Weebly.com Breach

ORGANIZATION: Weebly.com DATE OF BREACH: February 2016 DATE MADE PUBLIC: October 20, 2016 RECORDS AFFECTED: 43 Million San Francisco-based web hosting service, Weebly.com, had information on 43,430,316 users leaked from its main database in February of 2016. Compromised information includes usernames, email...

Cisco ACS 5.8 Automated Backups

  Today I attempted to configure our ACS server to backup to our new SFTP server. I deployed the SFTP server using CentOS and ensured that it only allowed the the user to SFTP and not SSH (connections to the bash shell of my box). useradd –m sftpbackup –s /sbin/nologin –g ftpaccess #(create user and...

Personal Information Security Hygiene Program

With today’s threat landscape ever increasing, it is important to practice good InfoSec Hygiene at work but equally important at home. Today we have everything on our computers, various cloud services or both. When I look back at my pictures since 2009, I cringe at ever losing them. I do not even have them...

QuickHash Multi-Platform Hashing Tool

Hashing files, and more importantly validating the hashes of files you download is very important.  There is a long list of applications including Mac OS X that have been download, infected, recompiled and then pushed out to people.  The only way to validate the integrity of the file is to match the...

Carbon Copy Cloner for Mac

While using my rsync option works for me, there are a few things it lacks.  I had recently purchased a bundle of software which included a license for Carbon Copy Cloner By Bombich https://bombich.com I figured I would give it a try. The requirements: 1. Backup / Sync starts automatically when the...

« Older Entries