Güvenlik

Genel, Güvenlik, Network

Herkese Merhaba, Yazımızın amacı kişileri Client üzerinden VPN vermek ve tüm network e erişimesi yerine bir Web Portal üzerinden sadece erişebileceği ögeleri görmesini yada yetkilerine bağlı işlemler yapmasını sağlamak için kullanmayı hedefliyoruz. Öncelikle bir kullanıcı ve kullanıcı grubu oluşturmamız gerekiyor. ...

Read more

Genel, Güvenlik

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım. Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. ...

Read more

Genel, Güvenlik, İşletim Sistemleri, MS Server 2012 R2

   Herkese Merhaba,     Bugün sizlere IIS 6.5 ve sonraki versiyonlarda tam olarak güvenlik açığı diyemeyeceğimiz ama aynı zamanda saldırıların yoğun olduğu ülkemizde bundan bir şey olmaz da diyemeyeceğimiz bir konuyu anlatacağım. Şimdi gelelim konumuza; bir saldırganın ilk bilmek ...

Read more

Genel, Güvenlik, Network

Herkese Merhaba, Bugünkü makalemizde Fortigate 5.2.8 Versiyonun da Wan Link Load Balancing nedir nasıl yapılır onu anlatacağım. Wan Link Load Balancing birden fazla olan internet hattınızı Load Balance tek bir çıkış varmış gibi kullanmanızı sağlar. Örnek olarak benim A isimli ...

Read more

The Hacker News

  • GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature
    by noreply@blogger.com (Swati Khandelwal) on 15 Haziran 2018 at 09:52

    A security researcher has discovered a critical vulnerability in some of the world's most popular and widely used email encryption clients that use OpenPGP standard and rely on GnuPG for encrypting and digitally signing messages. The disclosure comes almost a month after researchers revealed a series of flaws, dubbed eFail, in PGP and S/Mime encryption tools that could allow attackers to […]

  • Chinese Hackers Carried Out Country-Level Watering Hole Attack
    by noreply@blogger.com (Swati Khandelwal) on 14 Haziran 2018 at 15:10

    Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks. The campaign is believed to be active covertly since fall 2017 but was spotted in March by security researchers from Kaspersky Labs, who have attributed these attacks to a Chinese-speaking threat actor group called […]

  • New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs
    by noreply@blogger.com (Mohit Kumar) on 14 Haziran 2018 at 07:59

    Hell Yeah! Another security vulnerability has been discovered in Intel chips that affects the processor's speculative execution technology—like Specter and Meltdown—and could potentially be exploited to access sensitive information, including encryption related data. Dubbed Lazy FP State Restore, the vulnerability (CVE-2018-3665) within Intel Core and Xeon processors has just been confirmed […]

  • OnePlus 6 Flaw Allows to Boot Any Image Even With Locked Bootloader
    by noreply@blogger.com (Mohit Kumar) on 13 Haziran 2018 at 20:46

    Have you recently bought a OnePlus 6? Don't leave your phone unattended. A serious vulnerability has been discovered in the OnePlus 6 bootloader that makes it possible for someone to boot arbitrary or modified images to take full admin control of your phone—even if the bootloader is locked. A bootloader is part of the phone's built-in firmware and locking it down stops users from replacing […]

  • Special Price Drop—Get Secure VPN Service For Lifetime
    by noreply@blogger.com (Exclusive Deals) on 13 Haziran 2018 at 14:58

    PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection. Today, most users surf the web unaware of the fact that websites and online services collect their personal information, including search histories, location, and buying habits and make millions by sharing your data with advertisers and marketers. If this is […]