Ivan Stefek

@ivanstefek

Just Chillin

Australia
Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @ivanstefek

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ivanstefek

  1. proslijedio/la je Tweet
    30. sij

    One of my favorite applications Snagit- it comes in really handy! The new Create Video from Images is awesome. Check it out

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Bonus Episode #5 - A Lotto Story Someone won a $16.5 million lottery jackpot. But they never came forward to claim the prize. Turns out. It was a hacker, who rigged the lottery. Listen exclusively on

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Shodan keeps a full history for every IP it's ever seen. If you're a member you can see the historical data on the beta website (or API). For example, identify when a service was hit with ransomware:

    Poništi
  4. proslijedio/la je Tweet
    21. sij

    Dear Microsoft, please release the source code to secedit.exe without legal restrictions so it can be rewritten as a PowerShell cmdlet. (Please retweet if you care about updating this ancient but useful tool...)

    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Hack their Bluetooth connection, and you may be able to access all of the data on their devices.

    Poništi
  6. proslijedio/la je Tweet
    22. pro 2019.

    Hey , when this fire season is hopefully over, say 6 months time, let’s have a joint press conference together. I’ll share my thoughts publicly with you, face to face. Whadya reckon? Professional firefighter for over 30 years to Prime Minister.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    8. pro 2019.

    Poor man’s persistent threat detection (medium sized enterprises without SIEM) A. Check Antivirus logs (best collected in central loc) > search for keywords (see screenshot) B. Run LOKI on exposed or suspiciously behaving systems

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    9. stu 2019.

    Log Sources Top 5 (ordered by cost-benefit ratio / volume > detectable threats) 1. Antivirus 2. Windows Eventlog (+Sysmon) 3. Proxy 4. Firewall 5. DNS

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. lis 2019.

    2 weeks into our awareness month campaign, and it’s going swimmingly!! Here’s all of our infographics thus far, to help you get yourself and your friends and lovers secure!!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    A school blackboard in China

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. 14. srp 2019.

    Just posted: How To or on your iPhone or iPad. Hope you find it useful :-)

    Poništi
  13. 10. lip 2019.

    I posted a new video for . Creating Glitch Title Intro’s Using including . Hope you find it useful:

    Poništi
  14. proslijedio/la je Tweet
    7. lip 2019.

    35 of the Best Information Security Podcasts to Follow in 2019 | Digital Guardian

    Poništi
  15. proslijedio/la je Tweet
    2. lip 2019.
    Odgovor korisniku/ci

    Yes, every single aspect of my videos I do myself. It's quite a lonely thing at times, but it's the reason the editing is so rough and ready 😋 thank you so much for checking my work out

    Poništi
  16. proslijedio/la je Tweet
    15. svi 2019.

    With Sysmon logging & ' Sigma rule you can detects non-standard programs connecting to RDP port 3389/tcp e.g. malware exploiting to spread within a network

    Poništi
  17. proslijedio/la je Tweet

    This is why you need an RFID shielded wallet. Be careful !!

    Poništi
  18. proslijedio/la je Tweet
    27. tra 2019.

    procSpy - Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes

    Poništi
  19. proslijedio/la je Tweet

    How to use the server wizard for remote access

    Poništi
  20. proslijedio/la je Tweet
    24. tra 2019.

    Do you like honey pots? How about getting people outside of IT interested in security. Build this (fun to me) honey pot with a and a flashing emergency light. . Plots where attackers are coming from as well.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·