Tag: cybersecurity

Prepare for Rumors of War

Prepare for Rumors of War

Recent Posts, Blog, Linux
The news is ramping up on the potential for bad things happening. This not great timing for many computer users out there, whether it be for professional or amateur users currently in the middle of upgrading operating systems. With malware, viruses and ransomware in the media lately the addition of potential increases in cyber-attacks adds even more stress to the task of 24/7 system maintenance. On a user level, good housekeeping is essential, along with prudent patching, basic firewall and antivirus updating including routine monitoring. I have a little more confidence in my Linux systems, but Windows OS can be secured and protected if you put some time into basic system upkeep. Having a good backup procedure and preparation for system restore are always a priority for any true system...
MFA Security Concerns

MFA Security Concerns

Recent Posts
Multi-factor authentication (MFA) is now a common security measure for just about all accounts. Logging into your bank account, video game accounts now require MFA. In order to log in, you must present multiple forms of evidence to prove you are who you claim to be. Something you knowSomething you haveSomething you are The better the security typically means a longer or more difficult process. Which for a user causes an inconvenience and can add more costs for the company. (Causing prices to be raised) If multi-factor authentication requires multiple forms of evidence then how are data breaches and account information still being stolen? Currently, in the consumer space, two-factor authentication is the most used involving sending SMS or utilizing "Soft tokens". Security exper...
WiFi Woes

WiFi Woes

Software
After all the buzz in the news lately, are you now finally planning on patching your WiFi router, buying a new one, or just saying the hell with it and going back to Cat 5e Ethernet? “Krack” WiFi exploit news got you bummed out, or are you just now learning about Re-using a “Nonce” to fake out your trusty old router with a “key re-installation attack”......that you always thought was secure using WPA2? How often have you even heard of or used the word “nonce” in a sentence? You don’t want someone decrypting your packets and/or forging new ones to basically hijack your connection. Maybe you don’t care and like to surf the web on public WiFi at your favorite coffee shop. That’s up to you. It’s been a very odd year for cyber security issues. If privacy isn’t your main concern,
Wireshark – For those who choose to do more with less

Wireshark – For those who choose to do more with less

Software
The philosophy of doing more with less sounds good, but it is not always practical. It takes effort and lots of practice to get to this methodology. I used to carry a “multi-tool” with me. It was like having a mini toolkit I could fold it up and carry in my pocket. It was great, but over time I started to think it was a little heavy and opted to leave it in my actual tool bag and went back to carrying a small Swiss Army knife. It was smaller and lighter. I learned to get the most out of it and found that I didn't miss the larger, heavier multi-tool as much as I originally thought. In fact, I learned a few tricks over the years that I probably would not have discovered if I hadn’t forced myself to do more with less. This is the philosophy I try to adhere to for troubleshooting communica
Wireshark Filters: Display vs Capture

Wireshark Filters: Display vs Capture

Software
A common thought by beginners when it comes to Wireshark filters is that display and capture filters do the same thing. Well, they don't; they may seem to be doing the same thing to you but the difference is when the packets get filtered. Display filters don't stop Wireshark from capturing any packets, you still capture all packets but it only displays you the packets you asked for. While capture filters when used make it so Wireshark won't capture any packets that you have specified not to.