This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
start [2021/08/22 12:43] richard [About this site] |
start [2023/07/13 11:21] (current) richard [Networking blogs/articles] |
||
|---|---|---|---|
| Line 32: | Line 32: | ||
| Microsoft Email services \\ | Microsoft Email services \\ | ||
| https://www.makeuseof.com/tag/tricks-outlook-microsoft-account-secure/ \\ | https://www.makeuseof.com/tag/tricks-outlook-microsoft-account-secure/ \\ | ||
| + | [[Linux]]\\ | ||
| ===== Phone Setup ===== | ===== Phone Setup ===== | ||
| Line 118: | Line 119: | ||
| https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere\\ | https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere\\ | ||
| (the passwords list https://www.ncsc.gov.uk/static-assets/documents/PwnedPasswordsTop100k.txt)\\ | (the passwords list https://www.ncsc.gov.uk/static-assets/documents/PwnedPasswordsTop100k.txt)\\ | ||
| + | Lastpass breach https://www.theverge.com/2022/12/22/23523322/lastpass-data-breach-cloud-encrypted-password-vault-hackers \\ | ||
| \\ | \\ | ||
| Cyber Security Challenge UK - How I won the first cipher challenge\\ | Cyber Security Challenge UK - How I won the first cipher challenge\\ | ||
| http://www.jibble.org/cyber-security-challenge-uk-winner/ | http://www.jibble.org/cyber-security-challenge-uk-winner/ | ||
| + | \\ | ||
| + | \\ | ||
| + | Log4j vulnerability\\ | ||
| + | https://www.wired.com/story/log4j-flaw-hacking-internet/ \\ | ||
| + | \\ | ||
| + | https://www.quantamagazine.org/alan-turings-most-important-machine-was-never-built-20230503/\\ | ||
| + | \\ | ||
| + | BadUSB, Hak5 O.MG cable, Human Interface Device Spoofing \\ | ||
| + | https://www.makeuseof.com/what-is-a-usb-drop-attack/ \\ | ||
| + | https://www.youtube.com/watch?v=mPF9f-PLDPc \\ | ||
| + | \\ | ||
| ==== Networking blogs/articles ==== | ==== Networking blogs/articles ==== | ||
| Line 149: | Line 162: | ||
| \\ | \\ | ||
| GRC.com DoS https://www.theguardian.com/technology/2001/jun/05/hacking.security, https://www.geek.com/news/grccom-surrenders-545393/, http://archive.is/P1T7z \\ | GRC.com DoS https://www.theguardian.com/technology/2001/jun/05/hacking.security, https://www.geek.com/news/grccom-surrenders-545393/, http://archive.is/P1T7z \\ | ||
| + | How I survived a DDoS attack - Jeff Geerling https://www.jeffgeerling.com/blog/2022/three-ddos-attacks-on-my-personal-website https://www.youtube.com/watch?v=VPcYMgTYQs0\\ | ||
| \\ | \\ | ||
| DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer - https://www.youtube.com/watch?v=Jwpg-AwJ0Jc\\ | DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer - https://www.youtube.com/watch?v=Jwpg-AwJ0Jc\\ | ||
| Line 173: | Line 187: | ||
| https://www.theregister.com/2021/02/03/ncsc_bgp_best_practice/ \\ | https://www.theregister.com/2021/02/03/ncsc_bgp_best_practice/ \\ | ||
| \\ | \\ | ||
| - | Google.com.ar domain whoops https://www.bbc.co.uk/news/technology-56870270 | + | Google.com.ar domain whoops https://www.bbc.co.uk/news/technology-56870270\\ |
| + | \\ | ||
| + | https://www.wired.com/story/submarine-internet-cables-egypt/\\ | ||
| + | \\ | ||
| + | https://forums.thinkbroadband.com/general/4739073-how-does-sogea-work.html\\ | ||
| ===== Motivation? ===== | ===== Motivation? ===== | ||
| https://getpocket.com/explore/item/bad-habits-you-must-break-immediately-to-improve-your-life-in-the-next-100-days | https://getpocket.com/explore/item/bad-habits-you-must-break-immediately-to-improve-your-life-in-the-next-100-days | ||