I do not use it, however if those pentests were done legally I do not see the issue. Though if you discovered a bug and disclosed it responsibly...
Good post Hungryman. I would also like to add, the U.S government follows its own standards and recommendations. If there was a glaring...
Business travelers who tether their iPhones as mobile hotspots beware. Researchers at the University of Erlangen-Nuremberg in Germany have...
While I can't speak for law enforcement efforts, there are many individuals supporting various entities that are very well informed about the...
I do not really see the issue here. Yes facebook and other social sites are for personal use, but the one exception is most people choose to not...
If this isn't a fine example of "the pot calling the kettle black" scenario, I don't know what is. ;)
What type of adapters are you looking to invest with? Depending on your choice will help shape my overall answer. Will these adapters be direct to...
Safe yes, practical no. Many encryption algorithms are secure, the weakness comes from their implementation and user error. In my opinion you...
This sentence from the topic sums it up nicely: I've bolded the critical part of that statement. Yesterday's data breaches are today's...
I'll bite, what in your view constitutes sound encryption methods?
Well if using the method I mentioned above, it can be easy to track even when the target is performing counterintelligence (CI) efforts.
Things really get interesting when you deploy multiple pseudo hotspots in a grid fashion around say a small city or town that collect and pipe...
If I may be blunt, basic encryption should meet your goal here (data at rest, or in your case physical transit). A lot of what you are describing...
I may customize/omit certain parts not relevant to posters here, however these are pulled from much larger checklists provided by NIST/NSA/DISA...
It sounds like you are referring to packet sniffers. Yes any and all information sent over the LAN/WLAN at that point once the end client is...
Well yes, after someone is able to identify the risks, methods as what you outline would mitigate that avenue of tracking. If you are unaware...
Control Title: XP Firewall Standard Profile – Enable Firewall This setting enables the Windows Firewall when not connected to the domain. The...
Control Title: The system is configured for a greater keep-alive time than recommended. Controls how often TCP sends a keep-alive packet in...
Control Title: The Recovery Console SET command is enabled. Enabling this option enables the Recovery Console SET command, which allows you to...
Bolts, I decided to brew a pot of coffee and trim the guide down. Though you may need a pot of coffee when going through this.;D The following...
I personally am a fan of the following: http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml
Virtual Firefox: adblock edge noscript requestpolicy
Well most of the time, someone looking through handles would not just go by handle name alone. They would go by writing style, content, or perhaps...
Hello Bolts, I appear to have missed this post. Let me address where I can to offer advice. I have a comprehensive list of controls to implement...
Yes, the reason being OSINT in this day in age is very easy to use as a weapon with malicious intent. I've proven to many a people, even some...
Separate names with a comma.