tag:blogger.com,1999:blog-71544742024-03-08T07:57:58.093+05:30My Security Blog<b>Security Chronicles By Umesh Thota.
<br>www.SecureBlog.net</b>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.comBlogger207125tag:blogger.com,1999:blog-7154474.post-82007063610586056252022-06-27T09:09:00.009+05:302022-06-27T10:00:33.757+05:30Securing Windows devices feat. PowerShell by NSA!<div style="text-align: justify;"><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #87b4db; background-color: rgba(255, 255, 255, 0); color: #285287; font-stretch: normal; line-height: normal; margin: 0px;"></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #9c9487; background-color: rgba(255, 255, 255, 0); color: #878787; font-stretch: normal; line-height: normal; margin: 0px; min-height: 22px;"><br /></p><div><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-kerning: none;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5OEj1u5MMKkS9Z2Am9AEanSponkVMa-ly5ghzqAka6mK6uUWt9ESL8uoXUbQ4L9rnX4M9F6l6xYuLhfljtqQQFvzCri5IeAUhJGDF-JJiLt5vGWkhR32BfmQVM0ogV9CuZaNmEBw5V_zCNPVgbxDMkVeLDI1glCGjzN4uF2bXlSDnvhyMAtE/s300/images.jpeg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="168" data-original-width="300" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5OEj1u5MMKkS9Z2Am9AEanSponkVMa-ly5ghzqAka6mK6uUWt9ESL8uoXUbQ4L9rnX4M9F6l6xYuLhfljtqQQFvzCri5IeAUhJGDF-JJiLt5vGWkhR32BfmQVM0ogV9CuZaNmEBw5V_zCNPVgbxDMkVeLDI1glCGjzN4uF2bXlSDnvhyMAtE/w640-h358/images.jpeg" width="640" /></a></span></div><span style="font-kerning: none;"><br />The National Security Agency (NSA) and cybersecurity partner agencies issued an advisory recommending system administrators to use PowerShell to prevent and detect malicious activity on Windows machines. </span><p></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px; min-height: 24px;"><span style="font-family: inherit;"><span style="font-kerning: none;"></span><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;">PowerShell is frequently used in cyberattacks, leveraged mostly in the post-exploitation stage, but the security capabilities embedded in Microsoft’s automation and configuration tool can also benefit defenders in their forensics efforts, improve incident response, and to automate repetitive tasks. </span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px; min-height: 24px;"><span style="font-family: inherit;"><span style="font-kerning: none;"></span><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;">The NSA and cyber security centers in the U.S. (CISA), New Zealand (NZ NCSC), and the U.K. (NCSC-UK) have created a set of recommendations for using PowerShell to mitigate cyber threats instead of removing or disabling it, which would lower defensive capabilities. </span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"><br /></span></p></div><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPj2y984zj0fk5fhgmJfmbo29kZjgY91yIjQozXya8Z5urmHgkiJluaEovusEvM9196iUwm24ZWVayd4D_22vHGyuODoA9Q0lTqZ6S-2HQSfkmj_aLec-oDcGpAmFlrwYtxeK89xTs1qhcmsuS9xxKyG9QoG62UpDLJsMlvNEkE6yBEhMJ0-0/s275/images-2.jpeg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="183" data-original-width="275" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPj2y984zj0fk5fhgmJfmbo29kZjgY91yIjQozXya8Z5urmHgkiJluaEovusEvM9196iUwm24ZWVayd4D_22vHGyuODoA9Q0lTqZ6S-2HQSfkmj_aLec-oDcGpAmFlrwYtxeK89xTs1qhcmsuS9xxKyG9QoG62UpDLJsMlvNEkE6yBEhMJ0-0/w286-h257/images-2.jpeg" width="286" /></a> <i style="caret-color: rgb(38, 38, 38); color: #262626;">“Blocking PowerShell hinders defensive capabilities that current versions of PowerShell can provide, and prevents components of the Windows operating system from running properly. Recent versions of PowerShell with improved capabilities and options can assist defenders in countering abuse of PowerShell"</i></p><div><div class="separator" style="clear: both; text-align: center;"></div><blockquote><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><i><span style="font-kerning: none;"></span></i></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; min-height: 16px;"><br /></p></blockquote><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">LOWER RISK FOR ABUSE:</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Reducing the risk of threat actors abusing PowerShell requires leveraging capabilities in the framework such as PowerShell remoting, which does not expose plain-text credentials when executing commands remotely on Windows hosts.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Administrators should be aware that enabling this feature on private networks automatically adds a new rule in Windows Firewall that permits all connections.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Customizing Windows Firewall to allow connections only from trusted endpoints and networks helps reduce an attacker’s chance for successful lateral movement.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">For remote connections, the agencies advise using the Secure Shell protocol (SSH), supported in PowerShell 7, to add the convenience and security of public-key authentication:</span></p><ul><li data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; text-align: justify;"><span style="font-kerning: none;">remote connections don’t need HTTPS with SSL certificates</span></li><li data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; text-align: justify;"><span style="font-kerning: none;">no need for Trusted Hosts, as required when remoting over <a href="https://docs.microsoft.com/en-us/windows/win32/winrm/portal"><span data-darkreader-inline-color="" style="--darkreader-inline-color: #61acef; color: #135ebb; font-kerning: none; font-stretch: normal; line-height: normal;">WinRM</span></a> outside a domain</span></li><li data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; text-align: justify;"><span style="font-kerning: none;">secure remote management over SSH without a password for all commands and connections</span></li><li data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; text-align: justify;"><span style="font-kerning: none;">PowerShell remoting between Windows and Linux hosts</span></li></ul><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Another recommendation is to reduce PowerShell operations with the help of <a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview"><span data-darkreader-inline-color="" style="--darkreader-inline-color: #61acef; color: #135ebb; font-kerning: none; font-stretch: normal; line-height: normal;">AppLocker</span></a> or Windows Defender Application Control (<a href="https://docs.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager"><span data-darkreader-inline-color="" style="--darkreader-inline-color: #61acef; color: #135ebb; font-kerning: none; font-stretch: normal; line-height: normal;">WDAC</span></a>) to set the tool to function in Constrained Language Mode (CLM), thus denying operations outside the policies defined by the administrator.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">“Proper configuration of WDAC or AppLocker on Windows 10+ helps to prevent a malicious actor from gaining full control over a PowerShell session and the host”</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px 0px 10px; min-height: 16px;"><span style="font-family: inherit;"><span style="font-kerning: none;"></span><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">DETECTING MALICIOUS POWERSHELL USE:</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Recording PowerShell activity and monitoring the logs are two recommendations that could help administrators find signs of potential abuse.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">The NSA and its partners propose turning on features like Deep Script Block Logging (DSBL), Module Logging, and Over-the-Shoulder transcription (OTS).</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">The first two enable building a comprehensive database of logs that can be used to look for suspicious or malicious PowerShell activity, including hidden action and the commands and scripts used in the process.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">With OTS, administrators get records of every PowerShell input or output, which could help determine an attacker’s intentions in the environment.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">Administrators can use the table below to check the features that various PowerShell versions provide to help enable better defenses on their environment:</span></p><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOwBlvWXobUsTkMQYATVvsNODxno8qX9MFRh_6Ll1c3hWra7iT7Hubpb84VrVvtmL3Bh4xLfdhlOd42Ht64onhAtT805zflEzHwjdZdWtfc2yAFdBDkBKFujWnXSxlXCSw5V1hhOcjBogoFjOXCnv2YLhOLnLxwzNyH67tD8LQWfFhXh1Bxts/s1863/Screen%20Shot%202022-06-27%20at%209.33.23%20AM.png" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="829" data-original-width="1863" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOwBlvWXobUsTkMQYATVvsNODxno8qX9MFRh_6Ll1c3hWra7iT7Hubpb84VrVvtmL3Bh4xLfdhlOd42Ht64onhAtT805zflEzHwjdZdWtfc2yAFdBDkBKFujWnXSxlXCSw5V1hhOcjBogoFjOXCnv2YLhOLnLxwzNyH67tD8LQWfFhXh1Bxts/w640-h286/Screen%20Shot%202022-06-27%20at%209.33.23%20AM.png" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;">Security features present in PowerShell versions</span></p><div><br /></div></td></tr></tbody></table><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">The document the NSA released today states that “PowerShell is essential to secure the Windows operating system,” particularly the newer versions that dealt away with previous limitations.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">When properly configured and managed, PowerShell can be a reliable tool for system maintenance, forensics, automation, and security.</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px;"><span style="font-kerning: none;">The full document, “Keeping PowerShell: Security Measures to Use and Embrace” is <a href="https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/1/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF"><span data-darkreader-inline-color="" style="--darkreader-inline-color: #61acef; color: #135ebb; font-kerning: none; font-stretch: normal; line-height: normal;">available here</span></a> [PDF].</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px; text-align: left;"><span data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; text-align: justify;"><br /></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #e3e1dd; background-color: rgba(255, 255, 255, 0); color: #080808; font-stretch: normal; line-height: normal; margin: 0px 0px 15px; text-align: left;"><span data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #d0ccc6; background-color: rgba(255, 255, 255, 0); color: #262626; text-align: justify;">Some Additional Resources:</span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #6398c6; background-color: rgba(255, 255, 255, 0); color: #5586c1; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"><span style="font-family: inherit;"><a href="https://www.cisecurity.org/insights/white-papers/intel-insights-how-to-secure-powershell">Intel Insights: How to Secure PowerShell </a></span></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #87b4db; background-color: rgba(255, 255, 255, 0); color: #285287; font-stretch: normal; line-height: normal; margin: 0px;"><span style="font-kerning: none;"><span style="font-family: inherit;"><a href="https://www.sans.org/cyber-security-courses/securing-windows-with-powershell/">SANS course on securing PowerShell and Windows<span style="font-kerning: none; font-stretch: normal; line-height: normal;"></span></a></span></span></p><p data-darkreader-inline-bgcolor="" data-darkreader-inline-color="" style="--darkreader-inline-bgcolor: rgba(24, 26, 27, 0); --darkreader-inline-color: #87b4db; background-color: rgba(255, 255, 255, 0); color: #285287; font-stretch: normal; line-height: normal; margin: 0px;"><br /></p></div></div>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-53712594211974700792022-06-04T03:15:00.007+05:302022-06-27T08:37:39.555+05:30Cybersecurity Learning Resources! <p><span style="font-family: inherit;">A huge list of live and continuous vetted sources of learning resources for cybersecurity that will help u grow in ur cyber journey! Will keep adding here as i find more!