Hack-tualité by G-echo - Security Tips - Semaine 2019/2

Security Tips - Semaine 2019/2

Pentesting Cheatsheets - Red Teaming Experiments
Sun, 13 Jan 2019 10:35:04 GMT
Reconnaissance / Enumeration<p>Extracting Live IPs from Nmap Scan<p>Simple Port Knocking<p>DNS lookups, Zone Transfers & Brute-Force<p>Banner Grabbing<p>NFS …
Comment sauvegarder ses mails Gmail sur disque dur
Sat, 12 Jan 2019 20:53:19 GMT
Jennifer Mertens
Il est possible de sauvegarder l’ensemble des mails du service de messagerie Google sur disque dur. Une possibilité intéressante pour conserver une …
Windows 10 Expert's Guide: Everything you need to know about BitLocker
Sat, 12 Jan 2019 00:04:49 GMT
Ed Bott
Encrypting every bit of data on a Windows 10 PC is a crucial security precaution. Every edition of Windows 10 includes strong encryption options, …
Comment localiser et verrouiller un PC à distance ?
Thu, 10 Jan 2019 21:21:55 GMT
Retrouvez la trace d'un ordinateur perdu ou volé en activant à distance sa localisation et en le verrouillant.<p>Que vous possédiez un ordinateur …
Comment rendre mes messages et mes fichiers réellement privés ?
Tue, 08 Jan 2019 19:03:44 GMT
la rédaction de Futura
Aujourd’hui, notre vie privée en ligne peut être compromise de multiples façons, que ce soit à travers nos e-mails, nos fichiers stockés sur un …
Publication : Cartographie du système d’information
Wed, 02 Jan 2019 11:11:47 GMT
anssiAgence nationale de la sécurité des systèmes d'information<p>Déclaration vulnérabilité<p>en cas d'incident<p>alertes<p>presse<p>recrutement<p>Administration<br>• Bonnes …
Improving Cybersecurity at Home
Tue, 01 Jan 2019 15:04:17 GMT
<b>Disclaimer</b>: I am not a certified cybersecurity professional like my colleague Brendon Taylor.<p>I am however, like many who work in the IT industry, de …
Agile IT Security – What does your IT Security Roadmap look like?
Mon, 31 Dec 2018 08:57:43 GMT
Us Agile enthusiasts don’t like big projects. Instead, we like to split a big objective or goal into Epics and Features. If you are managing things …
How a Password Changed My Life
Sun, 30 Dec 2018 18:14:40 GMT
The following events occurred between ☹ and ☺.<p><i>“How could she do something like this to me?”</i> said a voice in my head. All the time. Every day.<p>Back in …
Android Security Best Practices | Android Open Source Project
Sat, 29 Dec 2018 17:51:00 GMT
• <b>Organizational and operational security</b>—Creating strong security practices in your team and organization.• <b><br>System security</b>—Reviewing and improving core …
Google Chrome : comment utiliser sa fonction anti-malware
Sat, 29 Dec 2018 02:33:13 GMT
<b>Google Chrome et les autres navigateurs font partie des applications les plus ciblées par les malwares, en particulier les adwares. Le navigateur de</b> …
The Year’s Biggest Data Breaches — And What To Do About Them
Thu, 27 Dec 2018 21:25:00 GMT
Nicole Nguyen
The databases at Marriott, Facebook, and more were breached this year. Here’s how to secure your account and protect yourself from identity …
SNDBOX : l'intelligence artificielle appliquée à l'analyse de fichiers malveillants
Thu, 27 Dec 2018 09:18:28 GMT
Quel RSSI n’a jamais rêvé d’être en capacité d’analyser un fichier suspect, de jouer le « pro du reverse engineering » malgré des connaissances …
6 Ways to Anger Attackers on Your Network
Wed, 26 Dec 2018 18:29:13 GMT
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.<p>1 of 7<p><i>(Image: ls_design �</i> …
How to secure your Ubuntu 18.04 Desktop installation with Uncomplicated Firewall
Wed, 26 Dec 2018 18:24:13 GMT
