Category: Security

  • Top 32 Nmap Command Examples For Sys/Network Admins – nixCraft

    Using NMAP can help identify vulnerable points on your network. One of the more effective tools out there, and as usual, the best are the command line. – AG   Nmap command examples and tutorials to scan a host/network, so to find out the possible vulnerable points in the hosts and secure the system. Source:…

  • Samy Kamkar: PoisonTap – exploiting locked computers over USB

    Interesting read on how just “locking” your PC is not enough when you are in a public environment (workplace, library, etc). With the push to HTTPS everything on the Internet, this can be foiled, but not all sites are running HTTPS exclusively. You can read the details here.

  • CCleaner’s August 2017 Release Infected

    Back in August a version of CCleaner was released that was infected. More information is available around the web, but the direct release from Piriform is here. Recently Piriform was acquired by Avast. For the full technical details, you can read this post, which contains all the information for hashes, registry entries, etc.