</span></p><p><span style="font-family: inherit;"> </span></p><blockquote><span style="font-family: inherit;"><b>CISCO </b><b>NETWORKING </b><b>ACADEMY</b><b>! </b></span><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div><div style="text-align: left;"><b><a href="https://www.cisco.com/c/m/en_sg/partners/cisco-networking-academy " target="_blank"><span style="font-family: inherit;">www.cisco.com/c/m/en_sg/partners/cisco-networking-academy </span></a></b></div><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">Introduction to Cybersecurity | Duration: 6 hours </span></b></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;">Explore the exciting field of cybersecurity and why cybersecurity is a future-proof career<span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><span style="font-family: inherit;"><b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://skillsforall.com/course/introduction-to-cybersecurity?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=sfa-i2cs-en" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">English</a></b><b> |</b><b><span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/es/courses/cybersecurity/introduction-cybersecurity?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2cs-es" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">Spanish</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/fr/courses/cybersecurity/introduction-cybersecurity?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2cs-fr" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">French</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/pt-br/courses/cybersecurity/introduction-cybersecurity?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2cs-pt" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">Portuguese</a> </b><span><a name='more'></a></span></span></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">Introduction to Internet of Things | Duration: 20 hours<span style="text-align: left;"> </span></span></b></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;">Billions of devices connect to the network every day. Learn how IoT is digitally transforming the world and opening up exciting new jobs. <span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><span style="font-family: inherit;"><b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://skillsforall.com/course/introduction-iot?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=sfa-i2iot-en" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">English</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/es/courses/iot/introduction-iot?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2iot-es" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">Spanish</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/fr/courses/iot/introduction-iot?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2iot-fr" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;">French</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6;"><span style="caret-color: rgb(184, 178, 168);"> </span></span></b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/pt-br/courses/iot/introduction-iot?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-i2iot-pt" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-decoration: none; vertical-align: baseline;"><b>Portuguese</b><span><!--more--></span></a></span></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote style="text-align: left;"><span style="font-family: inherit;"><b style="text-align: justify;">Networking Essentials | Duration: 70 hours </b><span> </span></span></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;">Learn the fundamentals of networking, including what the network can do, how it operates, and how to protect it.<span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://skillsforall.com/course/networking-essentials?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=sfa-networking-essentials-en" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #70d3ff; border: 0px; box-sizing: border-box; color: #7cd7ff; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;"><span style="font-family: inherit;"><b>English</b><span><!--more--></span></span></a></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>Programming Essentials in Python | Duration: 70 hours</b><span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;">Learn Python, a versatile, object-orienated programming language used by startups and tech giants. No prior knowledge of programming is required.<span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><span style="font-family: inherit;"><b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/courses/programming/pcap-programming-essentials-python?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-pcap-en" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;">English</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6; text-align: left;"><span style="caret-color: rgb(184, 178, 168);"> </span></span><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/es/courses/programming/pcap-programming-essentials-python?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-pcap-es" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;">Spanish</a> |<span data-darkreader-inline-color="" style="--darkreader-inline-color: #b5aea5; color: #b6b0a6; text-align: left;"><span style="caret-color: rgb(184, 178, 168);"> </span></span></b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/pt-br/courses/programming/pcap-programming-essentials-python?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-pcap-pt" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;"><b>Portuguese</b><span><!--more--></span></a></span></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>Linux Essentials | Duration: 70 hours</b><span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;">Learn the basic of Linux, the world’s most popular operating systems, and expand your career opportunities in IT.<span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><span style="font-family: inherit;"><b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/courses/os-it/ndg-linux-essentials?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-linux-en" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;">English</a> | </b><a data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" href="https://www.netacad.com/es/courses/os-it/ndg-linux-essentials?utm_source=cisco.com&utm_medium=referral&utm_campign=writ-course-page&utm_content=netacad-linux-es" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #846cc6; border: 0px; box-sizing: border-box; color: #7b62c2; font-size: 18px; font-stretch: inherit; line-height: 1.44; margin: 0px 0px 0.833em; padding: 0px; text-align: left; text-decoration: none; vertical-align: baseline;"><b>Spanish</b><span><!--more--></span></a></span></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span><span style="font-family: inherit;"> </span></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>Women Rock-IT - IT's not just for the Boys!</b><span style="text-align: left;"> </span></span></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://www.cisco.com/c/m/en_sg/partners/women-rock-it.html"><span style="font-family: inherit;">https://www.cisco.com/c/m/en_sg/partners/women-rock-it.html</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>CYBRARY</b> </span></div></blockquote><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">Introduction to IT and Cybersecurity</span></b></div></blockquote><blockquote><div style="text-align: left;"><span style="font-family: inherit;">This FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction is designed to help you decide which career path is right for you.</span></div><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://www.cybrary.it/course/introduction-to-it-and-cybersecurity"><span style="font-family: inherit;">https://www.cybrary.it/course/introduction-to-it-and-cybersecurity</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote>
<p style="text-align: left;"><span style="font-family: inherit;"> </span></p><blockquote><b><span style="font-family: inherit;">DEPARTMENT</span></b><div style="text-align: left;"><b><span style="font-family: inherit;">OF HOMELAND </span></b></div><b><span style="font-family: inherit;">SECURITY</span></b><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div><div style="text-align: left;"><span style="font-family: inherit;">The US Department of Homeland Security is an obvious source of cybersecurity expertise, but you may not have been aware that you don’t have to travel all the way to the United States to benefit from the vast experience of US government security experts, or that you can do so for free. DHS's calendar full of training events an entire portal of online courses available to those involved in the security of industrial control systems.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://ics-cert-training.inl.gov/learn"><span style="font-family: inherit;">https://ics-cert-training.inl.gov/learn</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote>
<p style="text-align: left;"><span style="font-family: inherit;"> </span></p><blockquote><b><span style="font-family: inherit;">SANS</span></b><div style="text-align: left;"><b><span style="font-family: inherit;">CYBER ACES </span></b></div><b><span style="font-family: inherit;">ONLINE</span></b><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div><div style="text-align: left;"><span style="font-family: inherit;">Sans Cyber Aces provides introduction to online IT and cyber security that's easy to follow and understand. After reading through a series of comprehensive entries about operating systems, networking and system administration, you can register for a quiz that puts your expertise to the test. Should highlighted talking points such as installing Linux virtual machine software or basic PHP, Bash and PowerShell web scripting pique your interest, you’ll be in for an engaging lecture.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><b><a href="https://www.sans.org/course-preview"><span style="font-family: inherit;">https://www.sans.org/course-preview</span></a></b></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><b><a href="https://www.sans.org/free"><span style="font-family: inherit;">https://www.sans.org/free</span></a></b></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="http://www.cyberaces.org"><span style="font-family: inherit;">http://www.cyberaces.org</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote>
<p style="text-align: left;"><span style="font-family: inherit;"> </span></p><blockquote><b><span style="font-family: inherit;">HEIMDAL</span></b><div style="text-align: left;"><b><span style="font-family: inherit;">SECURITY</span></b></div><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div><div style="text-align: left;"><span style="font-family: inherit;">An email-based, its syllabus is significantly more extensive than that of The Daily Security Tip. The Cyber Security Course for Beginners delivers a new lesson every two days for five weeks, and all without the need to pay back any tuition loans. In terms of content, it aims to give you step-by-step advice for keeping your personal data out of nefarious hands.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://cybersecuritycourse.co"><span style="font-family: inherit;">https://cybersecuritycourse.co</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote>
