Security
From iGeek
Articles about Security (usually cyber-security, but also physical).
~ Aristotle Sabouni
Created: 2022-05-24 |
As a kid, I explored the dark side of hacking, cracking and phreaking... and as an adult, I challenged myself to get a CISSP : a 5 hour test/certification on computer security. While cramming with many professionals, it was nice to find that the top 10-20% in any one domain, knew more than me in that area, but I had the widest breadth of knowledge in the room.
Security • [12 items]
Cracking |
---|
Cracking is the black art of removing copy protection from other people's programs. There are many "pirates" (people that use software without buying it) -- but far fewer crackers. Cracking requires enormous dedication and patience. It was far easier in yesteryear (systems were simpler) -- but now days there are better tools, so in some ways that makes it easier. |
Easter Eggs |
---|
What are easter eggs, and where do they come from? And I'm not talking about the physical ones in springtime, I'm talking about hidden features or credits in software. |
Firewalls |
---|
A firewall (in real life or software) is something that protects one area from another to keep a fire from spreading. In computers and networking it basically does the same thing, but the "fire" that it is trying to slow/stop is an intruder or security leak. |
Hack, Crack or Phreak |
---|
What are Hackers, Crackers and Phreaks? I did a little of all three, but that was decades ago (literally), and in computer times that is ancient history. But the concepts are still valid -- even if I'm no longer "plugged in" or have lost interest in doing them. |
Hacking |
---|
It is not that hard to hack into a network/machine, but far harder (and different) than the movies make it seem. There are many levels to break in -- from the ballsy "impersonating an employee" (social hacking) and just walking around a company, to stealing network traffic and analyzing it. |
Hollywood Hackers versus real life |
---|
While I'm not exactly an intrusion or defense expert, I do know more than about 99% of the public and have a CISSP (a broadly recognized security credential). And I a can say that Hollywood doesn't know shit about computer security. |
How Secure are you? |
---|
How secure are your devices from intruders? The answer is "it depends", on a lot of things, like what machine you have, what you do, and so on. The OS's are more secure than the Apps you run. And iOS is best, then Android/Chrome, Mac, Unix, Windows. Store apps are safer than random downloads from the Internet. |
Online Shopping |
---|
Shopping and Physical Security: One of the areas that people are very concerned about security is on-line shopping. I think they are often focusing on the lesser threats. People can hack your online shopping -- but it's a lot of work. It's far easier to steal your information through other means. |
Passwords |
---|
The reason there's so many annoying password requirements, is because passwords are so instrumental to security (and human nature is so predictable). That being said, most of those annoying password requirements are doing it wrong, and just annoying customers. |
Phreaking |
---|
Phreaking is when hackers broke the phone companies security, to get access to control the phones. Most often used to make free phone calls, or get operator powers. Because of improvements in security, consequences of getting caught and commoditization of long distance phone call costs, it largely doesn't exist any more. |
Privacy |
---|
Privacy and the web: how safe is your info? The other night I was watching a Television show that discussed computers and privacy, and like a geek, I was getting annoyed and talking back to the show; it seems that Hollywood needs to get better technology consultants instead of terrorizing the public with misinformation and calling it entertainment. |
Virus, Worms, Trojans |
---|
Virus, Worms and Trojans, some various hacker terms/attacks explained (simply). |
🔗 More
| |
| |
| |