Using NMAP can help identify vulnerable points on your network. One of the more effective tools out there, and as usual, the best are the command line. – AG
Back in August a version of CCleaner was released that was infected. More information is available around the web, but the direct release from Piriform is here. Recently Piriform was acquired by Avast.
For the full technical details, you can read this post, which contains all the information for hashes, registry entries, etc.
Even just a small amount of coding, or having reference materials, can go a long way when troubleshooting. Reverse engineering code also has it’s merits and these beginner bash tutorials and reference materials compiled by nixCraft are one to bookmark.
A list of online tutorials and resources to help you learn bash shell, the default OS X and Linux shell.
ESports, or non-technically the broadcasting of computer games for others to watch, has moved to the spotlight recently and is gathering a larger following than expected. Who would have thought that just watching video games would be more popular than actually playing them? As I have been playing Internet multiplayer games since purchasing Quake as a pre-release, the notion that others might be interested in my game was somewhat fascinating. I began streaming a few months ago on Twitch, but began to see more networks pop up and wondered how I could stream to more than one. Continue reading
Sometimes you may question a download, or just want to browse the web a bit safer, sandboxing can provide help with this. Sandboxes are like their name implies, a child’s playbox, and the term has been in use by IT people for decades. Continue reading