Windows 8 keyboard shortcuts that make Windows 8 that much easier to use on your PC:
The FREE ISO27k Toolkit consists of a collection of ISMS-related materials contributed by members of the ISO27k Forum, either individually or through collaborative working groups organized on the Forum. We are very grateful for their generosity in allowing us to share them with you.
The Toolkit is a work-in-progress: further contributions are most welcome
To download the ISO 27000 Toolkit click here
Terms and conditions of use
Please read and respect the copyright notices (if any) within the individual files.
Most items in the ISO27k Toolkit are released under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 license. You are welcome to reproduce, circulate, use and create derivative works from these papers provided that: (a) they are not sold or incorporated into commercial products, (b) they are properly attributed to the ISO27k Forum based here at ISO27001security.com, and (c) if they are published or shared, derivative works are shared under the same license terms.
A f... [More]
I found a copy right protected material on one of the sharing web sites, and wanted to see how they reporting works, when I went
to the reporting link, I just saw the below screen :) I took a screen shot for you, as I am sure you are going to enjoy the details as
I did :)
Now . lets have a “close “ view and laugh together
AusCert is life and my Tutorial is going very well.. Details coming soon
Vulnerability in TCP/IP Could Allow Elevation of Privilege
Two security holes in Windows, including one affecting the TCP/IP component that could allow an attacker that logs on to a system to upgrade his user access privileges by running a specially crafted application. This hole is considered important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege
Windows, specifically its Windows Partition Manager and a vulnerability that could let an attacker who gains access to a system to run a malicious application to elevate his user access privileges. The attacker needs to have valid credentials to access the system, and must log on manually on the affected machine. This issue is considered important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Users who have their machines set up to receive Microsoft... [More]
LIVE Meeting: Managing PCs in the Cloud with Windows Intune
Just click the image below or
this 2-hr ILL session, you will learn how to manage updates, remove viruses, deploy software, and support your Windows PCs all from a web browser with no on-premise servers using Windows Intune. We’ll dive into the technical capabilities of Windows Intune and explain how you can automatically own Windows 8 as soon as it is released. NOTE: After registration, you will receive a confirmation email. Please make sure you add the Calendar Reminder to your Outlook. The link for the webcast will be available 30 minutes prior to the start time. You may enter the webcast via the Registration Confirmation email or the Reminder email. If you experience any difficulties registering, please contact Coady on 02-82314559.
AUDIO INFORMATION: Computer Audio - ONLY option for this webcast To use computer audio, you need speakers and a microphone, or a headset.
There is no telephone dial in for th... [More]
Below are some photos from the Hacker Halted Conference which was held in Miami,Florida by EC Council.A recap I have noticed that I am nearly everywhere Just for fun
EC Council Instructor Of the year award 2011 with EC Council CEO Jay Bavisi
From www.hackerhalted.com web site
CAST Training with Joe …
Casino Royal, the party
I am delivering CEH (Certified Ethical Hacker )classes for years, and every time I deliver the class my students asks the best tools, which will make they job easier. I usually write my recommend tools from day 1 in to board but this time I decided to write it here in to mu blog , so it can reach more people like your self.
Here is my TOP tools for Security or Hacking
1) Wireshark (http://www.wireshark.org/)
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
2) Cain and Abel (http://www.oxid.it/cain.html)
Cain & Abel is a password recovery tool. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing ... [More]
Is your DNS server safe or compromised ? If you are not aware of what DNS Exchanger is please check my previous post, below http://www.erdalozkaya.com/post/2012/02/14/DNSChanger-Malware.aspx There is now a Australian Government web site which will check your DNS server and will let you know if you are safe or not. Just click in the URL and let’s see how safe your DNS setting is ? (or click here)
Service Manager 2012 http://technet.microsoft.com/en-us/library/hh305220.aspx
Service Manager Parts http://technet.microsoft.com/en-us/library/hh524295.aspx
User Role Profiles in Service Manager http://technet.microsoft.com/en-us/library/hh495625.aspx
Managing Run As Accounts in System Center 2012 – Service Manager http://technet.microsoft.com/en-us/library/hh495673.aspx
List of the Service Manager Cmdlets http://technet.microsoft.com/en-us/library/hh519688.aspx
Managing Changes and Activities in System Center 2012 – Service Manager http://technet.microsoft.com/en-us/library/hh519580.aspx
Managing Incidents and Problems in System Center 2012 – Service Manager http://technet.microsoft.com/en-us/library/hh519626.aspx
Managing Release Records in System Center 2012 – Service Manager http://technet.microsoft.com/en-us/library/hh495529.aspx
Sample Scenario: Managing Release Records htt... [More]