Jack Wallen
Looking for more security on your Ubuntu 18.04 desktops? You can't go wrong with enabling the firewall on the Ubuntu Desktop.<p>So you just installed …
How to configure—and harden—your managed Kubernetes services
Wed, 26 Dec 2018 07:50:42 GMT
<i>Sujit D'Mello, principal consultant with Microsoft, cowrote this article.</i><p>Most people consider Kubernetes, the popular container orchestrator, to be …
En bref : 4 gestes pour ne pas pourrir le Noël de votre grand-mère avec un objet connecté vulnérable
Fri, 21 Dec 2018 13:20:54 GMT
Corentin Durand
Avant de passer à la caisse avec votre lampe connectée, faites quelques vérifications.<p>Dans les foyers, les objets connectés concentrent de nombreuses …
Facebook: attention, ces publications sont des tentatives d'hameçonnage
Fri, 21 Dec 2018 11:34:46 GMT
Sur Facebook, des publications qui se présentent comme humoristiques circulent. Elles mènent à un site malveillant qui pourrait siphonner vos …
How to set up a Windows 10 computer: 5 essential steps
Fri, 21 Dec 2018 09:12:17 GMT
Brandon Vigliarolo
Getting a new PC is exciting, but you should follow these setup steps before using a Windows 10 machine.<p>Unwrapping a new PC, peeling off the …
Windows Sandbox is a new way to run untrusted apps without risking a virus
Thu, 20 Dec 2018 08:45:44 GMT
Jacob Siegal
You can never be too careful when it comes to opening files or email attachments from untrusted sources. Just one errant click could have disastrous …
7 digital privacy tools you need to be using now
Mon, 17 Dec 2018 02:52:19 GMT
By Michael Grothaus
Everyone wants your data. Here’s how to protect it.<p>This was not a good year for our data. In fact, like the previous year, it saw some of the most egregious breaches of our data in history. By far the most infamous one was the Facebook-Cambridge Analytica scandal. In March 2018 it was revealed that …
Fri, 14 Dec 2018 10:13:04 GMT
README.md<p>Andrwjkerr forked repository for www.sniferl4bs.com<p>The fork was done because the original author has not updated about 2 years ago.<p>Security …
Moonraker:1 Vulnhub Walkthrough
Fri, 07 Dec 2018 21:31:09 GMT
Raj Chandel
Hack into the Moonraker system and discover who’s behind these menacing plans once and for all. Find and destroy the Villain before it’s too late. …
Manage your online safety on hundreds of sites
Fri, 30 Nov 2018 09:13:27 GMT
Komando Staff, Komando.com
If you're anything like me, you visit several different websites on any given day. It seems that lately, more sites want you to create an account …
How Password Constraints Give You a False Sense of Security
Fri, 23 Nov 2018 05:50:17 GMT
David Murphy
The next time you’re forced to make a password—especially if a site requires you to use a crazy combination of uppercase and lowercase letters, or a …
How to Switch to Software Encryption on Your Vulnerable Solid-State Drive
Thu, 08 Nov 2018 23:50:30 GMT
Brendan Hesse
Researchers at the Netherland’s Radboud University have uncovered serious security issues with several solid-state drives that use hardware-based …
Hexacorn | Blog
Sun, 04 Nov 2018 09:36:50 GMT
This is a little nifty trick for detecting virtualization environments. At least, some of them.<p>Anytime you restore the snapshot of your virtual …
Making Windows 10 a bit more private by blocking Cortana with firewall rules
Fri, 26 Oct 2018 18:42:35 GMT
Michael Horowitz
Every now and then, I fire up the excellent (and free and portable) CurrPorts program by Nir Sofer. It shows the currently opened TCP and UDP ports …
By G-echo