Quantcast
Channel: Radical Development » Technology/Internet
Browsing latest articles
Browse All 80 View Live

Image may be NSFW.
Clik here to view.

Business Contingency Operations

The idea of a Business Contingency Plan (BCP) is the act of preparation and adapting to any contingency either manmade or natural. Examples include hurricanes, earthquakes, sabotage, and even war. Upon...

View Article



Image may be NSFW.
Clik here to view.

The 2nd Generation Nest Thermostat Replaces My Outdated Thermostat

I finally decided some time ago to replace the original thermostat that was installed when my house was built with the 2nd Generation Nest Thermostat. I must say that I waited for the second generation...

View Article

Image may be NSFW.
Clik here to view.

What Makes A Home Office

As more and more companies are allowing workers to telecommute, I thought I would look at that makes up the perfect home office from my point of view. From my personal experience very few employers...

View Article

Image may be NSFW.
Clik here to view.

Organized Cyber Crime Threat Is A Reality And It Is Getting Worse

One of the countless cyber threats today to corporations, small business, and individuals is organized crime. The reality is organized crime no longer marches into a business and demands so-called...

View Article

Image may be NSFW.
Clik here to view.

A Look At Microsoft SQL Server Database Security

Security and web applications is something that I speak and write about often and I believe one aspect of overlooked security is the database itself. For the purpose of this article I am focusing on...

View Article


Image may be NSFW.
Clik here to view.

The 7 Layers Of The OSI Model

The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer...

View Article

Image may be NSFW.
Clik here to view.

Open Source and Commericial Security Tools

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools...

View Article

Image may be NSFW.
Clik here to view.

The Future of Cybersecurity Technology and Policy

Only when a comprehensive understanding of the cyber threat is taken into consideration can organizations utilize process, tools, and technologies to find, correct, and combat those who launch a...

View Article


Image may be NSFW.
Clik here to view.

The Four Goals of Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of...

View Article


Image may be NSFW.
Clik here to view.

Stop Online Piracy Act And The Future Of Internet Freedom

I thought it was time that I sat down and put to paper so to speak my thoughts about the Stop Online Piracy Act (SOPA). For those of you that know me personally know that I am not a fan of SOPA for...

View Article

Image may be NSFW.
Clik here to view.

Learning BackTrack 5: The Art Of Penetration Testing

BackTrack is an absolutely amazing Linux based penetration testing environment that is entirely dedicated to hacking. I must say that you should use common sense when you begin digging into the...

View Article

Image may be NSFW.
Clik here to view.

Secure Web Browsing Using Lightweight Portable Security

Stop for a moment and ask yourself just how safe to do feel when logging into your favorite social network site and at some point in time logging into online banking for example. I am not advocating...

View Article

Image may be NSFW.
Clik here to view.

January 2012 BITS Software Assurance Framework

If you have not yet heard of this framework, I urge you to take the time to give it a serious read. While the executive summary talks to how software is critical to the financial industry the truth is...

View Article


Image may be NSFW.
Clik here to view.

Homeland Security’s (DHS) Software Assurance Program

Continuing with the theme of Software Assurance, I previously shared the January 2012 BITS Software Assurance Framework and now I located some wonderful information sponsored from the Department of...

View Article

Information Security Kit Free Offer

Folks, if Information Security is important to you then I urge you to grab the free Scrappy Information Security Kit. “Scrappy Information Security Kit: Includes a Free $9.99 Value eBook that Expires...

View Article


Image may be NSFW.
Clik here to view.

Operating System Protection

The idea of hardening an Operating System (OS) is something that has been deliberated over a number of years. At the core of OS security resides what is known as protection rings and these rings...

View Article

Image may be NSFW.
Clik here to view.

Organizational Security And What It Means

Organizations today are facing issues in physical and personnel security, network and system security, and payroll process security. This raises a need for a primary cyber and physical threats and...

View Article


Image may be NSFW.
Clik here to view.

Free Online Educational Resources

When it comes to education I believe that we never stop learning. With that said there is no reason why you cannot continue to expand your knowledge. The following list of resources contains a variety...

View Article

Image may be NSFW.
Clik here to view.

Ensure Deleted Files Are Not Recoverable With SDelete

Have you ever stopped and considered for a just how easily it is to recover deleted files from a hard disk? Disk recovery is not diffucult and there are many commercial products available which make...

View Article

Image may be NSFW.
Clik here to view.

What makes a strong password?

In today’s day and age the importance of a strong password cannot be over stated, but have you really stopped for a moment and considered just what makes a strong password? Many organizations have...

View Article

Image may be NSFW.
Clik here to view.

Find And Address Security Vulnerabilities With Tenable Nessus

Have you ever really stopped for a moment to consider just how vulnerable you are every time you turn on your computer? If your answer is no, I implore you to take security seriously as the threat is...

View Article


Image may be NSFW.
Clik here to view.

Combating DoS or DDoS Attacks

The reality is Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been around for many years. While there are not new developments in which the mechanism that these attacks...

View Article


Image may be NSFW.
Clik here to view.

TCP Port Cheat Sheet

In computer networking a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer’s host operating system. A port is associated with an...

View Article

Image may be NSFW.
Clik here to view.

Security+ Acronyms Cheat Sheet

Security+ is a certification dealing with computer security topics such as cryptography and access control, as well as business-related topics such as disaster recovery and risk management. It was...

View Article

Image may be NSFW.
Clik here to view.

Damaging Corporate Computer Crime

One of the countless cyber threats today to corporations is organized crime. The reality is organized crime no longer marches into a business and demands so called “protection money” or executes a...

View Article


Image may be NSFW.
Clik here to view.

