Recent content by Techknowledge

  1. T

    ISA server to Microsoft Forefront

    So what would be an advice for home users proxy and firewall product where I can filter what websites to visit or not, and what would be a good product recommendation for an organization to use?
  2. T

    Encrypting local data

    Thanks for the explanation. How are comparing TrueCrypt to Bitlocker of Windows. Which is better and why?
  3. T

    Session Hijacking with internal cookies and over LAN

    Thanks for you for the excellent explanation. This is clear. On a different note though, I just discovered that network sniffing and like utilities for example wireshark and all, is no longer very helpful as today and modern networks use switches instead of hubs and also wifi networks no longer...
  4. T

    Internet and network security news site

    I often read sites such as cnet.com, zdnet.com and like for news related to general technology. Is there a site where it is specific to security related news, bugs, flaws, vulnerabilities etc updated periodically that I can read?
  5. T

    Encrypting local data

    I hear people say encrypt your local data at home. Why should I, if I physically not allow anyone to my computer, and let's say hypotethically, I am also not connected on net, do I need to encrypt data at home. Secondly, how can I encrypt data and what software is available to do so and what...
  6. T

    Wireless security issues doubt

    Excellent info. Thank you
  7. T

    Vulnerabilities and Exploits site

    Excellent and thanks. Is there a way for me to subscribe in both where I get instant alert if new vulnerability is out?
  8. T

    Session Hijacking with internal cookies and over LAN

    Thanks for the response PrincessFrosty. How can I masquerade manually for example. Can I put the cookie in my browser cache/db after I get it and just browse and site where it picks it up? This is what I wish to know.
  9. T

    Vulnerabilities and Exploits site

    Hello, Is there a one website that lists an updated vulnterabilities so as exploits for web application, operating system, etc that I can know when a Vulnerability is out and an exploit to do it for the vulnerability? Thanks
  10. T

    Session Hijacking with internal cookies and over LAN

    Let's say two users A and B are using same computer to access facebook or any session led websites where cookies are left on the machine/computer. How can A or B, use the cookies of each other to access the session of the other person. Can you please share an example, by giving location of the...
  11. T

    Wireless security issues doubt

    I am told that if I connect on a public wifi and then surf the net, I'm not really secured. Can someone explain in simple English why and how? My understanding is information is on the air (i.e. using wireless to communicate) and hence there are programs that sniff these information (can someone...
  12. T

    Protected PDFs

    I have a number of protected PDFs with me. I have the password to access them. However, I want to remove the password from these PDFs. How do I do that?
  13. T

    Ethical Hacker or Security+ as training course

    Does anyone know the difference of the two training security courses and which is better and why? How long does it take and could I take an online course or download books to go over them? Thank you
  14. T

    Do I really need a firewall?

    Thank you Blankslate and Mushkins. Does this mean a firewall's job is to only open and block ports on a computer it is monitoring it's traffic? Secondly, if a service that is listening on a designated port is not buggy, then even if you don't have a firewall, an attacker cannot do anything i.e...
  15. T

    Do I really need a firewall?

    I know that a firewall is a piece of software (like windows firewall) or hardware (like your router) that blocks incoming and/or outgoing traffic from your computer/network to outside the network or internally. However, is installing it necessary if I don't have any ports open at first place...