WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that malicious hackers are always attacking WordPress sites every minute? If you didn’t, now you know. The first step towards securing your website or blog is to perform a vulnerability assessment. […]

Read more

How to install Root Certificate Authority on Windows Server 2012

This guide will have two parts. The first one will be Installation and Configuration of Root Certificate Authority and the second one will be the post configuration settings. Installation of Root certificate Authority Open Server Manger, click on Add Roles and Features from the dashboard. Next select the Role based or feature based installation and click Next. On the next […]

Read more

Net Commands – Network Security Management

The NET Command is used to manage network security resources as follows: View user account password and logon requirements (also displays the machine type – Server or workstation) NET ACCOUNTS View password and logon requirements for the network domain. NET ACCOUNTS /DOMAIN Set the number of minutes a user has before being forced to log off when the account expires […]

Read more

How the NSA is infiltrating private networks

The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data traffic. The operation intercepts information flowing between the enormous data centers that those companies maintain around the world. In general, Google and Yahoo use privately owned or leased lines to […]

Read more

Firewalls 101

Firewalls have become an indispensable part of computer security, but they can be intimidating for a new administrator. In this article I will explain the inner workings of a firewall and some common firewall features in an easy to understand manner. Network Address Translation Your firewall’s number one job is to separate your private network from the Internet, and use […]

Read more

How to Block Websites

This post will show you how to block websites, without the installation of website blockers or other programs to block websites. Fortunately, all desktop operating systems (Windows, Macintosh OS X, Linux) have a built-in mechanisms that make it very easy to do. Blocking Websites with the Hosts File The hosts file contains a shortcut list for assigning name addresses (such […]

Read more
1 2