Thursday, October 4, 2012

How to use the System File Checker in Windows 7 and Windows Vista

About System File Checker

Sometimes, you wonder why your Windows computer doesn't cooperate and loads in a way that scares you. You might also get a message saying "Error loading XXXXX.DLL," or an icon becomes so arrogant it won't do a single thing even if you click it a million times. Can you related to this? Frustrating indeed.

I haved moved the original post to a more appropriate blog called
The How to Helpdesk - http://how-to-helpdesk.blogspot.com.au/

Please visit and see topics about windows utilities, tips, and tutorials.

Monday, October 1, 2012

Best Anti-Malware Defense for your PC? - A Review of Comodo Internet Security Complete 2012

After being plunged into the world of information security, I became more serious about my choice of free anti-malware programs. Yes, I am kinda thrifty (or cheap if you want to call me that).


I have moved the original post to a more appropriate blog called:
Cyber Security Reviews  - http://cybersecurity-reviews.blogspot.com.au/.

I found Entreprengineering to be a bit chaotic as it represents all my random thoughts. But since most readers prefer to look for specialized topics, I have a created different blogs to suite their needs. Cyber Security Reviews will focus more on cyber security topics (security news, tips, books reviews, software reviews, etc...)

Monday, September 24, 2012

A Look at CertifyDumps:A Home for Successful Certification Training


Looking for sample CCNA exam questions/answers? CertifyDumps might be the answer to your problem. I haven't tried them yet, but they have sample exams from different vendors like Cisco, SAP, VMware, etc..

Can someone out there give some inputs on the quality of materials that they have?

Below is taken from their website.
Certify Dumps is the best resource available online today for IT Professionals who wish to get certified instantaneously by achieving their desired IT certifications from different Certification vendors. Here at Certifydumps, we offer exclusive IT Certification Training Tools including Practice Questions & Answers with Explanations and Study Guides. Our advanced training tools are optimized for bringing you fastest success rate in any IT Certification Exams.
With thousands of satisfied clients, Certify Dumps is your ultimate Training resource for every major vendor and their Certification Exams. We stay ahead of the crowd with the latest and most accurate Questions and Answers. You can use our study guides anywhere you want for reference or for a comprehensive Certification preparation.
Below is a link to their website.

Cerify Dumps: A Home for Successful Certification Training

Book Review: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

I just read the Dafydd Stuttard's 2nd edition of The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. I've read many book on penetration testing. But this one takes the lead as far as securing your web applications go.

I have moved the original post to a more appropriate blog called:
Cyber Security Reviews  - http://cybersecurity-reviews.blogspot.com.au/.

I found Entreprengineering to be a bit chaotic as it represents all my random thoughts. But since most readers prefer to look for specialized topics, I have a created different blogs to suite their needs. Cyber Security Reviews will focus more on cyber security topics (security news, tips, books reviews, software reviews, etc...)

Friday, September 14, 2012

Microsoft Disrupts the Emerging Nitol Botnet

Way to go Microsoft! Good job.

Microsoft has yet again stopped another botnet from spreading. This time, it's Nitol. It's the second botnet stopped in the last six months.


Check out the link to the Official Microsoft Blog.

Monday, April 23, 2012

Paranoia and Security

With all the havoc and mayhem happening in cyberspace these days, what do people still think of security? Is it still feasible/achievable? Should we still even care about it? Should we change our attitude towards security? 

One quote strikes me and I'll share it below:

"The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn't stake my life on it."

-- Gene Spafford, Director, Computer Operations, Audit, and Security Technology (COAST) Project, Purdue University

I don't think Mr. Spafford was really saying that security is unattainable. Well, maybe he was. But the message is to take security seriously and not to be complacent at all. Security professionals, especially the ones protecting the perimeter, should have a healthy dash of paranoia sprinkled on their psyche.




Thursday, April 19, 2012

Kompozer

Do you wan to create and edit web pages like they are office documents? Then look no further... Kompozetr offers the ease of use which you need to start creating and editing web pages immediately.

Kompozer's Screenshot

One can download Kompozer here. Another window will open after you click this.You will see that it is a free and open source software, so please feel free to support the project. This will really help the developers to create better versions of this tool.

Below is a series of video tutorials in YouTube.








Have fun and start creating your first website!

Wednesday, February 1, 2012

Notes on Understanding TCP SYN Flooding Attacks

The basis of the SYN flooding attack lies in the flaw of how the 3-way handshake initiates. The 3-way handshake is initiated at the start of a TCP connection. The third packet which completes the handshake, confirms the source's ability to receive packets at the IP address it used.

The key to success in this DoS attack is the Transmission Control Block (TCB). The TCB is a data set of structures in operations systems that holds all the information about a connection. Each TCB > 280 bytes, and can exceed 1300 bytes in other operating systems. After the first part of the 3-way hand-shake is finished, the connection is only half-open. TheIt is very important to note is that the TCB is already allocated based on reception of the SYN packet— before the connection is fully established.

 A flood of incoming SYN requests can cause the allocation of so many TCBs such that  a host's kernel memory becomes exhausted. Although there is a backlog mechanism in most operating systems, this can easily be filled up. Thus, new requests cannot be served until some TCBs can be freed up from the half open connection state.

Since TCP protocol is designed for reliability, the target host tends to wait for a long time with the half-open connections, until the 3-way handshake is completed. 

More on this article right here from Cisco.