I once ran into a phishing attempt in the form of a deactivation scare. This style of attack is very efficient, as it scares users into reacting by threatening to deactivate a critical account. This specific email threatened to deactivate a banking account and told me […]
Video Review- Security Configuration Wizard https://www.youtube.com/watch?v=O9JzdT9xi9s This video discusses how the Security Configuration Wizard can be used to harden a server by reducing the attack surface, which is the number of ports, protocols, and software that are available for use, and other methods of strengthening […]
One of the earliest versions of cryptography was found in the Egyptian town, Menet Khufu. On the tomb of Khnumhotep II, hieroglyphics were inscribed with strange symbols to help deter people from understanding what was written; this is called a substitution cipher. In Greece, the Spartans developed […]
You must be logged in to post a comment.