Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Joe

Fortigate Creating Millions of DNS events to standard domains

Posted on January 8, 2019 by Joe

I am trying to tune our SIEM and noticed that we are receiving millions of DNS records every day from the same domains.
These are:

update.microsoft.com
swscan.apple.com
softwareupdate.vmware.com
play.google.com
autoupdate.opera.com
auth…. Continue reading Fortigate Creating Millions of DNS events to standard domains→

Posted in dns, firewalls, logging, SIEM

What attacks are made possible by public release of my web history?

Posted on December 11, 2018 by Joe

Assume that my Internet history is made public (accidentally or on purpose). And this release is over 24 hours since the visits were made.

Also assume that there aren’t an embarrassing sites on there: there isn’t any blackma… Continue reading What attacks are made possible by public release of my web history?→

Posted in url, web browser

Downloads and GPG singnatures

Posted on November 28, 2018 by Joe

I’ve recently installed Kleopatra in order to use GPG for confirming the validity of downloads. I’ve downloaded the following (32-bit verison):
https://www.claws-mail.org/win32/

I also downloaded the GPG signature beneath it… Continue reading Downloads and GPG singnatures→

Posted in GnuPG, kleopatra

Best Source of Security Configuration Guidance

Posted on October 5, 2018 by Joe

Over the years I have used a number of different sources of security configuration guidance for a spectrum of systems including for example:

https://www.cisecurity.org/cis-benchmarks/
https://www.stigviewer.com/stigs
https:… Continue reading Best Source of Security Configuration Guidance→

Posted in Cisco, Configuration, hardening, nsa, system-compromise

Will it ever be possible to make something unhackable? [on hold]

Posted on August 21, 2018 by Joe

I understand that this is asking for a simple answer to a very complex theoretical question. Without a doubt, every system has flaws either because of the human errors or because of advancements in hardware capability. I don’… Continue reading Will it ever be possible to make something unhackable? [on hold]→

Posted in Exploit, penetration-test, Virtualization, Vulnerability

How can I sandbox a Wine application on Linux?

Posted on August 19, 2018 by Joe

I would like to run Microsoft Office programs such as Word but do not trust them, nor should anyone. Without running a virtual machine, is there a good way to sandbox a windows application to run on linux. I’ve tried using firejail (block … Continue reading How can I sandbox a Wine application on Linux?→

Posted in linux, malware, sandbox, spyware, Windows

wareAdding An SSH Rootkit to Router Firmware

Posted on April 6, 2018 by Joe

I have been experimenting Root kits lately and would like to know how exactly i would go about editing a router’s firmware update file to execute an SSH shell over wan on startup for connection. I currently have my own Net Ge… Continue reading wareAdding An SSH Rootkit to Router Firmware→

Posted in Firmware, malware, rootkits, router

How can a network admin uniquely identify machines on their network?

Posted on November 29, 2017 by Joe

My network admin might have a record of my default MAC address tied with some mischievous doings as well as my currently used address that they’ve likely collected after I started accessing using their controlled logins. I in… Continue reading How can a network admin uniquely identify machines on their network?→

Posted in anonymity, mac-address | Tagged Identification

This freaked me out [on hold]

Posted on October 20, 2017 by Joe

The other night I had connected to my laptop. I was about to start looking at the news on the internet when I clearly heard someone shuffling papers, clear their throat and move some articles which may have been stacks of pa… Continue reading This freaked me out [on hold]→

Posted in malware

This freaked me out [on hold]

Posted on October 20, 2017 by Joe

The other night I had connected to my laptop. I was about to start looking at the news on the internet when I clearly heard someone shuffling papers, clear their throat and move some articles which may have been stacks of pa… Continue reading This freaked me out [on hold]→

Posted in malware

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • NetHack 5.0 Released May 4, 2026
  • ReactOS Gets Unified Installer Image and a New Storage Stack May 4, 2026
  • ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th) May 4, 2026
  • OpenAI Introduces AI-Generated Pets for Its Codex App May 4, 2026
  • Instructure discloses second data breach in less than a year May 4, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up