-
JR posted a new activity comment 7 years, 11 months ago
14.1 I had this conversation with a CISO last month regarding our email policy. He had to deal with similar issues. As per his organization’s policy users are to use the encrypted secure message center on their EHR for such communication. I asked him what happens if physicians or users decide to send emails anyway since using the message center…[Read more]
-
JR posted a new activity comment 7 years, 11 months ago
Open standards can be challenged, broken down, patched and fixed by numerous people who rigorously test these standards. This allows the creation and development of products that are known to outlast issues that the standards are supposed to protect against or resolve.
We should open up other processes and systems in IT to open review/testing…[Read more] -
JR posted a new activity comment 7 years, 11 months ago
Open standards can be challenged, broken down, patched and fixed by numerous people who rigorously test these standards. This allows the creation and development of products that are known to outlast issues that the standards are supposed to protect against or resolve.
We should open up other processes and systems in IT to open review/testing…[Read more] -
JR posted a new activity comment 7 years, 11 months ago
I agree with your statement that Kerckhoff’s 2nd principle is a strong indictment of “security through obscurity” however, I think there could be exceptions to this for proprietary software that use the latest, patched, well-tested, open source software under the hood. Such software will have well tested processes whose implementation isn’t widely…[Read more]
-
JR posted a new activity comment 7 years, 11 months ago
The ideal technique that should be used would be white-listing. However, since most organizations do not have a lot of personnel that can support white listing and troubleshooting every since application that every user in an organization would use, it might be easier to blacklist applications.
Different methodologies would support different…[Read more]
-
JR posted a new activity comment 8 years, 1 month ago
I’ve been on the linux bandwagon for the majority of my life. My first computer was an old Dell desktop donated from a library with 128 MB of RAM and barely 10 GB of storage. At the time, an average computer had about 2048 MB of RAM and a 100 – 500 GB of storage. Using Linux helped me make the most of limited resources I had to do just about…[Read more]
-
JR posted a new activity comment 8 years, 2 months ago
Hi all,
If anyone needs access to the Fedora 23 live image, you can get it here:
https://download.fedoraproject.org/pub/fedora/linux/releases/23/Workstation/x86_64/iso/Note: The files are hosted at multiple locations, it’s probably best to go to the link a few times and get the checksums from a few locations and make sure that the file you…[Read more]
-
JR posted a new activity comment 8 years, 2 months ago
Hi all,
My name is Jerrin. I’m also a Temple MIS grad. I work as a programmer at the Einstein Medical Center. This is my 2nd semester as a part time student in the Temple ITACS program. I’m excited to be in this class and learn more about what can be done to secure the cyber surface of a business entity.
-
JR wrote a new post on the site Introduction to Ethical Hacking 8 years, 12 months ago
The reading discussed techniques that penetration testers can use to evade IPS. Examples are fragmenting packets, obfuscation, using decoy trees, using open ports .etc. The main lesson is that an IPS and other s […]
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years ago
This weeks reading covered SQL injection & XSS vulnerabilities and the Burp Suite. The burp suite readings cover basic usage of Burp Suite on non encrypted HTTP connections. The Web Application Injection Vu […]
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years ago
This week’s article was about malware. The reading talks about how different types of malware such as viruses, worms, Trojans etc. are different in nature. It also covered methods of operation for different t […]
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
This week’s reading covered netcat. Netcat is extremely popular because it can be used for more purposes than just port scanning. This article talks about how to use netcat to open remote command prompt i […]
-
JR changed their profile picture 9 years, 1 month ago
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
The reading for this week covered packet sniffing. The article covered aspects of sniffing switched, non-switched and wireless environments. It also talked about common applications used for sniffing as well as […]
-
JR's profile was updated 9 years, 1 month ago
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
This weeks article covered why it is important to footprint systems. The article talks about how it is important to look at what footprints potential attackers are going to see on a system and modifying them so […]
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Reading Summary
This week’s reading was about vulnerability scanning. The reading talked about how scanning for vulnerabilities is a better and more proactive solution than using a password to protect files and […]
-
JR wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
In the News
This article talks about a security vulnerability in WatsApp Web which allows attackers to disguise malicious content as vcfs. Vcfs files are used to share contact information. Attackers can send […]
-
-
JR joined the group MIS4596 Hohne Fall 2014 10 years, 2 months ago
- Load More