<p style="text-align: left;"><span style="font-family: inherit;"> </span></p><blockquote><span style="font-family: inherit;"><b>PROFESSOR MESSER </b> </span></blockquote><blockquote><b><a href="https://www.professormesser.com"><span style="font-family: inherit;">www.professormesser.com</span></a></b></blockquote><blockquote><span style="font-family: inherit;"><br /></span></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><span style="font-family: inherit;">Professor Messer’s CompTIA N10-007 Network+ Course</span></b></blockquote><blockquote><b><a href="https://www.professormesser.com/network-plus/n10-007/n10-007-training-course/"><span style="font-family: inherit;">www.professormesser.com/network-plus/n10-007/n10-007-training-course/</span></a></b></blockquote><blockquote><b><span style="font-family: inherit;">Professor Messer’s CompTIA 220-1001 and 220-1002 A+ Training Course</span></b></blockquote><blockquote><b><span style="font-family: inherit;"><a href="https://www.professormesser.com/free-a-plus-training/220-1001/220-1000-training-course/">www.professormesser.com/free-a-plus-training/220-1001/220-1000-training-course/</a><span><!--more--></span></span></b></blockquote></blockquote><p></p><p><span style="font-family: inherit;"> </span></p><blockquote><p><span style="font-family: inherit;"><b>TryHackMe</b> </span></p></blockquote><blockquote><p><span style="font-family: inherit;">Hands on cybersecurity training thru real world scenarios: </span></p><b><span style="font-family: inherit;"><a href="https://tryhackme.com">www.tryhackme.com</a> </span></b><p><span style="font-family: inherit;"> </span></p></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><p><span style="font-family: inherit;"><b>Introduction to cybersecurity: </b> </span></p></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><p><b><a href="https://tryhackme.com/path/outline/introtocyber"><span style="font-family: inherit;">www.tryhackme.com/path/outline/introtocyber</span></a></b></p></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><p><span style="font-family: inherit;"><b>Penetration Testing:</b> </span></p></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><p><b><a href="https://tryhackme.com/path/outline/jrpenetrationtester"><span style="font-family: inherit;">www.tryhackme.com/path/outline/jrpenetrationtester<span></span></span></a></b></p><!--more--><p></p></blockquote></blockquote><p><span style="font-family: inherit;"><span> </span> </span></p><blockquote><span style="font-family: inherit;"><b>Web app penetration testing | You will learn pentesting techniques, tools, common attacks and more. The tools covered in the course include Burp Suite, Nikto, Dirbuster, curl, sublist3r, nmap, and many others. by freeCodeCamp.org<br /></b><br /></span></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><span style="font-family: inherit;">Web Application Ethical Hacking - Penetration Testing Course for Beginners </span></b></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><span style="font-family: inherit;"><a href="https://www.youtube.com/watch?v=X4eRbHgRawI">www.youtube.com/watch?v=X4eRbHgRawI</a><!--more--></span></b></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote><span style="font-family: inherit;"><b>Complete CCNA course covering everything you need to pass the latest version of the CCNA exam (exam code 200-301). There's no better way to start your IT career than with the Cisco CCNA certification (free)</b><br /><br /></span></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><span style="font-family: inherit;">CCNA 200-301 | Complete Course 2022 </span></b></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><a href="https://www.youtube.com/playlist?list=PLxbwE86jKRgMpuZuLBivzlM8s2Dk5lXBQ"><span style="font-family: inherit;">www.youtube.com/playlist?list=PLxbwE86jKRgMpuZuLBivzlM8s2Dk5lXBQ<span><!--more--></span><span></span></span></a></b></blockquote></blockquote><p><span style="font-family: inherit;"><br /></span></p><blockquote><b><span style="font-family: inherit;">BUGCROWD UNIVERSITY</span></b></blockquote><blockquote><span style="font-family: inherit;">Security, education, and training for the whitehat hacker community. To get started, click on the modules below or go to Bugcrowd’s GitHub for slides, labs, and more</span></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote></blockquote><blockquote><span style="font-family: inherit;"><b><a href="https://www.bugcrowd.com/hackers/bugcrowd-university">www.bugcrowd.com/hackers/bugcrowd-university</a></b> </span></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><a href="https://github.com/bugcrowd/bugcrowd_university"><span style="font-family: inherit;">github.com/bugcrowd/bugcrowd_university<span><!--more--></span></span></a></b></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote></blockquote><blockquote><b><span style="font-family: inherit;">WEB SECURITY ACADEMY </span></b></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote style="text-align: left;"><b><span style="font-family: inherit;">Free, online web security training from the creators of Burp Suite </span></b></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote style="text-align: left;"><b><a href="https://portswigger.net/web-security"><span style="font-family: inherit;">portswigger.net/web-security<span><!--more--></span></span></a></b></blockquote></blockquote><blockquote><span style="font-family: inherit;"> </span></blockquote><blockquote><b><span style="font-family: inherit;">Learn the 20% you need to know to be efficient with Linux. This course will teach all the common Linux skills used in cyber-security and ethical hacking by freeCodeCamp.org<br /><br /></span></b></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><b><span style="font-family: inherit;">Linux Essentials for Ethical Hackers - Full InfoSec Course: </span></b></blockquote></blockquote><p></p><blockquote></blockquote><p></p><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" data-darkreader-inline-color="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; --darkreader-inline-color: #d8d4cf; -webkit-text-stroke-width: 0px; border: none; caret-color: rgb(232, 230, 227); color: #e8e6e3; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; margin: 0px 0px 0px 40px; padding: 0px; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;"><blockquote><a data-darkreader-inline-color="" href="https://www.youtube.com/watch?v=1hvVcEhcbLM" style="--darkreader-inline-color: #3da5ff; color: #3391ff;"><b><span style="font-family: inherit;">www.youtube.com/watch?v=1hvVcEhcbLM<span><!--more--></span></span></b></a></blockquote></blockquote><p><span style="font-family: inherit;"><br /></span></p><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">EdX - Real college cybersecurity courses from Harvard, MIT, and more of the world's leading universities</span></b></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://www.edx.org/learn/cybersecurity"><span style="font-family: inherit;">www.edx.org/learn/cybersecurity</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote><blockquote><div style="text-align: justify;"><span style="font-family: inherit; text-align: left;"> </span></div></blockquote><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>COURSERA - </b>Covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://www.coursera.org/specializations/cyber-security"><span style="font-family: inherit;">www.coursera.org/specializations/cyber-security</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">UDEMY - Free Cyber Security Courses and Tutorials</span></b></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://www.udemy.com/topic/cyber-security/free/"><span style="font-family: inherit;">www.udemy.com/topic/cyber-security/free/</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p><blockquote><div style="text-align: left;"><b><span style="font-family: inherit;">TED - Free Cyber Security Courses and Tutorials</span></b></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><blockquote><div style="text-align: left;"><b><a href="https://www.ted.com/search?q=cybersecurity"><span style="font-family: inherit;">www.ted.com/search?q=cybersecurity</span></a></b></div></blockquote><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><a href="https://blog.ted.com/tag/cybersecurity"><span style="font-family: inherit;">blog.ted.com/tag/cybersecurity</span></a></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><br /></span></div></blockquote><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>Learn to Code - </b>The Free Ebook Foundation a not-for-profit organization is devoted to promoting the creation, distribution, archiving, and sustainability of free ebooks in many languages.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: left;"><b><a href="https://ebookfoundation.github.io"><span style="font-family: inherit;">ebookfoundation.github.io</span></a></b></div></blockquote></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><b><span style="font-family: inherit;">Resources : <a href="https://github.com/sindresorhus/awesome">github.com/sindresorhus/awesome</a></span></b></div><b><span style="font-family: inherit;"><!--more--></span></b></div></blockquote></blockquote>
<p><span style="font-family: inherit;"> </span></p><blockquote><div style="text-align: left;"><span style="font-family: inherit;"><b>Think Python - </b>How to Think Like a Computer Scientist is also a great introduction to Python programming for beginners. It starts with basic concepts of programming, and is carefully designed to define all terms when they are first used and to develop each new concept in a logical progression. Larger pieces, like recursion and object-oriented programming are divided into a sequence of smaller steps.</span></div></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><blockquote><div style="text-align: justify;"><div style="text-align: left;"><span style="font-family: inherit;"><b>Free books : </b><b><a href="https://greenteapress.com/wp">greenteapress.com/wp</a><span style="text-align: left;"><a href="https://greenteapress.com/wp " target="_blank"> </a></span></b></span></div><b><span style="text-align: left;"><span style="font-family: inherit;"><!--more--></span></span></b></div></blockquote></blockquote><p><span style="font-family: inherit;"> </span></p>
<blockquote><span style="font-family: inherit;"><br /></span></blockquote><blockquote data-darkreader-inline-border-bottom="" data-darkreader-inline-border-left="" data-darkreader-inline-border-right="" data-darkreader-inline-border-top="" style="--darkreader-inline-border-bottom: initial; --darkreader-inline-border-left: initial; --darkreader-inline-border-right: initial; --darkreader-inline-border-top: initial; border: none; margin: 0px 0px 0px 40px; padding: 0px;"></blockquote><p><br /></p>
<blockquote></blockquote>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-10078689592843153902016-02-07T03:36:00.003+05:302016-02-07T03:36:12.890+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<img alt="Symantec: 2016 Security Predictions - Infographic" src="http://image.slidesharecdn.com/symantec2016securitypredictions-160121071210/95/symantec-2016-security-predictions-infographic-1-638.jpg?cb=1453402192" /></div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1280919054521872562016-02-01T03:14:00.001+05:302016-02-03T05:10:43.702+05:30Have You Been Hacked ?<div dir="ltr" style="text-align: left;" trbidi="on">
<blockquote class="tr_bq" style="clear: both; text-align: center;">
<a href="http://www.roboform.com/have-i-been-hacked#" target="_blank"><img border="0" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Pr6RoMooQAxzf9JFk-xvoiPaBW_cGJUwo3AOz40wSeBA2Lm0UClcouMvbtSJ4fCH9LWaDJ2h41VBVltpHZLPM3qAWEjXf8W3h68NcXMvbZM3sbY2ySWZZorhw_m0ppqC5I3mlA/s400/Untitled.png" width="400" /></a></blockquote>
<div style="text-align: justify;">
<blockquote class="tr_bq">
Use this <a href="http://www.roboform.com/have-i-been-hacked#" target="_blank">Service</a> from Roboform to check if you have been hacked, it covers many leaks and hacked databases. hope you use different passwords for different sites.</blockquote>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-70823615592997548482015-12-26T16:00:00.000+05:302016-02-02T17:55:42.217+05:30Panopticlick !<div dir="ltr" style="text-align: left;" trbidi="on">
<div id="header" style="background-color: #3e3d3d; font-family: Lato, Helvetica, Arial, Verdana, sans-serif; font-size: 12.8px; text-align: center;">
<div class="orange" style="background-color: #f58528; min-height: 237px;">
<a href="https://panopticlick.eff.org/" style="color: #f58528; font-weight: 700; outline: none; text-decoration: none;"><img class="title" src="https://panopticlick.eff.org/static/images/title.png" style="border: 0px; height: 90px; margin-left: 10px; padding: 28px 0px 0px; width: 400px;" /></a><br />
<div class="subtitle" style="color: white; font-size: 27px; font-weight: bold; letter-spacing: 0.15px; margin: 6px 0px 0px; position: relative; z-index: 1;">
Is your browser safe against tracking?</div>
</div>
<img class="orange-slash" src="https://panopticlick.eff.org/static/images/triangle.png" style="left: 0px; position: absolute; top: 236px; width: 941px;" /></div>
<div id="content" style="background-color: #3e3d3d; font-family: Lato, Helvetica, Arial, Verdana, sans-serif; font-size: 12.8px; margin: -18px auto 62px; min-height: 300px; text-align: center;">
<div class="content-background" style="background-color: rgba(255, 255, 255, 0.933333); font-size: 15px; line-height: 1.35; margin: 0px auto 62px; max-width: 600px; padding: 28px; position: relative; width: 600px; z-index: 9;">
<div id="front" style="margin: 0px auto; width: auto;">
<div style="text-align: left;">
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.</div>
<div style="text-align: left;">
Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.</div>
<div style="text-align: left;">
<br /></div>
<div id="buttons" style="border-collapse: separate; border-spacing: 0px; display: table; width: 600px;">
