A windows based CLI (Command Line Interface) network scanning tool for identifying shared access e.g Writable/Readable of your LAN(Local Area Network) that helps network/system administrator quickly search for possible shared folder/files. Threaded scanning with single host or use -r option for range subnet ip. Here’s a sample echo from the…
Halo Configuration Scanning Overview
In this 5 minute video, you will learn how to clone a policy from the templates provided by CloudPassage, and create your own brand new policy. Detailed walkthrough: community.cloudpassage.com View full post on National Cyber Security
Top Ten Things You Didn’t Know About Nessus – #8 Nessus Performs Web Application Scanning
View full post on Tenable Network Security View full post on National Cyber Security
Webroot antivirus ditches signatures for cloud scanning
Webroot has launched a brand new antivirus system called SecureAnywhere that almost completely ditches malware signatures in favour of scanning a PC’s files against a cloud database. SecureAnywhere represents a radical if unproven technological overhaul and has been on the cards since the company bought small UK security company Prevx…
Webroot antivirus ditches malware signatures for cloud scanning
Webroot has launched a brand new antivirus system called SecureAnywhere that almost completely ditches malware signatures in favour of scanning a PC’s files against a cloud database. SecureAnywhere represents a radical if unproven technological overhaul and has been on the cards since the company bought small UK security company Prevx…
VirusBarrier for iPhone: Protect Your iPhone By Scanning for Malware [IPhone Apps]
iOS is pretty safe and secure, as there’s no known malware that’ll make your iPhone bug out and die. But! Your iPhone could act as a carrier to malware, bringing viruses to your computer without you even knowing. VirusBarrier puts a malware scanner on your iPhone so you never have…
LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software
LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software View full post on Twitter / LIGATT
LIGATT: C.Conducts penetration test to determine what an attacker can find out about an info system during the reconnaissance and scanning phases
LIGATT: C.Conducts penetration test to determine what an attacker can find out about an info system during the reconnaissance and scanning phases View full post on Twitter / LIGATT