Credit Card Number follows an algorith which composed of modulus and checksums. I created a tool to verify validity of a credit card number. Download
Author: marktugbo
Windows: How do I find an LDAP User and their Group Base DN for Microsoft Active Directory?
To find the user and group base DN, you can run a query from any member server on your Windows domain. To find the User Base DN: - Open a Windows command prompt. - Type the command: dsquery user -name <known username> (Example: If I were searching for all users named John, I could enter … Continue reading Windows: How do I find an LDAP User and their Group Base DN for Microsoft Active Directory?
Tools: How to identify and clean up Windows computers infected with malware and bots
Solution: Follow the steps below in the given order: Step 1: Disconnect the computer from the network and notify the user that the computer cannot be re-connected until all malware has been successfully removed. Step 2: Find out if the user is familiar with the destination or action that the malware or bot is trying … Continue reading Tools: How to identify and clean up Windows computers infected with malware and bots
Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions
Found this tool from CheckPoint to test your AV, Anti-Bot and Threat Emulation function. https://threatwiki.checkpoint.com/threatwiki/public.htm Test Threat Emulation Click to download a DOC with an exploit. This file will not harm your computer. To confirm the file was detected, use the Smart Log / Smart View Tracker to locate the Threat Emulation log for this … Continue reading Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions
Tools: CheckTLS
https://www.checktls.com/TestReceiver An online tool to check TLS and Certificate details
TMG Forefront 2010: Re-enabling Configuration Change Tracking Description
If you check the box Do not show this prompt again you will, of course, not be prompted to enter descriptions for applied changes in the future. If you later decide you’d like to have this feature back, highlight the Troubleshooting node in the navigation tree and select the Change Tracking tab in the main window. In the Tasks pane click Configure Change Tracking and check … Continue reading TMG Forefront 2010: Re-enabling Configuration Change Tracking Description
How to increase DNS Timeout Value?
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 The forwarding server needs to be given a reasonable amount of time to answer a DNS query. For example, a forwarding server that has root hints enabled may have to query on the Internet for an answer, which can require additional … Continue reading How to increase DNS Timeout Value?
What Are Email Vulnerabilities And How Can We Secure Our Email Account
E-mail is one of the most widely used Internet services today. The services which are generally used in the e-mail Infrastructure are Simple Mail Transfer Protocol (SMTP) and Post Office Protocol version 3 (POP3) or Internet Message Access Protocol (IMAP). The client communicates with e-mail server through Simple Mail Transfer Protocol (SMTP) and retrieves a … Continue reading What Are Email Vulnerabilities And How Can We Secure Our Email Account
Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG
Affected Products Chrome browser version 58 and later, and: accessing secure websites hosted behind a ProxySG (reverse proxy) or accessing other websites through a ProxySG or ASG where redirect-mode authentication is performed over SSL or accessing the management console, via any version of the ProxySG or Advanced Secure Gateway (ASG). Overview The latest versions of … Continue reading Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG
Cybersecurity Podcasts
Over the past few years, podcasts have grown from ‘no-view’ to ‘go-to’ for both news and information, whilst we are plugged in and on the move, we have the time to listen but not to look at our sources of data. Cybersecurity and Information Security podcasts haven’t exactly been a driving force in the surge … Continue reading Cybersecurity Podcasts