We were faced with the following issue: We have a certificate authority setup on a windows 2008R2 box and now when you log into [...]
Do you have a problem with trying to keep your passwords safe? The Denver computing consulting firm of NOYNIM has the solution to your problem. [...]
New Landscape of Computer Security In 2013, computer analysts saw a drastic increase in the development of threats to computer security. This is by [...]
Denver IT Security and Service organization NOYNIM understands and studies IT security thoroughly. Recently NOYNIM has been doing some research on Cyber Kill Chain and [...]
NOYNIM is now providing Security Information and Event Management (SIEM) support. Today many companies have stringent logging requirements. Prior to 2012 most companies purchased simple [...]
PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its ‘Photo Recovery’ name) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it will still work even if your media’s filesystem has been severely damaged or re-formatted.
http://www.malwaredomainlist.com is a good site to visit if you want to check if a certain site is known to have malware present.
This site to upload suspicious files. This site will scan your file through multiple anti-virus software. Since most people don’t run multiple AV engines on their machines they can use this site to verify if a file is legitimate.
Windump is a little different then tcpdump when looking for interfaces. Run windump -D to identify the interfaces on your windows machine. Once the NIC is identified that you want to monitor run the windump -i followed by the full NIC ID.
ttyrpld is a mult-os kernel-level tty key- and screenlogger with (a)synchronous replay supprt. It supports most tty types, including vc, bsd and unix98-style ptys (xterm/ssh), serial, isdn, etc. Being implemented within the Kernel makes it unavoidable for the default user. It runs with no overhead if the logging daemon is not active.