My spin: Hmmm. You’ve got to know what your “enemies” are up to, if you want to better understand how to defend against them.
News Clip: The security and reliability of Windows and other Microsoft (Nasdaq: MSFT) products top every network administrator’s list of concerns. Commercial products do a good job of protecting enterprise networks, but they should not be the only knife in the drawer.
An IT security staffer who wants to find out what the other side is using to break into Windows systems and exploit security weaknesses needs to look into the tools used by the attackers. There are valuable freeware security tools available on the Web that perform functions like password cracking, port scanning and Web-site proxying. They have legitimate uses for ensuring security, but they also are used by the black-hat community.
Latest posts by Ramon Ray (see all)
- 3 Reasons Invoicing Apps Are Essential For Fledgling Businesses - November 28, 2016
- Don’t Let Technology Create Blinders On Your Persepctive. Every Leader’s Nightmare. - November 27, 2016
- Video Humanizes Your Brand: 3 Tips To Use It For Your Business. - November 4, 2016