<div class="row" style="margin: 0px auto;">
<a class="circle" href="https://panopticlick.eff.org/tracker" id="trackerlink" style="background-color: #f58528; border-radius: 6px; box-shadow: rgb(170, 206, 244) 0px 0px 1px; color: white; display: block; font-size: 28px; font-weight: 800; height: 58px; line-height: 58px; margin: 0px auto; text-decoration: none; text-shadow: rgb(245, 133, 40) 0px 1px 0px; text-transform: uppercase; transition: background-color 0.16s; vertical-align: middle; width: 176px;" target="_blank" title="Click here to test how trackable your browser is">TEST ME</a></div>
</div>
<div style="text-align: left;">
<span style="line-height: 1.35;"><br /></span></div>
<div style="text-align: left;">
<span style="line-height: 1.35;">Panopticlick is a research project of the <b><a href="https://www.eff.org/" target="_blank">Electronic Frontier Foundation</a></b>. </span><a href="https://panopticlick.eff.org/about" style="color: #f58528; font-weight: 700; line-height: 1.35; text-decoration: none;">Learn more</a></div>
</div>
</div>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-19998826246862666662015-12-14T23:04:00.001+05:302016-02-03T05:12:31.346+05:30Security Features Check !!! <div dir="ltr" style="text-align: left;" trbidi="on">
<h1 class="uk-article-title" style="background-color: white; color: #333333; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 32px; font-weight: 300; line-height: 41px; margin: 0px 0px 25px;">
<span style="color: #666666; font-family: "arial" , "helvetica" , sans-serif; font-size: 14pt; line-height: 22px;"><div style="text-align: justify;">
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300;">
<span style="font-size: 18.6667px; font-weight: 300; line-height: 22px;">The</span><span style="font-size: 18.6667px; line-height: 22px;"> Anti-Malware Testing Standards Organization (AMTSO™) </span><span style="font-size: 18.6667px; font-weight: 300; line-height: 22px;">was founded in May 2008 as an international non-profit association that focuses on the addressing the global need for improvement in the objectivity, quality and relevance of anti-malware testing methodologies.</span></div>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300;">
<span style="font-size: 18.6667px; font-weight: 300; line-height: 22px;"><br /></span>
<a href="http://www.amtso.org/wp-content/uploads/2015/04/feature1.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="" border="0" class="alignright wp-image-1284 size-full" src="http://www.amtso.org/wp-content/uploads/2015/04/feature1.jpg" height="236" style="border: 0px; box-sizing: border-box; display: block; height: auto; max-width: 100%; text-align: justify; vertical-align: middle;" width="380" /></a><span style="font-size: 18.6667px; font-weight: 300; line-height: 22px;">The website hosts a number of easy to use tools to ensure that endpoint security products are configured to protect you from viruses, drive-by-downloads, potentially unwanted applications (PUA), archived malware and phishing and cloud attacks across major operating systems both desktop and mobile.</span></div>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300;">
<span style="font-size: 18.6667px; font-weight: 300; line-height: 22px;"><br /></span></div>
<div style="text-align: justify;">
<div style="font-family: roboto, helvetica, arial, sans-serif;">
<span style="color: #333333; font-size: 18.6667px; font-weight: 300;">Feature Settings Check for your favorite Anti-Malware Desktop solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.</span><br />
<span style="color: #333333; font-size: 18.6667px; font-weight: 300;"><br /></span></div>
</div>
<ul style="color: black; font-family: 'Times New Roman'; font-size: medium; font-weight: normal;">
<li><b style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;"><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.amtso.org/feature-settings-check-download-of-malware/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Download of Malware">Test if your protection against the manual download of malware (EICAR.COM) is enabled</a></span></b></li>
<li><a href="http://www.amtso.org/feature-settings-check-download-of-malware/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Download of Malware"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against the manual download of malware (EICAR.COM) is enabled</span></b></a></li>
<li><a href="http://www.amtso.org/feature-settings-check-drive-by-download/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Drive-By Download"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against a drive-by download (EICAR.COM) is enabled</span></b></a></li>
<li><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.amtso.org/feature-settings-check-download-of-compressed-malware/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Download of Compressed Malware">Test if your protection against the download of compressed malware is enabled</a></span></b></li>
<li><a href="http://www.amtso.org/feature-settings-check-potentially-unwanted-applications/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Potentially Unwanted Applications"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against the download of a Potentially Unwanted Application (PUA) is enabled</span></b></a></li>
<li><a href="http://www.amtso.org/feature-settings-check-phishing-page/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Phishing Page"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against accessing a Phishing Page is enabled</span></b></a></li>
<li><b style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;"><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.amtso.org/feature-settings-check-cloud-lookups/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Cloud Lookups">Test if your cloud protection is enabled</a></span></b></li>
</ul>
<div style="font-weight: 300;">
<span style="color: #333333; font-family: "roboto" , "helvetica" , "arial" , sans-serif; font-size: 18.6667px; font-weight: 300;"><br />Feature Settings Check for your favorite Android based Anti-Malware Solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.</span><br />
<span style="color: #333333; font-family: "roboto" , "helvetica" , "arial" , sans-serif; font-size: 18.6667px; font-weight: 300;"><br /></span></div>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300;">
<span style="font-size: 18.6667px; line-height: 22px;"></span></div>
<ul style="color: black; font-family: 'Times New Roman'; font-size: medium; font-weight: normal;">
<li style="text-align: justify;"><a href="http://www.amtso.org/feature-settings-check-download-of-malware-for-android-based-solutions/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Download of Malware for Android based Solutions"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against the manual download of malware is enabled</span></b></a></li>
<li style="text-align: justify;"><a href="http://www.amtso.org/feature-settings-check-drive-by-download-for-android-based-solutions/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Drive-By Download for Android based Solutions"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against a drive-by download is enabled</span></b></a></li>
<li style="text-align: justify;"><a href="http://www.amtso.org/feature-settings-check-potentially-unwanted-applications-for-android-based-solutions/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Potentially Unwanted Applications for Android based Solutions"><b><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;">Test if your protection against the download of a Potentially Unwanted Application (PUA) is enabled</span></b></a></li>
<li style="text-align: justify;"><b style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;"><span style="color: #3d85c6; font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.amtso.org/feature-settings-check-phishing-page-for-android-based-solutions/" style="background: transparent; color: #668cc6; cursor: pointer; text-decoration: none;" title="Feature Settings Check – Phishing Page for Android based Solutions">Test if your protection against accessing a Phishing Page is enabled</a></span></b></li>
</ul>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300;">
<span style="font-size: 18.6667px; font-weight: normal; line-height: 22px;"><br />NOTE:<i> None of the files downloaded nor pages visited are malicious by any means. It is only by industry-agreement that these innocent files are detected, solely for the purpose for the users to verify that their Android based Anti-Malware Solution is configured correctly and reacting as expected</i></span></div>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300; line-height: 22px;">
<br /></div>
<div style="color: #333333; font-family: roboto, helvetica, arial, sans-serif; font-size: 14pt; font-weight: 300; line-height: 22px;">
<br />
<h3>
<span style="color: #666666; font-family: "arial" , "helvetica" , sans-serif; font-size: 15px;"> SOURCE:<br /><span style="color: #666666; font-family: "arial" , "helvetica" , sans-serif; font-size: 15px;"><i>.</i></span><a class="tm-logo-small" href="http://www.amtso.org/" style="background-attachment: initial; background-clip: initial; background-color: #fafafa; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; cursor: pointer; letter-spacing: -0.31em; text-align: center; text-decoration: none;"><img alt="Amtso" class="uk-responsive-height" src="http://www.amtso.org/wp-content/uploads/logo.png" height="69" style="border: 0px; box-sizing: border-box; height: auto; max-height: 100%; max-width: 100%; vertical-align: middle; width: auto;" width="200" /></a></span></h3>
</div>
</div>
</span></h1>
<div style="text-align: justify;">
<div style="text-align: left;">
<div style="background-color: white; color: #666666; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 15px; line-height: 22px; margin-top: 25px;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">
</span></div>
</div>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-8282202262047230202015-01-23T22:14:00.001+05:302015-01-23T22:25:22.887+05:30 Google reveals 3 Apple OS X Zero-day Vulnerabilities<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="VwVwbf" style="padding: 15px;">
<div class="rCauNb" style="color: #404040; font-family: Roboto, arial, sans-serif; line-height: 1.4;">
<span style="color: #404040; font-family: arial, sans-serif; line-height: 30px; text-align: justify;"><span style="font-size: x-large;">P</span><span style="font-size: 15px;">roject Zero has yet again revealed three more zero-day vulnerabilities this time on OS X. </span></span><span style="font-size: 16px; text-align: justify;"><span style="color: #404040; font-family: arial, sans-serif;"><span style="font-size: 15px; line-height: 30px;">The team has published three zero-day exploits for Apple’s OS X, with sufficient information for an experienced hacker to exploit the bugs in an attack. The details about the zero-days were released after alerting Apple to them. All three require physical access and cannot be exploited remotely.</span></span></span><br />
<div style="font-size: 16px;">
<span style="background-color: white; color: black; font-family: arial, sans-serif; font-size: 15px; line-height: 30px; text-align: justify;"><br /></span>
</div>
<div class="sp ej xI A8Hhid" style="color: black; font-size: 13px; height: 263px; line-height: 0px; max-height: 263px; min-width: 70px; overflow: hidden; position: relative; text-align: center; width: 426px;">
<a class="d-s ot-anchor Ks" href="http://thn.li/ryud" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank"><img class="ar Mc" itemprop="image" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEicEK3liLceubmEm-AabZhbZHDGUGeaeuaaoIsAZ0RGizl8m16UtZh94DaPANsuXr1x6XuXyI-eZ0uAP1G6XBRNOVmOkcu-wFPJd8NBJvqcqI5diFL5RIRbOSPtt_qRN648hlxXZQFdnzlDrT2n_2yUgqnqE93hRSrQQeWFz4OTdztqFsOcdxweTFYmd8LubmTlWlnX6ahqHrEx9XeNnEenFwTYsc1FxuwCxpb8lHp9oUxa=w426-h263" style="border: 0px; bottom: 0px; display: block; left: 0px; margin: auto; max-height: 263px; max-width: 426px; position: relative; right: 0px; top: 0px;" /></a><br />
<div class="iGqbIb" style="background-image: url(https://ssl.gstatic.com/s2/oz/images/sprites/embeds_article_v2-aa76e8105f4ad58f58b33da824ba2dc0.png); background-position: 1px 0px; background-repeat: repeat no-repeat; height: 16px; margin: -14px; position: relative;">
</div>
<a class="d-s ot-anchor Ks" href="http://thn.li/ryud" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank">
</a></div>
<div class="VwVwbf" style="color: black; font-size: 13px; line-height: 1.4; padding: 15px;">
