How to Test File Permissions with Bash  

Recently, I posted about basic permissions for Linux files; now let’s look at how to access those in a shell script. Testing file permissions is an essential part of enforcing an access control policy. Two common ways to test files for readability, writability, zero size and so forth are the if and the test. For […]
Read More ›

How to Verify Windows File Integrity with Hashes

As I write this, I am developing a skill (app) for Amazon’s Alexa voice service. A couple of days into the development I thought I’d accidently corrupted a critical file. Fortunately, I hadn’t, but it reminded me of the practice of discovering file changes by comparing file hash values against a baseline. The basic idea […]
Read More ›

SharePoint Security Best Practices – Article 2

Security and performance at the same time in SharePoint In my first article, I talked about how Microsoft is an object oriented environment and the objects are stored in namespaces. I discussed the fact that each object has its own list of security permission entries called Access Control Entries (ACE) that determines who can access […]
Read More ›

10 Internet of Things Security Vulnerabilities

If the 2017 Consumer Electronics Show (CES) is anything to go by, 2017 will be a major year for the Internet of Things (IoT). Unfortunately, it’s also going to a bumper year for cyber security exploits—including novel, and potentially catastrophic, attacks. As such devices come of age we are going to start seeing them everywhere. […]
Read More ›

Unleashing Wireshark’s Powerful Follow TCP Stream Feature

In security courses such as Learning Tree’s System and Network Security Introduction, we often hear about the insecurity of protocols such as Telnet. These older protocols send their data – including login credentials – over the network in the clear. While ssh, a secure alternative to Telnet, is used in many applications today, many sites […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.