Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/19/d149177878/htdocs/ccna/wp-content/plugins/maxblogpress-ping-optimizer/maxblogpress-ping-optimizer.php on line 518

‘;–have i been pwned? Check if you have an account that has been compromised in a data breach

Have I been pwned? as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or “pwned” in a data breach.



Top 10 breaches

359,420,698  MySpace accounts
234,842,089  NetEase accounts
164,611,595  LinkedIn accounts
152,445,165  Adobe accounts
112,005,531  Badoo accounts
93,338,602  VK accounts
91,436,280  Rambler accounts
68,648,009  Dropbox accounts
65,469,298  tumblr accounts
58,843,488  Modern Business Solutions accounts

Play The Binary Game to learn and practice the binary number system

The Binary Game is the best way to learn and practice the binary number system. It is great for classes, students and teachers in
science, math, digital electronics, computers, programming, logic and networking. It is also a LOT of fun to play for anyone who likes to
play fast-paced arcade games.


Tags: ,

Understand and learn XSS with this XSS game

Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your apps and you must learn to dispatch them, pronto! At Google, we know very well how important these bugs are. In fact, Google is so serious about finding and fixing XSS issues that we are paying mercenaries up to $7,500 for dangerous XSS bugs discovered in our most sensitive products. In this training program, you will learn to find and exploit XSS bugs. You’ll use this knowledge to confuse and infuriate your adversaries by preventing such bugs from happening in your applications. There will be cake at the end of the test.


Tags: ,

FREE ISO27k Toolkit from iso27001security.com

FREE ISO27k Toolkit  :


ISMS overview, introductory materials and Toolkit contents

ISMS governance, management & implementation guidance

Model information security policies


ISMS procedures, guidelines and other supporting documents

ISMS-related job descriptions/roles and responsibilities

Tags: ,

Ten Windows Password Myths by Symantec



Myth #1: My Password Hashes Are Safe When Using NTLMv2

Myth #2. Dj#wP3M$c is a Great Password

Myth #3. 14 Characters is the Optimal Password Length

Myth #4. J0hn99 is a Good Password

Myth #5. Eventually Any Password Can Be Cracked

Myth #6. Passwords Should be Changed Every 30 Days

Myth #7. You Should Never Write Down Your Password

Myth #8: Passwords Cannot Include Spaces

Myth #9: Always Use Passfilt.dll

Myth #10: Use ALT+255 for the Strongest Possible Password



test vulnerabilitie


Disaster recovery illustrated


Web 2.0 Compliance

Regardless of the industry regulations an organization is subject to, most require member firms to be able to identify
employees, even if they use “buddy” names, control content that might be construed as advertising or advice and
archive all electronic communications. However, in practice not many firms are able log content posted to Facebook
or Twitter, let alone try to control the content of the actual message.
Within some industries this may even be taken a step further where creating ethical walls between business functions
is a required element of compliance. Complete, of course, with a full audit trail of who joined the “conversation”
and when, how long they stayed and when they left. Although the majority of these regulations are centered in
the banking, finance, healthcare and energy industries, most businesses are governed by a set of regulations that
demand that best practice be followed.

Just a snapshot of these regulations include: 

SEC Rules 17a-3 and 17a-4 and NASD rule 3110

Organizations must retain records of communications related to business.

Gramm-Leach-Bliley Act (GLBA)

Requires that the content of communications should be scanned for sensitive content that should not be sent in clear text – e.g., personally identifiable credit information; as well as content that should never be sent via public communications channels

FINRA Notice 07-59

Ethical walls requirement between research and investment banking departments

FRCP (Federal Rules of Civil Procedure)

Requires the storage of business records in whatever medium they may have been produced or stored. Email and IM are electronically stored information. Posts to social media sites must be preserved if reasonably determined to be discoverable.

Investment Dealers Association of Canada (IDA29.7)

Demands the retention of records with relation to business activities, regardless of its medium of creation.

MiFID and FSA Markets in Financial Instruments Directive (EU)

Specifically requires the retention of electronic communications conversations when trades are referenced.

FERC Order No. 717

The goal of this order is to create an ethical wall between the marketing and transmission functions of vertically integrated companies. Retain communications for 5 years. Plus, if communications takes place, it must be made public immediately.

CFTC & NFA Compliance Rule 2-29 Supervisory procedures for email and Web. NFA Interpretive Note 9063

If a Member or Associate hosts a blog, a chat room, or a forum where futures or forex are discussed, the Member or Associate is required to supervise the use of that community. This requires, at a minimum, that the Member or Associate regularly monitor the content of the sites it hosts, take down any misleading or otherwise fraudulent posts, and ban users for egregious or repeat violations.

Sarbanes-Oxley (SOX)

Businesses must preserve information relevant to the company reporting.

Wanna see how long it might take a computer to crack your password?



The Cisco Mind Share Game is the most comprehensive Learning Game from Cisco yet! This fun and challenging game covers more than half the content of the CCENT / CCNA exam. It was designed to reinforce a variety of standard networking skills and help you practice these new skills in preparation for CCENT and CCNA Cisco certification exams.

mind-share-esa-wireless-topology mind-share-round-difficulty


The Mind Share Game FULL version covers 15 topics including:  

  • Binary number
  • IOS fundamentals
  • IP Addressing
  • Ip routing
  • NAT and PAT
  • The osi model
  • Subnetting
  • Swith operation and behavior
  • Wireless

Achieving a high score in the game requires a keen understanding of the technology, quick recall and recognition, and shrewd gaming strategy. The Cisco Mind Share Game is a great way to improve your speed and accuracy on Cisco certification exams and have fun at the same time! Be one of the first to own this entertaining learning tool from Cisco…you’ll see immediately why thousands of networking professionals use learning games as the killer app in their exam preparation arsenal.






Download and play the Demo Version for a preview of the Mind Share Game.
The Demo version features 5 of the FULL version’s 15 exciting sections, each playable at 3 levels of difficulty. It will leave you wanting more and now more is available in the FULL version.



Tags: , ,

Recent Posts


Partner Site