<div class="rCauNb" style="color: #404040; font-size: 16px;">
<a class="d-s ot-anchor" href="http://thn.li/ryud" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank" title="Google reveals 3 Apple OS X Zero-day Vulnerabilities">Google reveals 3 Apple OS X Zero-day Vulnerabilities</a><br />
<br />
<span style="background-color: white; color: black; font-family: arial, sans-serif; font-size: 15px; line-height: 30px; text-align: justify;"><i>Google's Project Zero is an initiative that identifies security holes in different software and calls on companies to publicly disclose and patch bugs within 90 days of discovering them. The company’s tight 90-days disclosure policy encourages all software vendors to patch their products before they could get exploited.</i></span></div>
</div>
</div>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1332826549524423252015-01-16T18:35:00.000+05:302015-01-16T18:39:18.448+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="sp ej xI A8Hhid" style="background: rgb(255, 255, 255); color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; height: 235px; line-height: 0px; max-height: 237px; min-width: 70px; overflow: hidden; position: relative; text-align: center; width: 426px;">
<a class="d-s ot-anchor Ks" href="http://www.extremetech.com/mobile/197005-new-apple-malware-is-undetectable-unstoppable-and-can-infect-any-thunderbolt-equipped-device" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank"><img class="ar Mc" src="http://www.extremetech.com/wp-content/uploads/2015/01/Thunderstrike-3.jpg" itemprop="image" style="border: 0px; bottom: 0px; display: block; left: 0px; margin: auto; max-height: 237px; max-width: 426px; position: relative; right: 0px; top: 0px;" /></a><br />
<div class="iGqbIb" style="background: url(https://ssl.gstatic.com/s2/oz/images/sprites/embeds_article_v2-aa76e8105f4ad58f58b33da824ba2dc0.png) 1px 0px repeat-x; height: 16px; margin: -14px; position: relative;">
</div>
<a class="d-s ot-anchor Ks" href="http://www.extremetech.com/mobile/197005-new-apple-malware-is-undetectable-unstoppable-and-can-infect-any-thunderbolt-equipped-device" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank">
</a></div>
<div class="VwVwbf" style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 1.4; padding: 15px;">
<div class="rCauNb" style="color: #404040; font-size: 16px;">
<a class="d-s ot-anchor" href="http://www.extremetech.com/mobile/197005-new-apple-malware-is-undetectable-unstoppable-and-can-infect-any-thunderbolt-equipped-device" rel="nofollow" style="-webkit-transition: color 0.218s; color: #427fed; cursor: pointer; outline: none; text-decoration: none; transition: color 0.218s;" tabindex="0" target="_blank" title="New Apple malware is undetectable, unstoppable, and can infect any Thunderbolt-equipped device | ExtremeTech">New Apple malware is undetectable, unstoppable, and can infect any Thunderbolt-equipped device | ExtremeTech</a></div>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-3971540168707452972015-01-16T17:54:00.000+05:302016-02-03T05:08:48.424+05:30Malwarebytes Anti-Exploit!<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/34rrjkRkj1s" width="560"></iframe><br />
<br />
<div style="text-align: justify;">
<span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><i>"Popular software programs contain millions of line of code. Hackers exploit flaws (vulnerabilities) in the code to deliver malware. Except when they can't. Malwarebytes Anti-Exploit wraps four layers of security around popular browsers, preventing exploits from compromising vulnerable code. Not an antivirus, and compatible with most antivirus, Malwarebytes Anti-Exploit is a small, specialized shield designed to protect you against one of the most dangerous forms of malware attacks. And it's free."</i></span><br />
<span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><i><br /></i></span>
<span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><i><br /></i></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.malwarebytes.org/antiexploit/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjlfqAD744oC5t3WQNcDPakqq0rL3qSGUrfqoLkENyWxUkjFZlZQB-CrF51F8cNsl18z4cG-F81NcKvZ9SxbIEILxasu7WO4YKDi7cXBJjh1gQOY9XceoV45rGvXhldSkFCednTA/s200/robot.png" width="139" /></a></div>
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><br /></span></b>
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><br /></span></b>
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><br /></span></b>
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;">Better and faster compared to running the browser in a sandbox. A</span></b><b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;">vailable only on Windows.</span></b><br />
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><br /></span></b>
<b><span style="background-color: white; color: #484848; font-family: "lato" , "helvetica" , "arial" , sans-serif; font-size: 16px; line-height: 24px;"><a href="https://www.malwarebytes.org/antiexploit/" target="_blank">Download >></a></span></b></div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-60709356407329572712015-01-16T00:02:00.003+05:302015-01-16T00:08:34.004+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
<a href="http://www.systemlookup.com/" target="_blank"><span id="goog_1340343421"></span><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisibuTGPhF3OZi511jZj5puaTxQZynxLro70OleCfeXJN8FFV-08FklrFiyHmnUDE6Ph3gBUWVPPMPR769CvImaSAPlpSc6eFOcKo-jHnIwv7qQ_gZ9QdRcoXtsNT3O0uppCfXnw/s1600/www.systemlookup.com.png" height="126" width="320" /></a><span id="goog_1340343422"></span></div>
<br />
<i style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;"><a href="http://www.systemlookup.com/"><b>www.SystemLookup.com</b></a> hosts a collection of lists that provide information on the components of legitimate and potentially unwanted programs. They are maintained by superb members of the Internet community, for the benefit of the community at large.</i><span style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;"></span><br />
<span style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;">
</span>
<br />
<div>
<br /></div>
<span style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;"></span><br />
<div>
<span style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;"> + Check out this kool script (in python) <a href="https://github.com/katjahahn/SystemLookup">https://github.com/katjahahn/SystemLookup</a> that parses to the site.</span></div>
<span style="background-color: white; color: #444444; font-family: arial, helvetica, sans-serif;">
</span></div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-48859766344290555732015-01-09T05:59:00.004+05:302015-01-09T06:02:41.462+05:30<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="unit mrgnRgtXLG" style="float: left; margin: 0px 20px 0px 0px; padding: 0px;">
<img alt="ISTR Annual Report" src="http://www.symantec.com/content/en/us/enterprise/images/security_response/b_ISTR19_Annual_Report_hero.png" height="246" style="border: 0px; margin: 0px; padding: 0px;" title="ISTR Annual Report" width="280" /></div>
<div class="unit size2of3 lastUnit" style="float: none; margin: 0px; overflow: hidden; padding: 0px; width: auto;">
<h2 style="color: #444444; font-size: 16px; margin: 0px; padding: 0px;">
2014 Internet Security Threat Report, Volume 19</h2>
<div class="mrgnTopMD fontXLG" style="font-size: 14px; margin: 10px 0px 0px; padding: 0px;">
The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.<br />
<br />
<div class="btnGreen" style="background-color: #ededec; color: #444444; float: left; font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: 15px; margin: 0px; padding: 0px;">
<a href="http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf" style="background-color: #72a826; color: white; display: inline-block; font-weight: bold; padding: 4px 5px;" target="_blank">DOWNLOAD MAIN REPORT</a></div>
<div class="clear" style="background-color: #ededec; clear: both; color: #444444; font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: 15px; margin: 0px; padding: 0px;">
</div>
<div class="mrgnTopSM textCenter fontSM txtLgtGray" style="background-color: #ededec; color: #777777; font-family: arial, helvetica, sans-serif; font-size: 12px; margin: 5px 0px 0px; padding: 0px; text-align: center;">
Overview and Analysis<br />
98 pages, 11.5 MB (PDF)</div>
<br />
<div class="btnGreen" style="background-color: #ededec; color: #444444; float: left; font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: 15px; margin: 0px; padding: 0px;">
<a href="http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v19_221284438.en-us.pdf" style="background-color: #72a826; color: white; display: inline-block; font-weight: bold; padding: 4px 5px;" target="_blank">DOWNLOAD SUPPLEMENTAL DATA</a></div>
<div class="clear" style="background-color: #ededec; clear: both; color: #444444; font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: 15px; margin: 0px; padding: 0px;">
</div>
<div class="mrgnTopSM textCenter fontSM txtLgtGray" style="background-color: #ededec; color: #777777; font-family: arial, helvetica, sans-serif; font-size: 12px; margin: 5px 0px 0px; padding: 0px; text-align: center;">
Additional Stats and Information<br />
116 pages, 3 MB (PDF)</div>
</div>
<div class="line mrgnTopXLG" style="margin: 20px 0px 0px; overflow: hidden; padding: 0px;">
<div class="unit size2of2 lastUnit" style="float: none; margin: 0px; overflow: hidden; padding: 0px; width: auto;">
</div>
</div>
</div>
</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1290672648044818092015-01-08T21:25:00.001+05:302015-01-08T22:04:10.740+05:30Android - NoRoot Firewall<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;">
<img border="0" src="http://1.bp.blogspot.com/Eo7y02OP6nsOqTx-MsYORxLsIXltk-_0DQUkNztdPUrr_2ZIoR_RgaDXt3y6qrcdIT4=w300" height="100" width="100" />
</div>
While there are many firewalls including ones packaged in Antivirus apps they all require your Android devices to be rooted As the leading mobile OS Android should have an inbuilt firewall until then we hav <a href="https://play.google.com/store/apps/details?id=app.greyshirts.firewall"><b>NoRoot Firewall</b></a> the app ingeniously uses the Android inbuilt VPN feature to provide filter access to apps onboard your device and due to this the app doesn't need your devices to be rooted as name suggests.</div>
Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-41691823350992624612010-04-17T11:52:00.000+05:302010-04-18T00:02:34.571+05:30iPhoned..<p><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="IMG_0045" border="0" alt="IMG_0045" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQA0dqHa-LnyFLcZZanQQJuqpE6nC4x0Emr84DWDuf4mrSDIXTyYueJdgfSfrhCir6sDzWG3V5_WUO9SotgEPihlmavUmTx09xnvKAa_6pXLe_1jxvtW0VLKdWQt3yCDCwOS4YZA/?imgmax=800" width="322" height="482" /> </p> <p>A simple javascript to point the blog to its feed when opened via iPhone and rest is taken care by apple. (reader.mac.com). <em>check out the source for the code.</em></p> <p><font color="#0000ff"><strong><em>Anyone noticing a conundrum in this post.. lol.</em></strong></font></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-66169696688189662352010-04-16T11:45:00.001+05:302011-06-30T10:25:16.936+05:30thats why.. lol…<p><img style="border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="superheroes" border="0" alt="superheroes" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1E7NpwUNFY90JzHw58T7M_lAlRgGzBftwgEY-tQnpcpmYdmyaKYYmgxliB4NWfS1uPzHnTCJ9wEqNx3u6KBZVk-CJX0tucXdfS8bhdWfXA-QLGGOUN3OyXA380iynLclkKBL_Gg/?imgmax=800" width="586" height="566" /></p>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-88093788710001304952010-04-09T13:10:00.004+05:302010-04-17T12:11:35.591+05:30Panda Cloud Antivirus !!!