parents understanding what their teens are doing online below:
Parents’ Internet Monitoring Study
Click here to view the entire report
A survey commissioned by Cox Communications and NCMEC3 found that
- Over half (51%) of parents either do not have or do not know if they have software on their computer(s) that monitors where their teenager(s) go online and with whom they interact.
- 42% of parents do not review the content of what their teenager(s) read and/or type in chat rooms or via Instant Messaging.
- Teenagers who Instant Message use chat lingo to communicate and parents don’t know the meanings of some of the most commonly used phrases. 57% don’t know LOL (Laughing Out Loud), 68% don’t know BRB (Be Right Back), and 92% don’t know A/S/L (Age/Sex/Location).
- 95% of parents couldn’t identify common chat room lingo that teenagers use to warn people they’re chatting with that their parents are watching. Those phrases are POS (Parent Over Shoulder) and P911 (Parent Alert).
- Nearly three out of 10 (28%) of parents don’t know or are not sure if their teens talk to strangers online.
- 30% of parents allow their teenagers to use the computer in private areas of the house such as a bedroom or a home office. Parents say they are more vigilant about where their teen(s) go online if the computer is in a public area of the household.
- 58% of parents surveyed say they review the content of what their teenager(s) read and/or type in chat rooms or via Instant Messaging; 42% do not.
Source: NetSmartz.org


