Monthly Archives: January 2014

Java

Posted in Security Blog | Tagged , , | Comments Off on Java

What am I doing?

Posted in Security Blog | Tagged , , , , , | Comments Off on What am I doing?

8 Levels of Information Technology Security

This is cool. Click it to see it on it’s original site.

Posted in Security Blog | Tagged , , | Comments Off on 8 Levels of Information Technology Security

Amazing Arizona Comic Con 2014

The Amazing Arizona Comic Con is not as big and amazing as the Phoenix Comic Con, It even uses the smaller convention center, but it is still a lot of fun. Fewer people dress up for this one and fewer … Continue reading

Posted in life | Tagged , , , | Comments Off on Amazing Arizona Comic Con 2014

CISSP

Took my test today and passed on the first try. No bootcamps or classes. How? I read two books. The CISSP: Certified Information Systems Security Professional Study Guide, which was a very informative, yet dry. I took several months to read … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on CISSP

CISSP Test

I passed my CISSP test, so I got that going for me, which is nice. -Carmelo

Posted in life | Tagged , , | Comments Off on CISSP Test

Worst Passwords of 2013

According to this article, password is no longer the #1 password that people are using, now its 123456. Are people smarter when it comes to passwords? Well…. I think some are just lazy. A good password should be at least … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Worst Passwords of 2013

Deliver DNS Trojan with Microsoft Word Macro

I saw this video on Armitage’s Facebook page. Subscribe to his channel for notifications when new videos are uploaded.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Deliver DNS Trojan with Microsoft Word Macro

Jim Miklaszewski

Saw this meme on Imgur. Is it just a meme? Did this happen? I don’t know.

Posted in Security Blog | Tagged , , , , | Comments Off on Jim Miklaszewski

The Ten Commandments Of Computer Ethics

The following are the 10 commandments from the Computer Ethics Institute Thou shall not use a computer in ways that may harm people. Thou shall not interfere with other people’s computer work. Thou shall not snoop around in other people’s … Continue reading

Posted in Security Blog | Tagged , | Comments Off on The Ten Commandments Of Computer Ethics