Chrome:- Extensions List

Background My brother Mookie called me last night. He wanted me to talk to one of his friends.   Friend I spoke to the friend and the friend explained to me how hackers have made him and his wife's life living hells. What have hackers done:- Facebook Taken over his Facebook business account Changed Phone … Continue reading Chrome:- Extensions List

FoxIT:- PDF Editor Review – G2 – “Get a $25 Amazon gift card when you review Foxit PDF Editor” – Linked In

Background Fox IT emailed me a request to write a review for its PDF Editor. I have been a bit busy lately, but tried to go ahead with the review last night.   Fox IT - PDF Editor Review - Courtesy of G2 Outline Email Review Email G2 Share Your Insights Login or Create An … Continue reading FoxIT:- PDF Editor Review – G2 – “Get a $25 Amazon gift card when you review Foxit PDF Editor” – Linked In

Facebook:- Messenger – Message Attachment

Background This morning received a message on Facebook.   Message Message Contents The message itself contained a single attached document. Image Textual Attachment   Follow Up Outline Facebook Conversation Thread Social Network Conversation Thread Phone Conversation Conversation Thread Facebook Conversation Thread Rather to downloading the attachment, I attempted to engage my friend further via Facebook … Continue reading Facebook:- Messenger – Message Attachment

LinkedIn – Security – Two Factor Authentication – Verification Method – Phone

Background Please continue to follow Best Practices as much as possible with your online Accounts. Online Accounts inclusive of Banking, Email, Social Media. Linked In Security Relative to Facebook there is not a lot of miscreants on LinkedIn. Please use that grace wisely. Two Factor Authentication If you do not have Two Factor Authentication setup, … Continue reading LinkedIn – Security – Two Factor Authentication – Verification Method – Phone

Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary

Background Let us quickly try out another of the freely available tools for detecting the Log4J security vulnerabilities.   Lineage Log4j – Security Vulnerability – Detection Tools Link Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script Link WhiteSource Our Story Here is a beautiful story: … Continue reading Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary

Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script

Background Library ( Jar ) Files Patched / Apache / v2.17.1 Link Package File Type File Name Link Apache Log4j 2 binary ( tar.gz ) apache-log4j-2.17.1-bin.tar.gz Link Apache Log4j 2 binary ( zip ) apache-log4j-2.17.1-bin.zip Link Extract Jar File Usage Purpose JAR File Name Syntax JAR File Name ( Version Specific ) Log4J API File Provides … Continue reading Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script

Log4j – Security Vulnerability – Detection Tools

Background Thankfully, just about everyone and their mama have a tool for detecting software stacks that are susceptible to Apache Log4J's Log4Shell Security Vulnerability.   Tools David Strom, InfoWorld Here is a list pulled together by David Strom @ Infoworld Link Company Product Platform Product Link Explanation Qualys Qualys Web Application Scanning Cloud Link Link … Continue reading Log4j – Security Vulnerability – Detection Tools