background preloader

Nessus Vulnerability Scanner

Nessus Vulnerability Scanner

Speakeasy Speed Test Why do I get a “socket error” message? An error may result from having the speed test open in more than one browser tab or window. The test may fail to complete and display the following message: “A socket error occurred during the Upload test. Please try again later.” To prevent this error, and get the most accurate test results, close all other browser tabs and windows before running. If you continue to get a socket error message, or another type of error message, please provide feedback by emailing us at speedtestfeedback@fusionconnect.com. Why is the location I usually pick missing from the City list? A slow response can be caused by latency or packet-loss between the client and server, or particularly high Internet usage (during peak hours). In which browsers does the Speed Test work best? Why am I receiving “Could not connect to the Internet” errors when I am connected? Why didn’t the test choose the server location nearest me? Why is my speed lower than expected?

DigiCert SSL Certificate Discovery Tool With the SSL Discovery Tool you can perform manual and automatic scans. Manual scanning lets you search your network by a list of hosts or IP ranges or by a Host Group. Auto scanning allows you to schedule periodic scans at specified intervals (daily, weekly, or monthly) in order to detect and be notified of changes to your active certificate inventory. SSL Certificates are supposed to make life easier, so don't let managing them make your life more difficult. Superfish CA + Komodia vulnerability test This test has been retired in favor of the badssl.com Dashboard. You can still find Superfish removal instructions here. Test disabled. YES, it looks like you have a Komodia proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at the moment, but you can follow the Superfish ones with the name of the software you installed instead of "Superfish". Here is an incomplete list of known affected softwares: "Keep My Family Secure", "Kurupira", "Qustodio", "Staffcop", "Easy hide IP Classic", "Lavasoft Ad-aware Web Companion". YES, you have a big problem - even if it's not Komodia. Apparently no certificates checks are happening. This might be due to the browser you are using (if it's not a major one) or to software you are running, like PrivDog. See here for instructions on removal. Also no other SSL-disabling product was detected on your system. What's this about?

Test your server for Heartbleed (CVE-2014-0160) If there are problems, head to the FAQ Results are now cached globally for up to 6 hours. Enter a URL or a hostname to test the server for CVE-2014-0160. All good, seems fixed or unaffected! Uh-oh, something went wrong: Check what it means at the FAQ. Here is some data we pulled from the server memory: (we put YELLOW SUBMARINE there, and it should not have come back) Please take immediate action! You can specify a port like this example.com:4433. 443 by default. Go here for all your Heartbleed information needs. If you want to donate something, I've put a couple of buttons here.

Defense in depth (computing) Defense in depth is an information assurance (IA) concept in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical for the duration of the system's life cycle. The idea behind the defense in depth approach is to defend a system against any particular attack using several independent methods. It is a layering tactic, conceived by the National Security Agency (NSA) as a comprehensive approach to information and electronic security.[1][2] Defense in depth is originally a military strategy that seeks to delay, rather than prevent, the advance of an attacker by yielding space in order to buy time. Using more than one of the following layers constitutes defense in depth.

Sandbox (computer security) In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites.[1] The sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. Sandboxing technology is frequently used to test unverified programs which may contain a virus or other malignant code, without allowing the software to harm the host device.[2] Examples of sandboxes include: Security In-Depth for Linux Software: Preventing and Mitigating Security Bugs (PDF)

Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown Among the advances offered to it users, Windows 7’s handling of virtual memory is the most efficient to date. However, as the RAM in a computer increases, so must the size of the pagefile to accommodate the larger capacity of computer memory. There are several advantages to starting each Windows 7 session with a cleared pagefile. Learn about virtual memory and how to force Windows 7 to clear your virtual memory pagefile whenever the operating system shuts down. What is Virtual Memory? The amount of memory you can put into your computer is finite. The amount of hard drive space set aside for virtual memory ranges from zero to about 1 to 2 times the memory you have installed in your computer. Why Clear Virtual Memory? When you shutdown Windows 7, the data in your computer’s RAM is lost because PC memory is volatile. Virtual memory is quite secure within Windows 7 because only the operating system has the authority to read and write to the virtual memory pagefile.

