Posts Tagged ‘Security’


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? We need your support Thanks!

So Everyone Mr. Fail, yesterday released a drunken security audio post…. Did you even understand what the heck he said???

I did not, however I am sitting here in class with him now and he still don’t make any sense haha.
He is sitting right next to me and when he reads this…. I think I will be in trouble…
Any how any ways, Classes on Saturday mornings suck monkey butt let me tell ya! It’s the simple fact I have to get up early and start using my brain that does not want to work this early on this particular day. Hell I still have a 5 page paper to write, along with an 8-10 page paper on cell phone forensics. In which I will share with you all when I have completed it. So look forward to it here in the next couple weeks.
Well I have to get back to listening to my teacher… it’s only a lecture!

MoonPie


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

I think I am gong to try and make a drunk security post about once a month, or so.Student Tased @ WKU Subway

In this first episode I discuss passwords, and even though I sound really drunk, I am only intoxicated (proof: I could log in to wp, and make intelligible statements after doing so).

I also forgot what I was going to say half way through, so this one is quite short, and in the future, I will try to write out the this before hand.

Either way, this is the first post in over a week, some it love, okay?

So, you may be asking, what the fuck are we doing around here? Not much, really. I personally have been working on some more background shit for the blog, as for the others, I don’t really know. Either way, I am out for now.
Remember, stay “chummy” my friends… Even when drinking.


It’s been a good run so far with FFI, and although we have a few slow-downs recently, we’re still growing every day.

Rainy Lake - August 2011-13

Rainy Lake - August 2011-13 (Photo credit: fabfotophotography)

If you are a reader of one little blog, casual or otherwise, you most likely won’t understand the title of this entry, and that’s a-ok. If you’re an author, most likely you won’t either, but you should and shame on you.

This date, August 13 2011, was when over one-thousand collective brains got to see the beauty that is Fisch Fail Inc. It was also the day that I noticed our blog was becoming something of a big deal. Honestly until that point I mostly blogged for no one, except for maybe myself and Mr. Fail, but afterward I began doing it for a lil ones… I mean the readers.

Seriously though; you guys have gotten us to new heights, and for that I am thankful.

A lot of crap has gone down recently (more on that later) so the blog has gotten somewhat neglected as of late, but hopefully that will change and more posts will be on their way.

Here’s to getting 1000000 views before the end of the year!


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

Fisch Fail, INC, is still a baby, still growing, still something…infant

If we were a human baby, we would be learning to speak, and maybe eat something that didn’t have the consistency of baby food. But fuck, we’ve already moved on to tacos and alcohol… Says something about us!

Anyway, yesterday we hit a random milestone… 20,000 views (and damnit, I was going to make sure I got to make this announcement!).

So, it took us nearly a year and a half to get our first 10,000… It took us 6 months, to get our second.

Lets try and beat that record (for us) even quicker.

Tell everyone about FFI, let’s do it!

 

 

 


So I’ve been reading a lot of suvivalist/self-defense manuals as of late (more on the specifics later) and it really makes me think about how truly unprepared I am.

Unprepared for what, you may ask?

Every-goddamn-thing…

If my house happened to collapse (a very real possibility)…

If I were mugged by someone who would just kill me anyway…

If I found myself stranded in a location both remote and unsavory…

If Chuck Norris knocked on my door…

Well I’d be pretty much fucked if the last happened despite preparation… but seriously.

I live my fucking life now… I don’t just meander through my bleak existence like so many leaves blown in an unpredictable gale!

I need to figure out how to become more epic than I currently am…

…this could be difficult.

We’ll just have too see where this goes…

Luz-Fucking-Ob

aka

 

 

 


Gateway firewall
Image via Wikipedia
Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

Firewall Implementation is serious business and careful consideration and planning is essential for keeping an organizations network safe from intruders. Firewalls are a system that monitors and controls the network traffic flow of many networks using different security measures. Firewall architectures need to be chosen based on the needs of the organization, while there are many factors involved the most effective solutions are configured in such a way that all network traffic passes through them.

There are four common firewall architectures such as: packet filtering routers, screened-host firewalls, screened-subnet firewalls and dual-homed host firewalls. All of these choices provide different types of security for your organizations network, dependent upon their needs. There are advantages and disadvantages to consider when implementing a firewall system into your organizations network.

First, we should be aware that there is not a network that is 100 percent protected
and will always be forever changing as new technologies roll out and new
vulnerabilities are discovered. We can minimize the risk with firewalls if
configured correctly otherwise an IT guy can make the security of the network
worse. Firewalls can control access to the internal network protecting from
malicious intrusions but not viruses because firewalls do not see what the
packets contain as they pass through. With that said configuring user
authentication helps prevent security breaches within the network.

