Wednesday, February 26, 2014

Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)


A. CHAT rooms
B. WHOIS database
C. News groups
D. Web sites
E. Search engines
F. Organization's own web site

Answer: A, B, C, D, E, F

Explanation: A Security tester should search for information everywhere that he/she can access. You never know where you find that small piece of information that could penetrate a strong defense. 

Friday, January 3, 2014

Action Center

A feature in Windows 8.1 by which you can view and fix problems and run automated troubleshooters, among other things. 

Thursday, January 2, 2014

Anonymous FTP

A method by which computer files are made available for downloading by the general public .

Sunday, November 24, 2013

Facebook shortcuts for Mozilla Firefox and Google Chrome

Here are 12 amazing Facebook shortcuts that you might not know.

1. To create new message:


In Google Chrome: Alt+m 
In Mozilla Firefox: Shift+Alt+m

2. To view Help Center

In Google Chrome: Alt+0 
In Mozilla Firefox: Shift+Alt+0 

3. To visit the home page:

In Google Chrome: Alt+1 
In Mozilla Firefox: Shift+Alt+1

4. To visit the Profile Page

In Google Chrome: Alt+2 
In Mozilla Firefox: Shift+Alt+2 

5. To Manage Friend List

In Google Chrome: Alt+3 
In Mozilla Firefox: Shift+Alt+3 

6. To view message list

In Google Chrome: Alt+4 
In Mozilla Firefox: Shift+Alt+4 

7. To view the notification page

In Google Chrome: Alt+5 
In Mozilla Firefox: Shift+Alt+5 

8. To view the account settings

In Google Chrome: Alt+6 
In Mozilla Firefox: Shift+Alt+6 

9. To view privacy settings

In Google Chrome: Alt+7 
In Mozilla Firefox: Shift+Alt+7

10. To view the Facebook fan page

In Google Chrome: Alt+8
In Mozilla Firefox: Shift+Alt+8 

11. To view Facebook Terms

In Google Chrome: Alt+9 
In Mozilla Firefox: Shift+Alt+9 

12. To go to the search box

In Google Chrome: Alt+? 
In Mozilla Firefox: Shift+Alt+? 

Wednesday, November 20, 2013

Hyper-V

  • Hyper-V is a server application that enables users to run a broad range of operating systems simultaneously on a single physical server. Hyper-V is included with some versions of Windows Server 2008. Hyper-V can be run only on a 64-bit version of Windows Server 2008 that is running on 64-bit hardware. 

Monday, November 18, 2013

Spam

Spam generally refers to unwanted commercial e-mail that is typically sent in bulk to thousands or even millions of recipients. There are some gray areas that we hope won’t trip you up: Some people may include the e-mail produced by mass-mailing viruses or Trojan horses as spam. Similarly, some people may include e-mail from a company they have done business with as spam. Also, if you subscribe to some e-mail list and at some time in the future you no longer want it, that might be spam.