Using NMAP can help identify vulnerable points on your network. One of the more effective tools out there, and as usual, the best are the command line. – AG
Nmap command examples and tutorials to scan a host/network, so to find out the possible vulnerable points in the hosts and secure the system.
Source: Top 32 Nmap Command Examples For Sys/Network Admins – nixCraft
Back in August a version of CCleaner was released that was infected. More information is available around the web, but the direct release from Piriform is here. Recently Piriform was acquired by Avast.
For the full technical details, you can read this post, which contains all the information for hashes, registry entries, etc.
Even just a small amount of coding, or having reference materials, can go a long way when troubleshooting. Reverse engineering code also has it’s merits and these beginner bash tutorials and reference materials compiled by nixCraft are one to bookmark.
A list of online tutorials and resources to help you learn bash shell, the default OS X and Linux shell.
Source: How to Learn bash shell and scripting – The best tutorials for bash beginners
Sometimes you may question a download, or just want to browse the web a bit safer, sandboxing can provide help with this. Sandboxes are like their name implies, a child’s playbox, and the term has been in use by IT people for decades. Continue reading
On 19th March 2015, multiple high and moderate severity level vulnerabilities released in OpenSSL, a Secure Sockets Layer toolkit used in a Linux and Unix-like systems. How can I fix these vulnerabilities Continue reading