Hacker Attack Vectors

Repeat after me, “hackers most often target vulnerabilities, not specific people or companies.” Now, say that over and over again.. and shortly you should come to the conclusion that every single device and application typically has vulnerabilities which...

Customer Service 101 Relationships > Being Correct

Most small business stewards provide customer service as well as receive customer service as part of wearing many hats. I really appreciate being on both ends of giving and receiving as each encounter is an opportunity to learn, to adapt, to change, and to improve....

Extending Linux Socket Monitor

Linux Socket Monitor by R-fx Networks is a good, automated, tool to let you know if an application is creating TCP and UDP sockets. The caveat we’ve experienced over the years is that when you receive an LSM alert that might involve malicious malware or hacker...

DNS – The GPS of the Internet

If the Internet is the super information highway, then what other analogies can we make? Frame of reference Analogy The Internet Information Superhighway Your ISP Vehicle on the road YOU The driver of the vehicle Web sites Buildings Email addresses House or business...

SSL Beast and RC4-SHA

While there are a growing number of technical articles on how to protect your Apache based server against the SSL Beast, I’ve yet to see an article that goes into the SSL Cipher Suite that should be used for allowing only RC4-SHA and nothing else. This past...

The importance of documentation

I would like to share with a recent, real life, story of what happens to small businesses when there is little to no documentation. I’m hoping to encourage you to review the documentation standards you have set forth for your small business; and potentially to...