Et Cetera

Mon
03
Aug

How the Lizard Squad Took Down Two of the Biggest Networks in the World

Contributed by James Rollins

During the 2014 Christmas holidays, millions of people all over the world were subjected to an unwanted gift. They sat down to play their new video game or watch a streaming movie on their Microsoft X-Box or Sony PlayStation, only to find that the online services of their respective system was unavailable. The blackout lasted for a couple days in Microsoft’s case, but the Sony service was down for more than a week. Microsoft’s X-Box Live and the Sony PlayStation Network had been successfully disabled by the Lizard Squad; a globally organized group of hackers, who had publicized their intentions on social media such as Twitter and Facebook for weeks prior to the attack.

This document is in PDF format. To view it click here.

Thu
30
Jul

NMAP and NESSUS Cheat Sheet

Contributed by Secguru and restored from the old Infosecwriters archive.

A quick reference sheet one can print out that contains the most common options of NMAP and NESSUS.

This document is in PDF format. To view it click here.

Tue
28
Jul

Are smart appliances safe?

Contributed by A. Michele Parrish

More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart appliances are homeowners exposing their homes and therefore their private lives to outsiders without knowing it? In this paper I explain what are smart appliances and how and why the market is growing, why they are desired, how smart appliances can be compromised and how consumers and vendors can make smart appliances more secure.

This document is in PDF format. To view it click here.

Mon
27
Jul

Data Storage Security

Contributed by Tom Olzak and restored from the old Infosecwriters archive.

Data in transit, across and between company networks, are usually the focus of extensive security efforts. However, organizations typically regard data residing on internal storage devices as “secure enough.” Databases and flat files stored on server drives or on SAN disk arrays don’t move outside the security perimeter; so why worry?

In this paper, we’ll explore data storage vulnerabilities, the risks these vulnerabilities present to an organization, and ways to effectively manage those risks.

This document is in PDF format. To view it click here.

Fri
24
Jul

Snort on Windows Server 2003

Contributed by Suni Vakharia and restored from the old Infosecwriters.com archives.

A detailed write up on installing Snort on a Windows 2003 server with installation and configuration notes.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera