Are you Vulnerable?

If you don’t have the luxury of building secure software from the start and your business uses off the shelf software to get your work done you have vulnerabilities, period. Potential black hat hackers may not have exploited these inlets but it’s only a matter of time until they do. It’s necessary to take a proactive approach to determine what your risks are to both your network and your applications and make it more difficult for would-be attackers.

This is where Nessus comes in. Just as a doctor would do an examination on his patient to establish a baseline of health, Nessus provides you with some good information about your network and software applications. It’s important to know what applications are in use and what ports they are using. This is done by performing a Nessus scan. The results of the scan provide you with security notes, warnings, and holes.

Using this information is the first step in identifying potential problems you are facing with your network and any applications you are running. For more information about Nessus visit www.nessus.org

Explore More

Critical SQL Injection in Yadanapura : The Gateway to Myanmar Creative Industries

PlanetCreator has reported another critical SQL Injection (vulnerability) on Yadanapura : The Gateway to Myanmar Creative Industries http://www.yadanapura.com powered by IndexMyanmar This vulnerability has been alerted to :- [email protected] SQL

SpoofTooph 0.4 Release

Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will

Google Talk Cheats

With Google Talk being all the craze right now, some people hating it, and others loving it, I figured that I would post a list of tips and tricks for