MoonPie


So here is my first of many Security articles to come although these will not be super technical, I do hope
that the readers will have a better understanding of security on the internet.
Why am I writing these articles since there are so many of them out there now as
it is? Of course I am in college studying for my Bachelors in Information Technology and Security that’s why.

Now on to the good stuff!

Today I am going to talk a bit about Web Applications and how secure they are. What are Web Applications?
We use them every day but most users don’t realize it. Users would only consider these as just websites. The days of static websites are gone and in with the ever growing popular web apps are in.

Want examples of Web Applications:

The question is do you the user who uses these websites know if the information you input such as login,
passwords, registration info, credit card numbers and other private information is safe and secure?

These are just not websites but Web Applications that allow user input. How do these Web Apps protect out private
and sensitive information? I do my banking online all the time and rely on my banks web app to protect my info.

 

Most people look for SSL Technology, certificates and Versign logos on the web pages to ensure the
customer that their information is secure. In fact, it is while in transit. The
problem is once it reaches the servers how do we know as users that are information is being kept safe.  This may
leave you pondering now on just how safe is our information that is residing on
a server that may or may not become compromised by hackers due to vulnerabilities
in the web apps. It takes a lot of trust by us, users, to still buy online and pay your bills online.

There are many ways to bypass security on servers once your information has reached its destination. Some are
as easy as inputting a command in the web app. This is due to poorly developed web apps with security flaws in the code. Broken authentication, broken access controls, SQL injections, Cross-site scripting and information leakage are just
examples of vulnerabilities web developers manage to forget to protect our information against.

That’s it for now readers; I hope this was not too technical? I also hope you have gained a better understanding
of web application security. For more information on vulnerabilities just click the links I have provided in this article.

MoonPie


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!
Interesting approach to computer security

Image by formalfallacy @ Dublin (Victor) via Flickr

So, here at Fischfailinc, we’ve mentioned exciting things
are in store for our faithful readers.

I, Moonpie, the one and only will be posting more articles
relating to Security, Computer security that is.

I find it fascinating, yet it will also enlighten me as well
as you readers about the importance of computer, internet, applications and data
protection. I will try my best to put it all in non-technical terms for our
readers.. Yet also teach a bit about being more secure online!

I hope you guys enjoy the upcoming post by me (MoonPie)

MoonPie


So, it’s officially the one year anniversary of Fish Fail, INC. What can we do to mark this momentous occasion? Talk about what we always talk about… That’s right POOP!

Now this was mentioned a while back when I spoke of my first pooping experience. There really isn’t much to this story but it’s funny all the same.

When I was younger and living at my mom’s I had to poop and bad. This was a make or break kind of situation. I ran up the stairs, and past my mom entertaining guests in the kitchen. I run to the bathroom. My sister was in it at the time and I REALLY had to go.

So I run further down the hall to my mom’s bathroom. Here is where it gets funny. My mom has a small counter-top in front of the toilet. I forget this as I pull my pants down with urgency and sit down on the toilet with all the ferocity of a Creeper about to explode.

WHAM! I bang my head on the counter-top. Ignoring this I continue about my business, until I see blood on the floor. That’s right, I split my head open while pooping. I didn’t know if I should wipe my head or my ass. Eventually, after I’m done I go back to tell my mother what happened. She took me to the hospital, where I got eleven stitches.

Oh, and by the way… Your favourite Internet Sensation has returned!

 


We here at FF IT’S OUR EFFING BIRTHDAY! We are in need of celerecreajubilation! What should we do to enjoy this wondrous week? You… yeah YOU… let us know! …or I’ll stab you in the face w/ a soldiering iron… seriously…

By the way… Luz is BACK bitches!

 


Fisch Fail, INC is officially a year old now. Celebrate with us! Buy us stuff! Or just send us some donations so we can continue to do what we do…  I’ve got some plans for you all. Including a few tonight.


This is a public pat on the back to Fisch Fail Inc. for it’s 100th comment! Take it in, boys and girls, we’re going for a lot more, so keep reading and we’ll keep posting.

For right now, though, I will be busy watching my favorite show, so deal with it.

Hooray!

I am the security guy

Posted: August 14, 2010 by fischfail in Computers, Employment, Security
Tags: , ,

I work for a security company as I have mentioned dozens of times. And I am also working on a new version of a program I had written them, also as I have mentioned. But I am currently working on the database for said program. And there is something that I always forget about (until I am at this location) that always shocks and appalls me: the complete lack of security regarding data at this location.

But wait, there’s more