public marks

PUBLIC MARKS from springnet with tag security

February 2008

How to Protect Your WordPress Site » Small Business Trends | small business experts

Here, from the voice of experience, is some advice for protecting your WordPress blog from hacking, or recovering quickly in case it happens to you:

January 2008

Why should you use Runscanner?

Runscanner is a completely free windows system utility which scans your system for all configured running programs. You can use runscanner to detect autostart programs, spyware, adware, homepage hijackers, unverified drivers and other problems.

December 2007

Security & Surveillance Cameras is a leading supplier of Security Cameras, Digital Video Recorders & DVR Security Systems. We offer complete security solutions that are becoming an absolute necessity for every business and home d

May 2007

February 2007 - Free Help Setting up Your Router or Firewall

by 3 others
ort Forwarding - Generally forwarding is done so the outside world can connect to some type of server that is located behind your router/firewall. Web servers, ftp servers, mail servers, computers running telnet, ssh, remote desktop, sql, and mysql are al

January 2007

Small Business Primer on Network Security Threats

As the volume of financial and other data transactions increase over the Internet, the potential for harm from network threats also increases. As a consequence, complex security measures that were once required by only Fortune 500 companies such as regula

December 2006

D-Link Wireless Internet Camera with 2-Way Audio

• 2-Way Audio1 and Built-in Motion Detection with E-mail Notification

Home & Home Office: WVC200 Wireless-G PTZ Internet Video Camera with Audio

Keep tab on your world with the WVC200 Wireless-G PTZ (Pan/Tilt/Zoom) Internet Video Camera from Linksys®. It produces high-quality video stream with a maximum resolutions of 640x480 pixels and a high frame rate, utilizing MPEG-4 video compression. Using

PhoneBAK Anti-theft software (PDA Phones)

PhoneBAK PDA Phones Anti-theft software for your device! "...will give you added security and a much bigger chance of recovering your lost phone..." Reviewed by Straits Times, Digital Life on 28 Nov 06.

Daily Cup of Tech » Recovering Your Lost Passwords

Cain & Abel is a very powerful tool that helps you to recover a number of passwords from Microsoft operating systems.

The Ethical Hacker Network - Essential Wireless Hacking Tools

by 6 others
Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant

November 2006 - Cain & Abel

by 7 others
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP con

September 2006

Top 100 Network Security Tools

by 11 others
After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowe

Qmail bugs and wishlist.

Given DJB's claims about qmail security, observing the behavior of some of his followers, their denying qmail bugs and calling people who name qmail bugs "trolls", I feel obliged to document a collection of warnings about qmail bugs, problems, with soluti

Slashdot | Building A Web-And Mail Server With CentOS 4.3

There seem to be "perfect setup" articles about every major Linux distro. I even used one on my own site. However, you need to be aware that these articles are written for ISP Config. In fact, they seem to be almost a viral marketing tool designed to pimp

Password Chart

by 1 other
Picking and remembering strong passwords is a pain. It's easier to convert an easy to remember one.

July 2006

Penetration Test

by 2 others
Welcome to - An information portal for Vulnerability Analysts and Penetration Testers. This started as a spin-off from what I do day in and day out at work. I hope it will prove useful to those new to the field and also it

Intrusion Detection With BASE And Snort | HowtoForge - Linux Howtos and Tutorials

by 1 other
This tutorial shows how to install and configure BASE (Basic Analysis and Security Engine) and the Snort intrusion detection system (IDS) on a Debian Sarge system. BASE provides a web front-end to query and analyze the alerts coming from a Snort IDS syste

netfilter/iptables project homepage - The project

by 2 others
Software inside this framework enables packet filtering, network address [and port] translation (NA[P]T) and other packet mangling. It is the re-designed and heavily improved successor of the previous Linux 2.2.x ipchains and Linux 2.0.x ipfwadm systems.

Wiretapped - Computer Security Software etc.

by 3 others
Wiretapped is an archive of software and information covering the areas of host, network and information security, network operations, cryptography and privacy, among others. We believe we are now the largest archive of this type of software & information

June 2006

springnet's TAGS related to tag security

*** +   **** +   antivirus +   austin +   austinblogger +   austincast +   blogging +   bugs +   business +   camera +   centos +   email +   firewall +   freebsd +   freeware +   hack +   hacking +   htaccess +   isntall +   lifecast +   lifecasting +   linux +   mail +   microsoft +   mobile +   network +   networks +   password +   patch +   pda +   penetration +   port +   products +   qmail +   rescue +   router +   shortcut:wifi +   springnet +   springnet blogmarks +   springnetdelicious +   spyware +   sxsw +   sysadmin +   texas +   tools +   ubuntu +   video +   walhus +   web +   webcam +   wifi +   windows +   wireless +   wordpress +