Category: Security

XConnect over IPSEC

XConnect, or L2TPv3 is a great way to extend a layer 2 broadcast network over a WAN connection to another site. It works great when you need to do things…

Shellshock Bash Code Injection Vulnerability Patch for Cisco Unified Communications Manager 8.5 and Above

            New Vulnerability Affecting Cisco UC Products: A new vulnerability in the Bash shell has been publicly announced. The vulnerability is related to the way…

Shellshock Bash Bug

If you haven’t heard, a recent security flaw known as the Bash Bug has been discovered, and threatens to compromise quite a few internet-connected systems. ┬áThis vulnerability is relatively wide-spread…

Understanding OSX Permissions

The Macintosh OSX platform is based on Unix, and thus, the POSIX permissions model. With OSX, you can augment these permissions with Access Control Lists (ACLs), which allow for more…

Vulnerability Found in ALL Versions of Internet Explorer

Microsoft announced on April 26th, 2014 a new ZERO DAY vulnerability that allows a computer to give a remote hacker the ability to gain full access to your computer. This…

  • Page:
  • 1
  • 2