<img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" alt="" align="left" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFdFyXxr76kHJa4LCzOHCW1M19KkxFkUIovMMF0p8R_XkFzc3lCUc-8hgRjPjXV-lMrGOuYhdNYI_0LtUearL7nnXFKVThzkOP96lehCwlYgBGPaHi2M4Otbj_SVuKn19rVeitcQ/?imgmax=800" /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUFEysOkkM5WO5_lwUenXC4W8jPNZqqUqERxACY-6DT09_yu4b3vrN-6TCdJnLypI8CDErMQ_FQ7l0VoI4LnQjkuoJqQwP-tw-ftZxy63WW8dZgBUmu7DIcCj1KBF65jtYldHMUw/s1600-h/Untitled0%5B1%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRpMM_poEAEFMJEnN3aKuy_3bj_MqqkRR0n_Jg_QKprtHQP6upTsugnmBetLLRLbYkG232p5VOoxuydG4ceUGeidu3KGsEuUdvEcUedZ0mFEdW93MNtSCCzzKyuCRiH9dpAtBW_g/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKnN-fGIsuKRUCsJ8TDwK8y-FdGshdNDjaTU9ZSF_DvLGnGBaAULQqT_hB7nTuxD8OYiTkU8c4PY-1p47DStywCk3kV4rWXqEka8wdw40MTVza-5yKCmAK5SJsqgBdsnlmZ9hz0g/s1600-h/Untitled%5B1%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5zNBTmyJJQP7BuBgEeNM6kTEPC4SxLUkr3Lz6bdG2-2T9Q_KS_szbiHNLxc4rk4-6esgiYE25_lQhgFxN6XPpvEqoGT2LKOh0S3jn1JiLAkc6d2mUHFG-bBPQ5bFZsWDWF4yWOQ/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmrZsejtYTfmkDErkMjHZq8MsXpkLMHblwyw6IWgAWUfApTlK_aK5PEpwD7pDzX7h5JJRQ3XMrotO0R-0KHDja0JdGam_IfHifP1GRCuXiZcJHGKNeThT-KJ1mFbY9oUFvVxFMjw/s1600-h/Untitled2%5B7%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix8dZF8DRuLCfmv70vKX7x4fK4z-FqBVnP0JzbEaFAapj6Qr0zmcLQva-3MRoazoK-4NyjSkWTq2Y7_xcXUjAavwxHVki5Un8S-zZgzv4bBPjFO3UBEWGK0rsvCtyLrUAGa58Ksw/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5bflusMbijhW5LkH1aKpuYeAPlaPkNQZl4RfwkIavrp8k2D_77OmCkw4JdhWKZKvYy2OGv-R-svHgv7MAecOMzp_mM_cMaROg8Sx3prtvXyVmUZ01op8EQMLPxlTKP2nTVx6a6Q/s1600-h/Untitled3%5B1%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBh5lSL7VoRhr6odrYSbfUT7Qdylpj9WcBDtgzV6MDnry8lBvyLZ-aya4_u8OEJtu_-KHAANmlUw8MElEYvuA4t3cZ2zbni4M1Gn1M5ASlOqIPEuhaEIQV8NjsCeuCJHLPYzaRkQ/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_ZQW2ZP92lwvGx0S2Xt7A9A6fQjW3jQUgKEzcVnZnSmI5DbFmVqhkL2Yq-BxWAj7daoL8MwCNxOSlENWvebfjtpoAYnAMRGEWCFcdOuQOJ9e-MDOWUTsvwqh_SZrRDnAMN5miIg/s1600-h/Untitled4%5B2%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYd5uZdDZHYmG0EUpwv93F3-e_Di4X6VabbRxJwvm4DpGT0ozlgwqnM8tY3ewlqnmAXsC0bkHlLSsQs8Qzz_tRx-LHYkcHEJK1yaQWdT3sm5RJCwp-l3Z0ysnN42_wYyPcjuqDYg/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd2rYaEauGcrESYyZBFJ0OOW5muFIppPo1ZPoQEWFgDpzGXfPJ2A-UW0ptxrJqy4gVxlqsGKyQyAJxW0gp7telgyPvK8aAbw2ZpUyHak0MudDyIHOFtUwoWsX0jgMhCSuWToksog/s1600-h/Untitled6%5B2%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsKAsNC_-H9BJAwMWCtcNZR3BX4NI8jUtXafEZ8KtZy3nI8pWp2n4Ek9oQvrahn66J2jTotkOeJzwtFue3A2hg6SBuL94m4C8TkJnqIOmVCSPDUOb6sTKXA9HH1Ah6h3iUPb2eww/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlHL3AkatHxOHtHPDbHk_qzYs1cQ0aaSJNGJoV0f6HrcofbW35etVWuokjw6RYaxdZlNtFJ1ko7WX-tb_u4ZPFct08UGZjXbOKCCOwBZPG5z6jWrRMWC6fhdw2XPr-SD8peqD7Mw/s1600-h/Untitled7%5B2%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOp1TLohwc5A_wkFQlCBJSnWZM2ynMeX9YJn83lg_FvABMpmXXtm55cr4JBbLPXHR85nun0iYPskRsEpbkIZNi9m6nynvqZrb0a30witef-Iq8K_DsWa6XZFSzRugHJObXY-_5iA/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9xWU7Q9SLHZBw1cHnlyIrpjV1lAbXiQ4uWGQBLw2_RveklnFpvIN2jPCeNA4p4E7UGZ_drLk9-285J8jCuD8vZ7nRMoPhXfIdRA-U2x5IwBKCscrj4VlJbvQow6t9I3oOhDsz0Q/s1600-h/Untitled2%20(3)%5B1%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLRITayYg3bs8vxogfzcD8pS9wjR32Ti1OtBzosbhj3_zXr9tWUzWunvA0kKxvY7QBNasBKmlH4XvfaQmM-G6-ySLh5H94Gvi_unBWqcgpQ5nS_D_Dq-C-cZMAdUTPUBxLrGvgw/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigOqXWdCt2RimDmAIe8Yp9gWaloHD-RVP5cVJB2kx7FN1fXrOg6u7sm2z8GMXsVOEJgRDzA2VYKUOAlMgqPF7L0Po1alfybGB49zOQD-LmOp__woneHivHmqMRtkln174HeKUP5Q/s1600-h/Untitled%20(3).png" target="_blank"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Y7usoY4VVFZfqJwTHY6KwgBY5jHpePwhLubw4jpgKm_NpRUthjjMPPQ0fLiqU2rm-6DpNp9v2zI15MkD5JmTMM9Jzv5KNjFjKI9n8kmlN7z1UlCpaMx-SHvKgL08_NohtW-eng/?imgmax=800" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcOYnFpbkyBuJ5lzDe-1QtIgcdoAFz9suuWxA81G4j8wtq49svsi3BBQmJb7xYVC6RigxuLD48bHB9y7u8FGyxoXAaDTlGU7mQPrvrhkfTHwcoVUB9epngt6c45rGuyaQEOkJBGw/s1600-h/Untitled2%5B6%5D.png"><img style="border-right-width: 0px; margin: 0px 5px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDhaAQTQ-ypjCEFGwLepxthB1qYuLgU8-Mtt04yi04f330FLb8FMWMWo4tfR3SI8CvD3i336-juoy9Ret2NKF-U85QyufqAo4JbHrmqY1nDDAPsf1pUCIUqbMke-Wn6DOKanMLcg/?imgmax=800" /></a> <br /> <p align="right">Interesting! Confusing! and Free!    <br /><em>thinking.. Jedi vs Seth ~ Cloud vs BotNET, lol…</em></p> <p align="justify"><strong><a href="http://www.cloudantivirus.com/" target="_blank">Panda Could Antivirus</a></strong>, an  interesting, a bit confusing free antivirus solution,  Would have been nice if i dint have to <strong>UNINSTALL EXISTING ANTIVIRUS TO INSTALL PANDA CLOUD!!!<em> </em></strong>I hate it when AV’s do that!!! so try only if you have time and patience to… Uninstall – Reboot – Install – Possibly a reboot - Reinstall - Definitely a reboot – Done… or are you ? Any major <em>OS updates resets the AV into reinstalling it,</em> this may drive you crazy or you may just wanna try it on a VPC would be great if your VPC is slow. I would consider this an experimental build or a beta at best! and hence wouldn’t want this alone on my pc. but true to its word it does have a very low memory footprint 2MB!!! wow!!! and panda is a good AV, but Cloud obviously needs to be connected to work better and this is bad!!! <em>Remember worms do block websites so that they cannot be cleaned!!!</em> Not too bad it only asked to be connected sometimes in random, <em><font color="#9b9b9b">Panda: “aah... well i dont let you get infected in the first place and if u do i have a command line scanner too but no no other antivirus allowed !!!“ bad panda! lol…</font></em></p> <p align="justify"><em><strong>First Impressions:</strong></em> the look is pretty dumb there is nothing, absolutely nothing to configure! You wouldn’t even know if it can scan archives,<em> it doesn’t;</em> if its workin<em> and it does work!! </em>Other than assuming the user to be dumb, well <em>what else to assume with a dumb looking UI, no documentation to make sense how it works rather than what it is!  Searching forums help </em><a href="http://www.cloudantivirus.com/forum/thread.jspa?threadID=51101&tstart=0" target="_blank"><em>here</em></a>! Think its an ok solution but a lot of scope for improvement and a has a great potential to be, <em>Need to Evolve More lol.. </em>May be this is how we can get rid of all the junk <em>(bots, worms, trojans, viruses; well they are toxic waste of the cyberspace). </em>Think of the collective finds!!! Well atleast panda’s gonna have a huge collection of sure shot signatures as a rain/result from this cloud! Anyways Avira’s back (installed it after installation of panda lol…) and both are running pretty good, not much load at all! Avira and Panda keeping watch together, <em>Panda</em> holding an <em>Umbrella lol…</em></p> <div align="justify">Well a Cloud Antivirus is probably good for systems on enterprise networks (always on, always connected and clean network) And for PC ? may be.. </div> <div align="justify"> </div> <div align="right"><img style="border-right-width: 0px; margin: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="" border="0" alt="" align="right" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi15jQ_CyNNXLtyCE5lSk5VF7aZt9oJcygYXsKqhprI9xoXn8nlgj-mmNPXrTQIKk3w1OIbWxcnVJOyKKhAkKEX5Kt8-kTJ3Ejc7F4OCKuR7V26mlOQoFvkHefnwUFuJkhZ3711aA/?imgmax=800" width="16" height="21" />I do like the panda icon on my taskbar ;)       </div> <br /> <br /> <br /> <p align="left"><span style="color: blue"><strong><em>Thought:</em> Was it a Cloud or a botNET that SKYNET spreads into… let me know when t1000 arrives!!!</strong></span></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-57874551459638232862010-04-05T01:10:00.001+05:302010-04-11T01:12:44.251+05:30BEST BROWSER (*FIREFOX) ADDONS!!!<p>If you don’t already have these two set them up at once!</p> <p align="justify"><a href="http://noscript.net/" target="_blank"><img style="border-bottom: 0px; border-left: 0px; margin: 0px 10px; display: inline; border-top: 0px; border-right: 0px" title="www.noscript.net" border="0" alt="www.noscript.net" align="right" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiJsvKYPpjGQbfiAoawLZHJVYf_S3HTALqTR1FBUcPHqDZAFnJx4lGErYjtpOjTDFMBGx5T4nvJa3C974dS_oCcyNN1e0-4kAyLx-wMV3e-dzQI6qguRBxxKLc24T0cdW066bPpQ/?imgmax=800" width="75" height="91" /></a><strong>NoScript:</strong> The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java and Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank), and provides the most powerful Anti-XSS protection available in a browser.</p> <p><a href="https://addons.mozilla.org/en-US/firefox/addon/722" target="_blank">https://addons.mozilla.org/en-US/firefox/addon/722</a> </p> <p> </p> <p><a href="http://adblockplus.org/en/" target="_blank"><img style="border-bottom: 0px; border-left: 0px; margin: 0px 10px; display: inline; border-top: 0px; border-right: 0px" title="www.adblockplus.org" border="0" alt="www.adblockplus.org" align="right" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFeMyVHGxXmz7o1WFY_zEBh_DhIDh68KVZ5eRMcR8wofQClo1KP3E-Yugp-pGIouZlp_3jxqrR2INf1vvJnR1NnPDJrmPLcGQ3mH3bncsQA971jcQxhakMoTOhEvmU3Fg-TRIJEA/?imgmax=800" width="75" height="91" /></a></p> <p align="justify"><strong>AdBlockPlus:</strong> Annoyed by adverts? Troubled by tracking? Bothered by banners? Install Adblock Plus now to regain control of the internet and change the way that you view the web. You can also choose from over forty filter subscriptions to automatically configure the add-on for purposes ranging from removing online advertising to blocking all known malware domains.</p> <p><a href="https://addons.mozilla.org/en-US/firefox/addon/1865" target="_blank">https://addons.mozilla.org/en-US/firefox/addon/1865</a> </p> <p> </p> <p align="justify"><a href="http://www.mywot.com/" target="_blank"><img style="border-bottom: 0px; border-left: 0px; margin: 0px 10px; display: inline; border-top: 0px; border-right: 0px" title="www.mywot.com" border="0" alt="www.mywot.com" align="right" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgte8TVw-C-x6KRHfapJD4VGS8NXpR0FL6EdULGNoZ-5jY6nyb4I3Zt8CJy8Hbmx_tr3lmIE7fJI003cYQbspSa4P71BbXmjt0A36Bhlu4H9t6GeiRyfZO7nEmiIW8kNspeHZnbVg/?imgmax=800" width="75" height="61" /></a><strong>WOT (Web of Trust):</strong> Would you like to know which websites you can trust? The WOT add-on is a safe surfing tool for your browser. Traffic-light rating symbols show which websites you can trust when you search, shop and surf on the Web. Protect yourself from online scams, sites with adult content, spam and other Internet threats. </p> <p><a href="https://addons.mozilla.org/en-US/firefox/addon/3456" target="_blank">https://addons.mozilla.org/en-US/firefox/addon/3456</a></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-87020823578705288092010-04-04T22:44:00.003+05:302010-04-05T20:26:51.226+05:30BORG!!! BOT!!! FIGHT!!!<p><strong><img style="border-right-width: 0px; margin: 0px 10px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="220px-Picard_as_Locutus" border="0" alt="220px-Picard_as_Locutus" align="left" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXsQJQIebeGMQ8X1PhTPSl8-HC8NP5qWlL243xYUHEBNmXL_I8m3FFElSig2BJA4qNB-twRor617qNKxh4XcSZt51_5gPjgHxVU5Q7nwn6Z9oESkFGXyD5JovNqdY5p3HwuWm8Dg/?imgmax=800" width="98" height="77" /></strong></p> <p><strong>  <br />  <br />We are the Borg! You will be Assimilated! Resistance is futile! <br /></strong><font color="#ff0000">Is your PC <s>BORG</s> BOT ? Just the Same!!! Just the Evil!!! </font></p> <p align="justify">I dint quite came around talking about Bots before so here it is: In one of my boredom experiments i tested a new install (vista, not a test install but that’s another story, lots of others too soon..) just to see how just how long it takes to get a pc botted and surprisingly it went well i dint disable the inherent security features the OS comes with (Defender, UserAccessControl, Firewall) nor added any additional security features. It was not untill i disabled the UserAccessControl <em>(Don’t do that! if u hate UAC nag screens like i do install security solutions and use limited account / UAC was disabled because i was impatient and i intended on getting the system infected faster not because it was 100% foolproof although an admirable feature security features should not be a nag)</em> nyways it dint take long to get infected, Infection started from a legit file sharing site hosting a infected javascript file! ~ErrorBadMemoryRecallFailure~ another reason i should be blogging more! Viruses, Worms (check previous posts for them) and even <strong>Bots</strong> were ON within a few minutes of dumb surfing…</p> <blockquote> <p align="justify">  Btw, OpenDNS lets you know if you are botted: <br /> <img border="0" alt="[botnet[3].jpg]" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGQ_tx11XI072wAcl20wHUnYtEQD-C20JoPv4gPRRj-06ilRZEq61sFIxN3V28CZifW-Nurq1cH5oihlkCKWIjJnmGq0utz8WR6TJMMJZcIWPqB62Tw3l8xcsFUP92FYYx0Ezokw/s1600/botnet%5B3%5D.jpg" />  </p> </blockquote> <p align="justify">BotNET’s are growing more and more they are considered a more lucrative business in underground communities, not that difficult to imagine why? There’s no direct link between the worm bot and the creator nor it would directly be causing menace no fear of