sniper2010 (29-03-13)
Thought I'd just mention this website. as I think its a good reference to sec related info.
I'd really recommend looking at the metasploit primer as this is quite well done.
As explained, many ways to gain access to a remote system, and I know this is "un cool" but given the exploit machine is MS based , well perhaps in many ways it gives slight cred to those that bag MS. .
Granted that the machine is exploitable, it should come as no surprise that access is only a matter of seconds.
anyway let others decided on the source.
(videos)
I guess questions can be asked, what should one do...
well obviously,
AV/Malware
Firewall (even MS)
O/S patches
updated app software
basic common sense with web browsing/e-mail. et al.
.
.
.
perhaps even this is not enough ....
Last edited by z1gg33; 17-09-11 at 09:04 PM.
If you feed ducks at a pond, chances are your bound to feed a goose or two without even knowing it.
sniper2010 (29-03-13)
Look Here -> |
you think too much Z
https://www.facebook.com/philquad68
z1gg33 (19-09-11)
Bookmarks