Download Microsoft Baseline Security Analyzer 2.3 (for IT Professionals) from Official Microsoft Download Center <a id="b7777d05-f9ee-bedd-c9b9-9572b26f11d1" target="_self" class="mscom-link download-button dl" href="confirmation.aspx?id=7558" bi:track="false"><span class="loc" locid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d" srcid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d">Download</span></a> The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations. MBSA 2.3 release adds support for Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012. Windows 2000 will no longer be supported with this release.

List of Printers Which Do or Do Not Display Tracking Dots Introduction This is a list in progress of color laser printer models that do or do not print yellow tracking dots on their output. We are in the process of trying to interpret the information conveyed by these dots as part of our Machine Identification Code Technology Project. Limitations of this information A "no" simply means that we couldn't see yellow dots; it does not prove that there is no forensic watermarking present. A "yes" simply means that we (or another source, as noted) saw yellow dots that appeared anomalous to us. Sources of information We have employed three sources of information. Thanks to our friends at software firms and symphonies, public schools and physics labs, semiconductor fabs and ice cream parlors, in about a dozen countries around the world. Table of printers

Online Backup vs. Offline Backup – Differences, Pros and Cons – 2014 Edition When we talk about backups, people will immediately see having DVDs, tapes, or external hard drives with copies of our important data on them. Many will also think about offsite remote backups such as backing up to a cloud storage provider. For both personal and and business uses, a good backup strategy always involves having redundancy in case of the failure of one backup copy. Unfortunately, many don’t practice it. Disasters can end your business In 2010, Nashville, TN got hit by a violent storm. Very recently, a friend of mine in Vietnam had a fire in his office building. What about personal users? A legit question. But all is not lost. Options at your fingertip There are two main options for backup. Offline Backup Basically, offline backup refers to using any local and offline data storage such as DVDs, CDs (who uses CDs nowadays anyway?) Pros Fast backup and restore. Easily accessible. Better safety. Mobility. Cons Natural disasters can kill them. Prone to theft. Hard drive failures.

Clear Your Browser History Automatically When Firefox Closes Do you share a computer with other family members or friends, or with co-workers at a workplace? When surfing the web in Firefox, you may not want the next person to use the computer to know what sites you have visited. Firefox allows you to automatically clear different types of history when you close the browser. NOTE: You can select Options either on the main Firefox menu or on the Options submenu. On the Options dialog box, click Privacy on the toolbar at the top. More options display under the drop-down list. To automatically clear your web history when you close Firefox, select the Clear history when Firefox closes check box. The Settings for Clearing History dialog box displays. Click OK on the Options dialog box to close it and save your changes. Now, you don’t have to worry about clearing your web history, such as downloads and cookies.

Hushmail – Private Email Open Whisper Systems Open Whisper Systems is a collaborative open source project that consists of "a large community of open source contributors, as well as a small team of dedicated developers".[1] Their mission is to "make private communication simple". The project was established in 2013 and is funded by a combination of donations and grants. §History[edit] §Background[edit] Security researcher Moxie Marlinspike and roboticist Stuart Anderson co-founded a startup company called Whisper Systems in 2010.[5][6] The company produced proprietary enterprise mobile security software. In November 2011, Whisper Systems announced that it had been acquired by Twitter. Twitter released TextSecure as free and open-source software under the GPLv3 license in December 2011.[5][11][12][13] RedPhone was also released under the same license in July 2012.[14] These were subsequently adopted by the community and the collaborative open source project later named itself Open Whisper Systems.[15] §Establishment[edit] §Funding[edit]

PRIVACY - How we protect you StartPage, and its sister search engine Ixquick, are the only third-party certified search engines in the world that do not record your IP address or track your searches. Every time you use a regular search engine, your search data is recorded. Major search engines capture your IP address and use tracking cookies to make a record of your search terms, the time of your visit, and the links you choose - then they store that information in a giant database. Those searches reveal a shocking amount of personal information about you, such as your interests, family circumstances, political leanings, medical conditions, and more. Major search engines have quietly amassed the largest database of personal information on individuals ever collected. In August 2006, the online world was jarred when AOL accidentally released three months' worth of aggregated search data from 650,000 of its users, publishing all the details in an online database. That database is still searchable. Shocked?

Related: