-
Neil Y. Rushi commented on the post, Discussion Week 12, on the site 6 years, 11 months ago
According to Wikipedia, buffer bloat is high latency in packet-switched networks caused by excess buffering of packets, cause jitter and reduce overall throughput. TCP has a role with buffer bloat because usually TCP will adjust itself and match the speed of the bandwidth unless the buffer is full then it will be backed up and packets will start…[Read more]
-
Neil Y. Rushi commented on the post, Discussion Week 11, on the site 6 years, 11 months ago
You’re absolutely right Ahmed – those who are in the company handling the cyber security roles should have access to the tools. I can only see a software developer have access to it if it was made in-house or a combo of on-shelf and in-house development. But if they had nothing to do with it, they shouldn’t touch it. Non-IT employees shouldn’t be…[Read more]
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
The Gozi Trojan is usually targeted towards North America, Europe, other countries in Asia but not really Japan according to the article. The reason is there are cyber-criminals who are in a gang who claim Japan […]
-
Neil Y. Rushi commented on the post, Singapore wants ethical hackers to get a license, or else, on the site 7 years ago
Well there are already certification tests that ethical hackers can take to become licensed but what Singapore is doing I think is valid except about the jail time and fines. They should have a registry and keep track who is licensed and who’s not but I do like this idea.
-
Neil Y. Rushi commented on the post, Discussion Week 8, on the site 7 years ago
A pandemic such as the flu, chicken pox and smallpox is a threat to IT security because if a few personnel gets sick and a few key people are out can cause information systems to be unprotected if they are not monitored or maintained for a few days or weeks. Now smallpox happening is very rare but flu has a season and can strike any time, so…[Read more]
-
Neil Y. Rushi commented on the post, WPA2 Cracked, on the site 7 years ago
This is pretty scary since WPA2 is the wireless security currently in place for almost all Wi-Fi networks. I know at Verizon old routers still operate on WEP and they applied a firmware update to make sure they operate on WPA2 or we replace it. But to hear it has been cracked, make me a little paranoid about my info I send over the network and if…[Read more]
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
In this article, it talks about how India has become the second largest market for smartphones usage. This means new malicious actors can appear and introduce new threats to the market. Not only are smartphones […]
-
Neil Y. Rushi commented on the post, Discussion Week 6, on the site 7 years ago
Jason you make some good points and with quantum computing, it can calculate algorithms way faster than computers now using binary. There’s an algorithm called Shor’s algorithm that can deem to break RSA because of how it can break calculations down to it’s prime numbers and it’s meant for quantum computing. But if a RSA value is very long say in…[Read more]
-
Neil Y. Rushi commented on the post, Google's hardware advantage, on the site 7 years ago
Exactly, google has managed to break into different parts of the technology sectors putting some heat on this rivalry. I think Google will maintain the lead going into the future unless there’s a hidden player we don’t know about.
-
Neil Y. Rushi commented on the post, Uber App Feature to Record iPhone Screen, on the site 7 years ago
What a scary security flaw – as a mobile user with different apps on the phone, I’m always weary about which one is accessing my personal info when it’s not in use. I’m glad Uber decided to investigate it and fix it before they were compromised. But now it makes one worried about what other apps are doing this.
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This article talks about the advantage that Google has over Apple – the hardware. The earbuds for the Pixel phone acts as a translator for when someone speaks another language and vice versa, the Google apps such […]
-
This is an interesting turn for the market considering Apple has long been considered the top brand and even the standard for personal mobile devices. Google has far outgrown its original status as a simple, but powerful search engine in a once competitive market for internet search tools. This technology, however, has become very ubiquitous, causing Google to expand into a provider of a range of widely used internet-based services and applications, as well as research into new AI and personal computing technologies. It will be interesting to see where the market goes from here and who the technology leaders will be going into the future.
-
Exactly, google has managed to break into different parts of the technology sectors putting some heat on this rivalry. I think Google will maintain the lead going into the future unless there’s a hidden player we don’t know about.
-
-
-
Neil Y. Rushi commented on the post, Discussion Week 5, on the site 7 years ago
Jason, I like what you said about Kerckhoff’s method and the other side to that is Kerckhoff’s principle is when keeping things secret, make sure it has low value or can be replaced. Secrets can be open because with cryptography if someone who’s evil gets it, they may not know what’s it’s for because keys can be randomized and changed with the…[Read more]
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
So more news about this – it’s a wormable attack, once the attacker gets finds an active Bluetooth connection and can spread it to different Bluetooth devices. It can spread ransomware to devices also and it […]
-
Neil Y. Rushi posted a new activity comment 7 years, 1 month ago
In a business, applications should be whitelisted if it’s absolutely required for the organization and if it can be set, set it to where only a few employees can use it on role-based or departmental needs. There are ways you can restrict applications without whitelisting or blacklisting them – imbed a credential manager. That way if an…[Read more]
-
Neil Y. Rushi posted a new activity comment 7 years, 1 month ago
If Equifax was hacked earlier this year and Deloitte was last year, why are we just hearing about this now? Just curious – are their standards of revealing when the period of a hack more strict or less strict and why? Food for thought
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
There is a vulnerability called BlueBorne that is a vulnerability in Android phones and Apple devices that aren’t upgraded to iOS 10. When it’s left turned on, people can use it to connect to it and sometimes […]
-
Neil Y. Rushi's profile was updated 7 years, 1 month ago
-
Neil Y. Rushi changed their profile picture 7 years, 1 month ago
-
Neil Y. Rushi posted a new activity comment 7 years, 1 month ago
sorry posted more than once – website was giving me fits
-
Neil Y. Rushi posted a new activity comment 7 years, 1 month ago
That’s how I feel about Windows. I am a big user of Windows because I basically grew up using it and have used it throughout my jobs and school. I like it because it is simple but also there are so much that can be done in Windows that I haven’t explored yet. Many applications are compatible with the OS and even though people target it, there are…[Read more]
- Load More