It is that time of year again. Weather is getting nice and that brings out the army of people that some security alarm companies hire during the summer to knock on your door. These companies send large numbers of teams out on the streets and go door-to…
What Do We Think About Vivint Home Security
Another national company you will see advertised is Vivint. Â The equipment they install is very good. Â In fact, it is the same equipment we install: Reliable Home Security alarm equipment with Z-Wave enabled However, Vivintâs pricing model is to offer a little more upfront but load up with very high monthly monitoring rates. Â $50, $60 […]
The post What Do We Think About Vivint Home Security appeared first on Reliable Home Security.
The Evolution of Mobile Security
Today, I posted a blog entry to the Oracle Identity Management blog titled Analyzing How MDM and MAM Stack Up Against Your Mobile Security Requirements. In the post, I walk through a quick history of mobile security starting with MDM, evolving into MAM…
A Guide To Google Hacking Techniques
Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it’s like a part of our daily routine.
Google hacking does not mean to hack Google’s site/server, it means likely to be smart in Google search. Almost every kind of …
Kali Linux Metapackages
One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…
Deep Data Governance
One of the first things to catch my eye this week at RSA was a press release by STEALTHbits on their latest Data Governance release. They’re a long time player in DG and as a former employee, I know them fairly well. And where they’re taking DG is pret…
RSA Conference 2014
I’m at the RSA Conference this week. I considered the point of view that perhaps there’s something to be said for abstaining this year but ultimately my decision to maintain course was based on two premises: (1) RSA didn’t know the NSA had a backdoor w…
IAM for the Third Platform
As more people are using the phrase “third platform”, I’ll assume it needs no introduction or explanation. The
mobile workforce has been mobile for a few years now. And most organizations have moved critical services to cloud-based offerings. It’s not…
How To Protect In Cafe/Public Computers While Surfing Internet?
People who surf internet on cafe/public computers, are more vulnerable to be hacked, reason is simple! They are unaware from the software installed on public computers, their privileges. It’s always secure to access internet from your personal computer…
Tutorial On DNS Cache Poisoning (Redirect abc.com By Entering xyz.com In Address Bar)
Hello guys! Today I’m going to post about a hacking technique named “DNS Spoofing or DNS Cache Poisoning”. DNS cache poisoning is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server’s cache database, c…