SQL Injection Made Easy With Havij

It is amazing that one of the biggest vulnerabilities when it comes to database driven web applications is SQL Injection since this vulnerability is not difficult to resolve.  The sad fact is for what...

View Article

Image may be NSFW.
Clik here to view.

Studying for the CompTIA Network+ Exam

Security is my passion and recently I was studying for the CompTIA Security+ exam and now I have turned my attention to the Network+ exam. It has been a number of years since I last worked in network...

View Article

Image may be NSFW.
Clik here to view.

Computer Networking Glossary

- A - AAA A term used to indicate that the services of authentication, authorization, and accounting are being combined into one device or service. AAAA The equivalent of an A (address) record on a...

View Article

Image may be NSFW.
Clik here to view.

Mobile Digital Forensics Challenges

The world of digital forensics has experienced transformation in recent years. With the mobile landscape changing with each passing day, it is critical that the forensics field adapt promptly to all...

View Article



Image may be NSFW.
Clik here to view.

Microsoft Assessment and Planning Toolkit Explained

What does the MAP toolkit do? The Microsoft Assessment and Planning (MAP) Toolkit 8.0 is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine...

View Article

Image may be NSFW.
Clik here to view.

Website Mirroring Using GNU Wget

GNU Wget is a free software package for retrieving files using HTTP, HTTPS, and FTP – the most widely-used Internet protocols. It is a non-interactive command-line tool, so it may easily be called from...

View Article

Image may be NSFW.
Clik here to view.

Are You a Google Dork?

Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the...

View Article

Image may be NSFW.
Clik here to view.

Ways To Protect Your Identity On The Internet

At the time of this article I have an IP Address of 89.239.207.81 and I would ask you if you have any idea where my Internet Service Provider (ISP) resides? I live in the United States and at this...

View Article


Image may be NSFW.
Clik here to view.

Hacking 101: Footprinting Using Nothing But A Web Browser

Welcome to this article which is to introduce the idea of foot-printing when it comes to hacking. What foot-printing really means is the act of information gathering and this can be either active or...

View Article

Image may be NSFW.
Clik here to view.

Hacking 102: Active Footprinting With Nmap

This article is a followup of Hacking 101: Footprinting Using Nothing But A Web Browser which served as an introduction to passive footprinting. There are a number of tools that you can use both on a...

View Article

Image may be NSFW.
Clik here to view.

Hacking 103: Attacking Servers And Services With Hydra

Now that I have covered Hacking 101: Footprinting Using Nothing But A Web Browser and Hacking 102: Active Footprinting With Nmap it is time to move into a physical attack upon the servers and servers...

View Article


Image may be NSFW.
Clik here to view.

A Word To The Wise: Secure Your Data Please

Every day that I continue to use the Internet is another day that becomes more and more painfully clear to me that people or organizations have no idea just how vulnerable they are to possible attacks....

View Article


Image may be NSFW.
Clik here to view.

Technology Is The Government’s Oldest Best Friend

Recently we have all most likely have heard the news concerning the National Security Agency (NSA) is currently collecting the telephone records of millions of US customers of Verizon. This is...

View Article

Image may be NSFW.
Clik here to view.

Spoof Your MAC Address

First I want to talk about what the media access control address (MAC) address is before moving into the idea of spoofing a MAC address and the reasons you want to do so. I hope you are familiar with...

View Article

Image may be NSFW.
Clik here to view.

Email Encryption Using OpenPGP and Mailvelope

For those of you looking for an encryption option for your web based email then you should consider the use of these products. OpenPGP.JS is a JavaScript library so therefore the idea is that this...

View Article

Image may be NSFW.
Clik here to view.

8 Week Self Study Bootcamp for Security Professionals

It is important from time to time that we all revisit terminology. For this reason I have put together the following resources in the hopes of learning something new or at the very least bringing back...

View Article


Image may be NSFW.
Clik here to view.

What is Ping All About?

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this...

View Article

Image may be NSFW.
Clik here to view.

Wow! That Email Sure Gets Around

Email is an instrument that we each use likely every day without a great deal of thought or concern. There are a number of factors that make email convenient and those are cost, ease of access, speed...

View Article


Image may be NSFW.
Clik here to view.

Fingerprinting a Web Server with httprecon

Web applications unfortunately are vulnerable and for this reason they are often the gateway for attacks. An attacker is going to perform reconnaissance to understand where a weakness may reside. Of...

View Article

Image may be NSFW.
Clik here to view.

Life In a Digital World Means Little or No Privacy

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy....

View Article


Image may be NSFW.
Clik here to view.

What Can We Learn From the 2013 Adobe Database Breach

Early October 2013, Adobe announced that they fell victim to a cyberattack and their database was breached to the degree that 2.9 million customers are impacted in one way or another. From my point of...

View Article

Image may be NSFW.
Clik here to view.

Malware and the Risk to Cybersecurity

Malware is widespread and continues to grow with each passing day. There are even recent reports that adware vendors are actively purchasing Chrome extensions to peddle their adware and malware. If you...

View Article

Creating Accessibile Documents

Creating or converting existing documents into accessible formats is a simple process. This post provides instructions on how to take advantage of the accessibility features in Microsoft Word,...

View Article

Image may be NSFW.
Clik here to view.

Why oh Why Does SQLi Continue To Be a Problem

So far this year it seems just about every new day brings a new data breach. Now to be fair, I do not know how organizations are being breached, but I would tend to believe that SQL injection may be...

View Article


Image may be NSFW.
Clik here to view.

Computer Forensics Tools: Windows Registry

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court...

View Article

Browsing latest articles
Browse All 80 View Live




Latest Images