Home > Blogs > Security > Network Security

Blog Posts about Network Security

RSS Feed Subscribe  RSS details

John  Traenkenschuh

Thank You, SANS.org!

By John TraenkenschuhFeb 12, 2015

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

John  Traenkenschuh

The Enemy Within

By John TraenkenschuhFeb 8, 2015

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

John  Traenkenschuh

Leap second--Are You Ready?

By John TraenkenschuhJan 19, 2015

Two Grandfather clocks--what can you do with those?  How high-tech are those?

Brad Yale

How to Browse the Web Privately Using a Secure SSH SOCKS Tunnel

By Brad YaleJan 16, 2015

There are times when you want to browse the web but you want to do it privately, without being traced. Sure, you could go ahead and utilize the incognito feature built into most major web browsers however to truly browse in anonymity, there is nothing better than utilizing a secure SSH SOCKS Tunnel. In this quick "how-to", we are going to show you how to set up a secure SSH Socks Tunnel enabling you to route all your web traffic through your host.  

Brad Yale

Mobile Security: Physical Location Tracking

By Brad YaleDec 5, 2014

On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


John  Traenkenschuh

Risk Management Versus Vulnerability Analysis

By John TraenkenschuhOct 21, 2014

Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.

Brad Yale

How the Internet Works: The Deep Web

By Brad YaleOct 21, 2014

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Brad Yale

How the Internet Works: A Call for Personal Security

By Brad YaleOct 13, 2014

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Brad Yale

The Best Browser Extensions

By Brad YaleAug 7, 2014

We spend a lot of time online. According to a recent Mashable article posted by Matt Petronzio on March 5, 2014, the average American adult spends 11 hours per day with electronic media. Of that, three hours is spent on social media, nearly one hour is spent on a smartphone and nearly one hour is spent on the Internet via a PC. Taken as a whole, the average American adult spends between 2 – 4 hours online every day.

We spend a lot of time online. To make your daily online life better, below is a list of the five coolest Internet Browser extensions.

John  Traenkenschuh

How Long?

By John TraenkenschuhJul 29, 2014

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

John  Traenkenschuh

Ethical Hacker

By John TraenkenschuhJul 29, 2014

It's time to take back the term hacker from the wanna-be's...

John  Traenkenschuh

Gone with the passwords

By John TraenkenschuhJun 22, 2014

How much can Digital Cryptography do?

Page 1 2 3 4 5 Next >