Most people use Google Authenticator to generate two-factor authentication (2FA) tokens on their phone, with Authy as a recent alternative. What’s cool is that any service can make use of these apps as long as it is compatible. But what does it mean to be compatible? How do these apps work?
DECT (Digital Enhanced Cordless Telecommunications) is a standard for cordless phones. The goal of dedected.org is to understand DECT and DECT security better and to create an open source implementation of the DECT standard.
This month, I’ll round out that top ten list by addressing five more useful commands and analyzing how security professionals can use each one to help them do their jobs better.
Let’s face it, Windows machines get hacked, and in some environments it happens a lot. Fortunately, Microsoft has built numerous tools into Windows so administrators and power users can analyze a machine to determine whether it’s been compromised.
I have read several posts on this topic but non of those provide a complete solution all on one page. So, I have come up with 4 step approach to acheive this. I am relatively new to drupal so please correct me if I have missed anything in this setup.
Derzeit gibt es in der IT-Sicherheitsbranche ein heisses Thema: Das Verbot sogenannter Hackertools. Wir möchten hier aufklären, und unseren Standpunkt der Dinge darlegen. Was sagt uns dieser Entwurf (der als PDF zum Download bereit liegt) also?
via Using ICMP tunneling to steal Internet.