Posts Tagged ‘Security’


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? We need your support Thanks!

So Everyone Mr. Fail, yesterday released a drunken security audio post…. Did you even understand what the heck he said???

I did not, however I am sitting here in class with him now and he still don’t make any sense haha.
He is sitting right next to me and when he reads this…. I think I will be in trouble…
Any how any ways, Classes on Saturday mornings suck monkey butt let me tell ya! It’s the simple fact I have to get up early and start using my brain that does not want to work this early on this particular day. Hell I still have a 5 page paper to write, along with an 8-10 page paper on cell phone forensics. In which I will share with you all when I have completed it. So look forward to it here in the next couple weeks.
Well I have to get back to listening to my teacher… it’s only a lecture!

MoonPie


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

I think I am gong to try and make a drunk security post about once a month, or so.Student Tased @ WKU Subway

In this first episode I discuss passwords, and even though I sound really drunk, I am only intoxicated (proof: I could log in to wp, and make intelligible statements after doing so).

I also forgot what I was going to say half way through, so this one is quite short, and in the future, I will try to write out the this before hand.

Either way, this is the first post in over a week, some it love, okay?

So, you may be asking, what the fuck are we doing around here? Not much, really. I personally have been working on some more background shit for the blog, as for the others, I don’t really know. Either way, I am out for now.
Remember, stay “chummy” my friends… Even when drinking.


It’s been a good run so far with FFI, and although we have a few slow-downs recently, we’re still growing every day.

Rainy Lake - August 2011-13

Rainy Lake - August 2011-13 (Photo credit: fabfotophotography)

If you are a reader of one little blog, casual or otherwise, you most likely won’t understand the title of this entry, and that’s a-ok. If you’re an author, most likely you won’t either, but you should and shame on you.

This date, August 13 2011, was when over one-thousand collective brains got to see the beauty that is Fisch Fail Inc. It was also the day that I noticed our blog was becoming something of a big deal. Honestly until that point I mostly blogged for no one, except for maybe myself and Mr. Fail, but afterward I began doing it for a lil ones… I mean the readers.

Seriously though; you guys have gotten us to new heights, and for that I am thankful.

A lot of crap has gone down recently (more on that later) so the blog has gotten somewhat neglected as of late, but hopefully that will change and more posts will be on their way.

Here’s to getting 1000000 views before the end of the year!


Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

Fisch Fail, INC, is still a baby, still growing, still something…infant

If we were a human baby, we would be learning to speak, and maybe eat something that didn’t have the consistency of baby food. But fuck, we’ve already moved on to tacos and alcohol… Says something about us!

Anyway, yesterday we hit a random milestone… 20,000 views (and damnit, I was going to make sure I got to make this announcement!).

So, it took us nearly a year and a half to get our first 10,000… It took us 6 months, to get our second.

Lets try and beat that record (for us) even quicker.

Tell everyone about FFI, let’s do it!

 

 

 


So I’ve been reading a lot of suvivalist/self-defense manuals as of late (more on the specifics later) and it really makes me think about how truly unprepared I am.

Unprepared for what, you may ask?

Every-goddamn-thing…

If my house happened to collapse (a very real possibility)…

If I were mugged by someone who would just kill me anyway…

If I found myself stranded in a location both remote and unsavory…

If Chuck Norris knocked on my door…

Well I’d be pretty much fucked if the last happened despite preparation… but seriously.

I live my fucking life now… I don’t just meander through my bleak existence like so many leaves blown in an unpredictable gale!

I need to figure out how to become more epic than I currently am…

…this could be difficult.

We’ll just have too see where this goes…

Luz-Fucking-Ob

aka

 

 

 


Gateway firewall
Image via Wikipedia
Welcome, don’t forget to share this blog with your friends and subscribe for the latest in entertainment. And if you use StumbleUpon, go ahead and give us a thumbs up, would ya? Thanks!

Firewall Implementation is serious business and careful consideration and planning is essential for keeping an organizations network safe from intruders. Firewalls are a system that monitors and controls the network traffic flow of many networks using different security measures. Firewall architectures need to be chosen based on the needs of the organization, while there are many factors involved the most effective solutions are configured in such a way that all network traffic passes through them.

There are four common firewall architectures such as: packet filtering routers, screened-host firewalls, screened-subnet firewalls and dual-homed host firewalls. All of these choices provide different types of security for your organizations network, dependent upon their needs. There are advantages and disadvantages to consider when implementing a firewall system into your organizations network.

First, we should be aware that there is not a network that is 100 percent protected
and will always be forever changing as new technologies roll out and new
vulnerabilities are discovered. We can minimize the risk with firewalls if
configured correctly otherwise an IT guy can make the security of the network
worse. Firewalls can control access to the internal network protecting from
malicious intrusions but not viruses because firewalls do not see what the
packets contain as they pass through. With that said configuring user
authentication helps prevent security breaches within the network.

MoonPie


So here is my first of many Security articles to come although these will not be super technical, I do hope
that the readers will have a better understanding of security on the internet.
Why am I writing these articles since there are so many of them out there now as
it is? Of course I am in college studying for my Bachelors in Information Technology and Security that’s why.

Now on to the good stuff!

Today I am going to talk a bit about Web Applications and how secure they are. What are Web Applications?
We use them every day but most users don’t realize it. Users would only consider these as just websites. The days of static websites are gone and in with the ever growing popular web apps are in.

Want examples of Web Applications:

The question is do you the user who uses these websites know if the information you input such as login,
passwords, registration info, credit card numbers and other private information is safe and secure?

These are just not websites but Web Applications that allow user input. How do these Web Apps protect out private
and sensitive information? I do my banking online all the time and rely on my banks web app to protect my info.

 

Most people look for SSL Technology, certificates and Versign logos on the web pages to ensure the
customer that their information is secure. In fact, it is while in transit. The
problem is once it reaches the servers how do we know as users that are information is being kept safe.  This may
leave you pondering now on just how safe is our information that is residing on
a server that may or may not become compromised by hackers due to vulnerabilities
in the web apps. It takes a lot of trust by us, users, to still buy online and pay your bills online.

There are many ways to bypass security on servers once your information has reached its destination. Some are
as easy as inputting a command in the web app. This is due to poorly developed web apps with security flaws in the code. Broken authentication, broken access controls, SQL injections, Cross-site scripting and information leakage are just
examples of vulnerabilities web developers manage to forget to protect our information against.

That’s it for now readers; I hope this was not too technical? I also hope you have gained a better understanding
of web application security. For more information on vulnerabilities just click the links I have provided in this article.

MoonPie