a bounty on their heads no easy way to trace b’caz they are not profited directly, (not sure but i don’t think the bot will be silent if you are typing a 15,16 digit code (your cc number)) you are sold as a hive (millions of infected pc ~ a borg collective?) to do their bidding for just a few thousand dollars! implies each bot pc (<em>well its no more your pc) </em>is cheaper than a penny check out how spam works when <em>Click Online</em> acquires a botNET: </p> <p><object width="512" height="400"><param name="movie" value="http://news.bbc.co.uk/player/emp/external/player.swf"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><param name="FlashVars" value="config_settings_showUpdatedInFooter=true&config_settings_showPopoutButton=false&playlist=http%3A%2F%2Fnews%2Ebbc%2Eco%2Euk%2Fmedia%2Femp%2F7930000%2F7938500%2F7938503%2Exml&config=http%3A%2F%2Fnews%2Ebbc%2Eco%2Euk%2Fplayer%2Femp%2Fconfig%2Fdefault%2Exml%3F1%2E3%2E114%5F2%2E14%2E10344%5F10753%5F20090817121631&config_settings_language=default&config_settings_showFooter=true&config_plugin_fmtjLiveStats_pageType=eav6&config_settings_showPopoutButton=false&config_settings_showPopoutCta=false&config_settings_addReferrerToPlaylistRequest=true"></param><embed src="http://news.bbc.co.uk/player/emp/external/player.swf" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="512" height="400" FlashVars="config_settings_showUpdatedInFooter=true&config_settings_showPopoutButton=false&playlist=http%3A%2F%2Fnews%2Ebbc%2Eco%2Euk%2Fmedia%2Femp%2F7930000%2F7938500%2F7938503%2Exml&config=http%3A%2F%2Fnews%2Ebbc%2Eco%2Euk%2Fplayer%2Femp%2Fconfig%2Fdefault%2Exml%3F1%2E3%2E114%5F2%2E14%2E10344%5F10753%5F20090817121631&config_settings_language=default&config_settings_showFooter=true&config_plugin_fmtjLiveStats_pageType=eav6&config_settings_showPopoutButton=false&config_settings_showPopoutCta=false&config_settings_addReferrerToPlaylistRequest=true"></embed></object></p> <p align="justify">They even have a user interface to be controlled from (complete control over your the hive <em>~borg queen~</em>) Spam, Keylog (send whatever you type), Bring down a website (DDOS) Attacks (thousands of bots hit a website making it inaccessible to anybody real), other yuck, yuck, etc…</p> <p align="justify">Now if the question is what the Antivirus companies are doing well they are at work a few of the BEST can detect bots using heuristic methods but mostly antivirus depends on signatures of the viruses the way they detect them <em>in simple terms antivirus (wbc) need signatures (antibodies) to kill them, cant get simpler than that lol..</em> now its practically impossible for the antivirus companies to recognise all the virus in the world especially when these bots can not only AutoUpdate bypass firewall and fool your antivirus but also use you (your pc) as a medium to spread more to your network your mailing list and so on!!! sounds scary isn’t it it is and the worst is most of them reside at ignorant Institutions and Organizations which should be the most secure! <a href="http://www.secureblog.net/2010/04/guidelines-for-safe-computing.html">Follow these Guidelines for a safer computing!!!</a></p> <p align="right"><strong><font color="#00ff00">PS: A Pulse Modulating Phazer kills the Borg!     </font></strong></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-23427464062674865582010-04-04T22:44:00.001+05:302010-04-06T14:22:50.271+05:30GUIDELINES FOR SAFE COMPUTING:<p align="right"><strong><font color="#0000ff">Welcome to Defense against the Dark Arts.. lol!</font><font color="#00ff00">     </font></strong></p> <ul> <li> <div align="justify"><strong>Use a LIMITED Account Always!</strong> <br />If this might be of any incentive its actually faster than an Admin Account. </div> </li> <li> <div align="justify"><strong>Keep your OS and your Security Solutions Updated!</strong> <br />Do i need to say more bugs get pached so that you (your pc) are not venerable. </div> </li> <li> <div align="justify"><strong>Don't Use illegal Software or cracks and warez! (trojan’s beware!)</strong> <br />Studies show that’s how many get infected in the first place and pass on! </div> </li> <li> <div align="justify"><strong>Keep two Antivirus Solutions at hand (One Active Other on Schedule Scan <em>preferably weekly</em>)</strong> <br />Both being Active can result system slowdown! heatup! reduces your hard-disk lifespan! (as both the antivirus solutions will be fighting to scan everything parallel to what you are accessing. Nevertheless if you want them both ON use ones that are thou powerful but put on less load (like Avira) and keep a look out for two antivirus fighting between themself to kill a virus lol.. <br />PS: DONT FORGET TO DISABLE ARCHIVE SCANING IN ATLEAST ONE OF THEM!!!</div> </li> <li> <div align="justify"><strong>Use a Sandbox Software for testing new software's and solutions! <br /></strong>Two Advantages: One, keeps u safe from unwanted modifications to your system at worst an embedded virus probably not intentional by the developer but infected intentionally / unintentionally through the chain of hands it came to you (have a option of downloading than using an old copy on disk download u get newer version and less possibility of infection. Two, keeps your registry clean = faster PC. </div> </li> <li> <div align="justify"><strong>Use Community Supported Antispyware Solutions!</strong> <br />Tells you if the file you are downloading is a safe one or not! </div> </li> <li> <div align="justify"><strong>Enable DEP (Data Execution Prevention) and Use a Memory Firewall</strong> <br />Check my Previous posts on how to, only Free Memory Firewall Available is Comodo. </div> </li> <li> <div align="justify"><strong>Firewall : </strong>Windows Firewall is … <br />Gud <em>it blocks all inbound connections except ones u allow</em> its better if you are on a limited account <em>so no program tries to bypass it</em> if all the applications on your system are clean if you are not already infected if… (Argh! to many if’s) Don’t use a firewall unless it can block and filter most of the incoming and outgoing junk itself without your interference meaning Windows Firewall is good, <em>i love it for its simplicity</em> but we need better! or stay in a clean network. Windows Firewall at best is a good filter put a firewall that’s a kick ass!!! <em>if you don’t want to change use threatfire it will act like an addon increasing your security. </em></div> </li> <li> <div align="justify"><strong>Additional Security and Added Solutions are useful! <br /></strong>Sensitive data on your PC is better stored encrypted, Lock the Folders from prying eyes and programs, Denied Access or change, this can be achieved by variety of applications available free to simple settings of NTFS Access Control Lists. (Note: NFTS Encryption can be cracked)</div> </li> <li> <div align="justify"><strong>Don’t over do it! <br /></strong>Too many tools to manage ? Then use professional solutions like Avira Premium even Norton 360 will do (ya, ya, i know lol.., Symantec has improved its not a drag as much and i like its firewall) manage most of these from one console free alternatives are just as strong just as good but don't over do it remember security is essential but only to give u a pleasant experience not to give a stuck and drag experience.</div> </li> </ul> <p align="justify"><strong>Most of the security essentials are enabled by default in your operating system to prevent infections just download the rest or update/upgrade them to better..</strong></p> <p>Bottom line! (quite literally lol..) <br /><em>Follow these to prevent infections i dont want any executables downloaded into my temp folder and run no matter who what, how they browse! do you ???</em></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-5054040140040318432010-04-04T11:23:00.002+05:302010-04-04T22:21:59.984+05:30K9 Web Protection - Free Internet Filtering and Parental Controls Software<a href="http://www1.k9webprotection.com/" target="_blank"><img style="border-right-width: 0px; margin: 10px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="logo" border="0" alt="logo" align="left" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ-YyHhYxZGDeAvGVs7dFGOvTFtYtXg5PiGSukf5Sx4yMO6AjA_NS96ViCeB2nu2MPSnRMhy6cBKdfdIkB3yxIl9QXEs3IFsKBuugap70NeZQtnXrHBnfWs8xTK8W3nUCLxfkmCg/?imgmax=800" width="244" height="80" /></a> <p align="justify">I came across K9 Web Protection from Blue Coat Systems in one of my researches and was very impressed by its simplicity, its has a strong online community that not only reports hacks and methods that bypass the filter but also helps update its filters and categories. you can easily configure to block the selected categories or simply monitor the system. I love the feature where you can set the search engines to result safe searches only!</p> <p align="justify">Its Clean has a neat administration interface via browser (<a href="http://127.0.0.1:2372/">http://127.0.0.1:2372</a>) and easy to configure filters, Best of its Free has both Windows and Mac versions !!!</p> <p align="justify"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLgTzUmrwcfiE_6m86VrQyOFv7ySSZfSxH-5-j-Ag2i8LwRpxR_qLrg1xMkrNnZIHvkXsG-iGxpAuMCwb0I-N54vw9rNkdv-TcUSL9l8nC2QXewr7QE9xwHRjYoUW99kfmB0Ev4A/s1600-h/k9-startup-page%5B8%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 10px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="k9-startup-page" border="0" alt="k9-startup-page" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUzGCVo7C6G0-4PFdOqz08jZKpD7IHo_jlLQNS5YBmrlA0qnWkkeKmguK4hjKMtkq2X-mncQlCcxjwc8o4sepaQPyKeygk3ePqL05_f4tLX3Xei8Th7QeOmS8Pz7QKFtfRTzYcUQ/?imgmax=800" width="255" height="120" /></a> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaoPrEQhBO2V09XZerjOQNJiFdCuzbXy8t8PoyB5ORQAZGvNd1aY9I4TVqRBi9sCxUf7W5A2UJQJ0JTMuE8wXiP3fzEWuNrQEPL_Ulc5vlFkM2pjg-VWSFqzjXyGmiMVvcKPeDCg/s1600-h/custom-list%5B9%5D.png" target="_blank"><img style="border-right-width: 0px; margin: 10px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="custom-list" border="0" alt="custom-list" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp4a8-8xDuHkam7x2RG9_VMkQ-OmUBWzt55AIyzGdyni3fNo_jbyLTqyxuv0QgFGuLMdr9DUHiWHWW9odhkJGRwfrwiCng6EeNFz1yGw92vH6_qUs0ltX6l9_Mrp3XzRzoWoJ-1Q/?imgmax=800" width="106" height="120" /></a> </p> <p align="justify"><em>I tested the system and its simplicity gave it away lol.., it not that difficult to bypass if you understand how it works ;) To be fair its wasn’t a flaw in the software that let me do this but the operating systems transparency. Anyways set it up with a limited account and should work great! </em></p> <p align="right">Great software for parents to keep their children safe!</p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com1tag:blogger.com,1999:blog-7154474.post-44579071989757920172008-02-27T18:51:00.004+05:302010-04-05T16:05:21.507+05:30Must Have Security Solutions (for free)<img style="margin: -10px 10px 10px" align="right" src="http://pvu7rq.blu.livefilestore.com/y1pV0BZi0cTDg-IXpZXWM2CQwd-kcVPvpCsqRU8pcYFGdyOOj2i0bBxvGyndrs71tAjjbysZr3sQTFlAL1u7nus-A/ip_icon_02_Ok.png" width="128" height="128" /> <p align="justify"><em><strong>The Question ! New PC How to Secure ? </strong></em>Here’s the Answer some must have security solutions that don't have any performance drag and memory use even when all of them are running at the same time oh and did i mention they are all free. Remember Security for PC is to give you good computing experience, being paranoid and installing many security solutions just causes system drag doesn't help! </p> <blockquote> <p><font color="#004080"><strong>Avira Antivir <br /></strong>Top Rated AntiVirus, over 30 million users, Free for Personal Use. <br /></font><a href="http://www.free-av.com/" target="_blank"><font color="#004080">http://www.free-av.com/</font></a></p> </blockquote> <blockquote> <p><font color="#004080"><strong>Threat Fire </strong> <br />Fills in the gap where conventional AntiVirus fails! Ideal protection against 0-day attacks <br /></font><a href="http://www.threatfire.com/" target="_blank"><font color="#004080">http://www.threatfire.com/</font></a></p> <p align="justify"><font color="#004080"><strong>Windows Defender <br /></strong>Kool Antispyware from Microsoft Free (Preinstalled in Vista) <br /></font><a href="http://www.microsoft.com/athome/security/spyware/software/default.mspx" target="_blank"><font color="#004080">http://www.microsoft.com/athome/security/spyware/software/default.mspx</font></a></p> <p align="justify"><font color="#004080"><strong>SpyBot S&D Resident or WinPatrol (AntiSpyware)</strong> <br />Both do little or more the same thing has good features a must have! <br /></font><a href="http://www.safer-networking.org/en/index.html" target="_blank"><font color="#004080">http://www.safer-networking.org/en/index.html</font></a><font color="#004080"> <br /></font><a href="http://www.winpatrol.com/" target="_blank"><font color="#004080">http://www.winpatrol.com/</font></a></p> <p align="justify"><font color="#004080"><strong>Sunbelt Personal Firewall (Previously known as Kerio Personal Firewall) <br /></strong>Just like Windows Firewall this too doesn't slow your connection or speed but gives more features and options. <br /></font><a href="http://www.sunbelt-software.com/Home-Home-Office/Sunbelt-Personal-Firewall/" target="_blank"><font color="#004080">http://www.sunbelt-software.com/Home-Home-Office/Sunbelt-Personal-Firewall/</font></a></p> <p align="justify"><font color="#004080"><strong>Comodo Memory Firewall </strong> <br />Buffer Overflow Protection for all the programs running on your Memory. <br /></font><a href="http://www.memoryfirewall.comodo.com/" target="_blank"><font color="#004080">http://www.memoryfirewall.comodo.com/</font></a></p> <p><font color="#004080"><strong>Sandboxie (Run in a Sandbox) or BufferZone Free Protection (Run in a  Virtualized Environment) <br /></strong>Run Isolated to System, Restrict Access to System Processes and Environment or Run in a virtual Environment good where Sandboxing fails if the application requires System Services or if you think the sandbox is slowing the operations. <br /></font><a href="http://www.sandboxie.com/" target="_blank"><font color="#004080">http://www.sandboxie.com/</font></a><font color="#004080"> <br /></font><a href="http://www.trustware.com/virtualization/free.html" target="_blank"><font color="#004080">http://www.trustware.com/virtualization/free.html</font></a></p> </blockquote> <p>Happy & Safe Computing..</p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-57749243889971708462008-02-21T17:13:00.000+05:302008-02-26T19:28:15.347+05:30Goolag Scanner Released!<p align="justify"><em><strong><a href="http://pvu7rq.blu.livefilestore.com/y1pg69La3RsJ7c-RyZPuK5UhXsqZZpGoRSCyzLZkvgoIhfRwIZMYi1OvS-QrdNhAMvfUX9mIQludhgMHTzuA1B6a8c1rqMhSaYX/gs.jpg" target="_blank"><img height="199" hspace="10" vspace="3" src="http://pvu7rq.blu.livefilestore.com/y1pg69La3RsJ7c-RyZPuK5UhXsqZZpGoRSCyzLZkvgoIhdqjN2F9faPeV2Amj-6vifJvuhm4DKPw3Xu07UImj1sbdQqDV5SntHn/gs.jpg" width="237" align="right" /></a></strong></em>Is this Good or Bad ??? much to debate and surprise, think this would be a good thing. Yep! good thing for everyone who own's a website that's pretty much everyone i know, lol.. "how can this be a good thing ?" use this tool to audit your websites and fix stuff before that information is used to bring the site down. </p> <p align="justify">Released by CULT OF THE DEAD COW (cDc), one of the world's largest hacker group, Goolag Scanner is a web auditing tool. Goolag Scanner enables everyone to audit his or her own website via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. You will be surprised what all could be found about a website via google. </p> <blockquote> <p align="justify"><strong>Google Hacking Database [ </strong><a href="http://johnny.ihackstuff.com/ghdb.php" target="_blank"><strong>http://johnny.ihackstuff.com/ghdb.php</strong></a><strong> ]</strong></p> </blockquote> <blockquote> <p align="justify"><strong>Goolag Scanner [ </strong><a href="http://www.goolag.org/download.html" target="_blank"><strong>http://www.goolag.org/download.html</strong></a><strong> ]</strong></p> </blockquote> <p align="justify">This database has long helped Admin's to better secure their websites. similar books from publishers resulted in best sellers, hoping this scanner would run on similar tracks helping even the end user with little knowledge to better manage their websites. <br /></p> <p align="justify"><em><strong>Review: </strong>First off an interesting installation voice supported, I scanned a few of  my Websites and found no problems, Yappy!! (All those installations and customizations and tweaks did help lol..) The scanner scans for over a 1400 issues including starting from vulnerabilities, installations to error message listings, be warned if you select to run all the tests at once the extensive use of google can result google detecting your activity as that of a bot, not much of a problem you just need to prove Google that you are not a bot enter a few letters from a pic to unblock and continue but at the end of all this you rest assured that your website is safe from almost 1400+ hacks methods and vulnerabilities. or you know what to fix atleast. funny i expected this tool to have an update feature still in beta may be in future versions.</em></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-16720258707760291892008-02-20T20:51:00.001+05:302008-02-21T02:25:19.581+05:30Change DNS ? for a Safer, Faster Online Experience<p align="justify">OpenDNS is the world's largest, Free DNS service provider. Millions use it to handle their DNS and Web-content filtering needs. And how Complex is this ? its dead easy! just change your DNS and you are done. Yes its that easy. Configure it to your PC, Router or use it with your existing DNS Servers. It also keeps you safe from all those Phishing Sites too.. Using Phishtank (www.phishtank.com), a free online community where one can submit, verify, track and share phishing data, Want more, you can also filter out adult sites and proxies among more than 40 categories, and provide the precision to block individual domains (content filtering), And its faster than your ISP's DNS servers <img alt="smile_tongue" src="http://spaces.live.com/rte/emoticons/smile_tongue.gif" /> too.. Great for Schools, Organizations, etc., or for Personal use.. Check out there HUGE list of <a href="http://www.opendns.com/customers/" target="_blank">Subscribers</a> and testimonials.. <br /> <br />Faster! Safer! What are you waiting for ? (<a href="https://www.opendns.com/start" target="_blank">https://www.opendns.com/start</a>) <br /></p> <p><img src="http://www.opendns.com/img/start_vista7a.gif" /> <br /> <br /><strong><font color="#ff0000"><a href="http://www.opendns.com/" target="_blank"><img style="border-top-width: 0px; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" alt="OpenDNS home" src="http://www.opendns.com/img/footer_logo.gif" align="left" /></a>  208.67.222.222 <br />  208.67.220.220</font></strong></p> Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1154279506926502472006-07-30T22:41:00.004+05:302010-04-11T01:21:37.821+05:30Iconix eMail ID!<p align="right"><strong><span style="color:#999900;">Just came across quite a useful tool...</span></strong></p><p align="justify"><strong>ICONIX: </strong>Tired of trying to figure out which email messages might be phishing or fraudulent spam? Iconix eMail ID lets you see what's real before you even open the message. Iconix eMail ID works with your email program and double checks the source of a message to make sure it's not a spoof. It then uses a simple visual indicator in your inbox - a gold lock with a checkmark to show that a message is real. E-mail from over 300 major senders is currently identified--companies such as eBay, PayPal, Citibank, Amazon.com, Expedia, MySpace, and the New York Times represent the top online sites for retail, travel, auctions, banking, e-cards, news/entertainment, and dating. Version 3.15.16 added support for Mozilla Firefox and Internet Explorer 7.0 beta 2.</p><p><a href="http://www.download.com/Iconix-eMail-ID/3000-2382_4-10554745.html"><strong>http://www.download.com/Iconix-eMail-ID/3000-2382_4-10554745.html</strong></a></p><p><em><span style="color:#9a9a9a;">"Computers are incredibly fast, accurate and stupid; humans are incredibly slow, inaccurate and brilliant; together they are powerful beyond imagination." -- Albert Einstein</span></em></p>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1149915865053961802006-06-10T10:34:00.000+05:302006-06-10T10:37:10.063+05:30SQL Injection Scanner <p>Finally found a sql injection scanner that would help u secure ur sql better by listing out its vulnerabilities. you can download a free trail or request a free security audit. the service scans for <strong>SQL Injections, Cross Site Scripting</strong> and other Web Vulnerabilities [ SQL Injection is a hacking technique which modifies SQL commands in order to gain access to data in the database. Cross site scripting attacks allow a hacker to execute a malicious script on your visitor´s browser.] other vulnerabilities it scans for: </p><ul><li><strong>CRLF injection attacks </strong></li><li><strong>Code execution attacks </strong></li><li><strong>Directory traversal attacks </strong></li><li><strong>File inclusion attacks </strong></li><li><strong>Authentication attacks</strong> </li><li><strong>& More…</strong></li></ul><p>Resources:</p><h3>Read <a href="http://www.acunetix.com/websitesecurity/whitepapers.htm">whitepapers </a>&<a href="http://www.acunetix.com/websitesecurity/articles.htm"> articles</a> about Web application security</h3><ul><li><a href="http://www.acunetix.com/websitesecurity/sql-injection.htm">SQL injection </a>: SQL injection is a hacking technique which attempts to pass SQL commands through a web application for execution by a backend database. </li><li><a href="http://www.acunetix.com/websitesecurity/cross-site-scripting.htm">Cross site scripting</a> : Cross Site Scripting (also known as XSS or CSS) generally occurs when a dynamic web page gathers malicious data from a user and displays the input on the page without it being properly validated. </li><li><a href="http://www.acunetix.com/websitesecurity/crlf-injection.htm">CRLF Injection</a> : A CRLF Injection occurs when a hacker manages to inject CRLF Commands into the system. </li><li><a href="http://www.acunetix.com/websitesecurity/directory-traversal.htm">Directory traversal</a> : Directory Traversal is an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web server's root directory. </li><li><a href="http://www.acunetix.com/websitesecurity/authentication.htm">Authentication hacking </a>: Authentication hacking is a term used when the attacker breaks into the system by proving to the application that he is a known and valid user, the attacker gains access to whatever privileges the administrator assigned that user. </li><li><a href="http://www.acunetix.com/websitesecurity/google-hacking.htm">Google hacking</a> : Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. </li></ul><p><strong>A Must Audit for all Web Apps!<br /><span class="urlc"><u><a href="http://www.acunetix.com/sql-injection/" target="_blank">www.acunetix.com/sql-injection/</a></u></span></strong></p>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0tag:blogger.com,1999:blog-7154474.post-1148726138929007782006-05-27T16:05:00.000+05:302006-05-27T16:05:38.936+05:30Symantec confirms vulnerability in antivirus software<p><strong>Symantec confirmed Friday afternoon a vulnerability in its Antivirus Corporate Edition software that had been </strong><a href="http://umeshsoft.blogspot.com/2006/05/symantec-anti-virus-software-flawed.html" target="_blank"><strong>discovered by security firm eEye</strong></a><strong>. According to the company, a successful exploit of the flaw could "potentially cause a system crash, or allow a remote or local attacker to execute arbitrary code with System level rights on the affected system."</strong></p><p>At this time, Symantec has only issued IDS signatures that will be able to detect attempts to exploit the vulnerability. Network Security Appliance 7100 signatures (SU 46), Gateway Security 3.0 signatures (SU 19) and Client Security 2.0 and 3.0 signatures (SU 22) have been made available via the software's live update feature.</p><p>The company recommends that customers adjust their software policies as long as the flaw is exposed to a potential exploit. Specifically, the firm said that companies should restrict access to administration or management systems to privileged users only, keep all operating systems and applications updated with the latest vendor patches and "run both firewall and antivirus applications, at a minimum to provide multiple points of detection and protection to both inbound and outbound threats."</p><p>Symantec also said that users should "be cautious visiting unknown or untrusted websites or following unknown URL links" and should not "open attachments or executables from unknown sources."</p>Umesh Thotahttp://www.blogger.com/profile/17670163674097758682noreply@blogger.com0