Geeksters #089 – National CyberSecurity Month Pt2

Direct MP3 Download: Geeksters #089 – National CyberSecurity Month Pt2


Martin ObandoTim BowermeisterMitch Hamanand PCFreddy talk about computer repair

Episode 89 Show Notes

 

Hosts:

Tim Bowermeister

Mitch Haman

Martin Obando

 

 

October – National CyberSecurity Month

 

**** Security essentials: What is two-factor authentication?

 

http://nakedsecurity.sophos.com/2013/10/10/security-essentials-what-is-two-factor-authentication/

 

It is an authentication process where two of three recognized factors are used to identify a user:

Something you know – usually a password, passcode, passphrase or PIN.

Something you have – a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits

Something you are – fingerprints, iris patterns, voice prints, or similar

**** Map Charts Global Cyber Attacks in Real Time

http://www.lockergnome.com/news/2012/10/12/map-charts-global-cyber-attacks-in-real-time/

http://map.honeycloud.net/

 

The map, referred to as HoneyMap, reveals attacks received by a number of sensors spread throughout the world that simulate vulnerable systems. These detectors are referred to as honeypots, data-gathering units for the larger Honeynet Project.

 

**** D-Link to padlock router backdoor by Halloween

http://www.pcworld.com/article/2054680/dlink-to-padlock-router-backdoor-by-halloween.html

http://www.dlink.com/uk/en/support/security

 

D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password.

 

The issue consists of a backdoor-type function built into the firmware of some D-Link routers that can be used to bypass the normal authentication procedure on their Web-based user interfaces.

 

The affected models likely include D-Link’s DIR-100, DI-524,DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240 and possibly DIR-615. The BRL-04UR and BRL-04CW routers made by Planex Communications might also be vulnerable because they also appear to use the same firmware.

 

**** Alt Codes, list of alt key codes alt symbols and characters.

http://www.alt-codes.net/

 

How To Use Alt Code Characters

Make sure that you switch on the Number Lock on your keyboard.

Hold down the ALT key (left alt key).

And type the number of which alt code you want to get.

Example 1

For example the decimal alt code of heart is 3

Press and hold the ALT key and type 3 then you will get ♥

Example 2

For example the decimal alt code of one half is 171

Press and hold the ALT key and type 171 then you will get ½

 

******************

geeksters@podnutz.com

To send a voicemail call 707-6PODNUT (707-6763688)

www.facebook.com/geeksters.tv

To support Podnutz please use the following links, and remember you don’t pay any extra for using the links !

 

Podnutz Amazon link (http://www.podnutz.com/amazon)

Podnutz Newegg link (http://www.podnutz.com/newegg)

Podnutz Ebay (http://www.podnutz.com/ebay)

Podnutz Deals (http://www.podnutz.com/deals)

Podnutz Clothing (http://www.podnutz.com/clothing)