Security

From iGeek
Security Bag Check - The Noun Project.svg
Articles about Security (usually cyber-security, but also physical).
Articles about Security (usually cyber-security, but also physical security).
ℹ️ Info          
~ Aristotle Sabouni
Created: 2022-05-24 

As a kid, I explored the dark side of hacking, cracking and phreaking... and as an adult, I challenged myself to get a CISSP : a 5 hour test/certification on computer security. While cramming with many professionals, it was nice to find that the top 10-20% in any one domain, knew more than me in that area, but I had the widest breadth of knowledge in the room.

Security • [12 items]

Cracking
Piracy.png
Cracking is the black art of removing copy protection from other people's programs. There are many "pirates" (people that use software without buying it) -- but far fewer crackers. Cracking requires enormous dedication and patience. It was far easier in yesteryear (systems were simpler) -- but now days there are better tools, so in some ways that makes it easier.
Easter Eggs
Binaryeasteregg.jpg
What are easter eggs, and where do they come from? And I'm not talking about the physical ones in springtime, I'm talking about hidden features or credits in software.
Firewalls
Firewall1.png
A firewall (in real life or software) is something that protects one area from another to keep a fire from spreading. In computers and networking it basically does the same thing, but the "fire" that it is trying to slow/stop is an intruder or security leak.
Hack, Crack or Phreak
HackCrackPhreak.png
What are Hackers, Crackers and Phreaks? I did a little of all three, but that was decades ago (literally), and in computer times that is ancient history. But the concepts are still valid -- even if I'm no longer "plugged in" or have lost interest in doing them.
Hacking
Hacking.jpg
It is not that hard to hack into a network/machine, but far harder (and different) than the movies make it seem. There are many levels to break in -- from the ballsy "impersonating an employee" (social hacking) and just walking around a company, to stealing network traffic and analyzing it.
Hollywood Hackers versus real life
CSICyber.jpeg
While I'm not exactly an intrusion or defense expert, I do know more than about 99% of the public and have a CISSP (a broadly recognized security credential). And I a can say that Hollywood doesn't know shit about computer security.
How Secure are you?
HowSecure.jpg
How secure are your devices from intruders? The answer is "it depends", on a lot of things, like what machine you have, what you do, and so on. The OS's are more secure than the Apps you run. And iOS is best, then Android/Chrome, Mac, Unix, Windows. Store apps are safer than random downloads from the Internet.
Online Shopping
OnlineShopping.jpeg
Shopping and Physical Security: One of the areas that people are very concerned about security is on-line shopping. I think they are often focusing on the lesser threats. People can hack your online shopping -- but it's a lot of work. It's far easier to steal your information through other means.
Passwords
Password1.jpeg
The reason there's so many annoying password requirements, is because passwords are so instrumental to security (and human nature is so predictable). That being said, most of those annoying password requirements are doing it wrong, and just annoying customers.
Phreaking
Phreaking.png
Phreaking is when hackers broke the phone companies security, to get access to control the phones. Most often used to make free phone calls, or get operator powers. Because of improvements in security, consequences of getting caught and commoditization of long distance phone call costs, it largely doesn't exist any more.
Privacy
Privacy2.jpeg
Privacy and the web: how safe is your info? The other night I was watching a Television show that discussed computers and privacy, and like a geek, I was getting annoyed and talking back to the show; it seems that Hollywood needs to get better technology consultants instead of terrorizing the public with misinformation and calling it entertainment.
Virus, Worms, Trojans
VirusWormsTrojans.jpg
Virus, Worms and Trojans, some various hacker terms/attacks explained (simply).

GeekPirate.small.png



🔗 More

Tech
Technology: Organizations, Reviews, People

Main Page
The root of all evil... and the home page for this website.

Tech
Technology: Organizations, Reviews, People



Tags: Tech  Main Page  Tech/tab


Cookies help us deliver our services. By using our services, you agree to our use of cookies.