Security Through Obscurity? This my first ever post and I feel it’s a pertinent one to mention. What is it and why is it bad? Security through obscurity can be said to be bad because...
Continue reading...General Security
The Remote Access VPN Battle — SSL vs IPSec VPN
I’ve recently posted two articles covering two different VPN connection methods. SSL Remote VPN and IPSec Remote VPN via Cisco ASA security applicance. In the article I promised I would go thru and do a...
Continue reading...PAC File and Web Proxy Auto-Configuration (WPAD) HowTo
Hello! I posted an article a while back on how to use a web proxy to block unwanted content. While this is good and fun, we need an easy way to configure clients to use...
Continue reading...What the IPSEC are you talking about?
What is IPsec? Most of the time when we are trying to establish a site-to-site or LAN-to-LAN connectivity between two independent parties over an untrusted medium we rely on IPsec. Internet Protocol Security (IPSec) is...
Continue reading...Reset Windows Administrator and the Linux Root passwords with Pictures!!
Resetting the Windows administrator’s password or Linux root account password is a common troubleshooting practice when faced with systems infected with mailware, data corruption, and system recoveries. This article does not prompt malicious use, but...
Continue reading...