Comments
-
I received a phone call from my wife during the DDOS attack. She was concerned because of the sites she couldn't get to. I had to reassure her that the problem wasn't at home with her machine. After I got home, she asked me to explain the attack to her in more detail. Should I be concerned that she has her own CEH study…
-
Congrats to our winners.
-
Ditto. My first couple of days are done.
-
A friend of mine, who happens to be my podiatrist, had this happen in his office. One of his receptionists fell for a phishing attempt and her work computer got encrypted. Fortunately, he uses off site/cloud record keeping. All that had to done was re-image the workstation. As for the offsite record keeping, I understand…
-
MARS is right. Our home port was Norfolk, Virginia. We had a couple of Ham radio operators in the area that supported us. We would contact them and they would make the local phone call for us. Those guys were a life line for us and they did it out of the goodness of their hearts.
-
wbrown, I have to disagree about the beauty of TCPdump. With the terminal window background set to black and the text set to green, few things are more beautiful than watching packets scroll up the screen.
-
I find that I draw on my mainframe experience as well. Heavy in Boolean logic and machine language.
-
Good listing
-
Good read.
-
Agreed. Most people ensure they have door locks and deadbolts. Maybe even a security system. However, it never enters their mind to secure their many "Smart" devices.
-
I have an app that tracks my state and federal representatives/senators and how the vote. It also allows for feedback to our elected officials on whether we agree with their vote or not.
-
Now I know and will check it out.
-
I'd roll with Chewbacca anytime.
-
It seems like Chewbacca had the edge on everyone else. I was introduced to Chewy in 1977 when I a young teenager. I have conversations with my oldest granddaughter, age 12, about chewy now. Chewy is truly trans generational.
-
Done. Let's see where this goes.
-
Automating access right just make sense. I am pushing for a SEIM to help track this.
-
Another good read. I find myself using -X, being a HEX nerd, to see ASCII as well. I often will use -s 1500 as well and dump a copy to my laptop for further analysis.
-
Wish I could be there. Any chance of having your kong.yang, lecture/demo put on Thwack?
-
Nice read.
-
The Pokemon story was great. Where do find all of these? Great reads as usual.
-
Network Performance Monitor, Server & Application Manager, NetFlow Traffic Analyzer
-
Enjoy your time off.
-
Single Malt?
-
Great read all the way through. 1. I usually assume system misconfiguration until I find evidence to the contrary. 2. End users need continual updating about current exploits. It's my job to kn ow these, not theirs. 3. Treat people the way you would want to b e treated. 4. Always, always, always, remark your ACLs so others…
-
All four are good bucket list items. 1, 3, and 4 are on going, in a never ending, self-sustaining loop. As for IPv6, we won't be moving in that direction where i work any time soon.
-
All things are possible if we just pretend hard enough.
-
Enjoy
-
Well said.
-
Capacity reclamation is critical. You don't always need a bigger engine, sometime you just need to tune the one you have.
-
Used cars and safety...I can understand the oversight. I do this stuff for a living and the thought never even occurred to me.