Have I been pwned? as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or “pwned” in a data breach.
Top 10 breaches
234,842,089 NetEase accounts
164,611,595 LinkedIn accounts
152,445,165 Adobe accounts
112,005,531 Badoo accounts
93,338,602 VK accounts
91,436,280 Rambler accounts
68,648,009 Dropbox accounts
65,469,298 tumblr accounts
58,843,488 Modern Business Solutions accounts
The Binary Game is the best way to learn and practice the binary number system. It is great for classes, students and teachers in
science, math, digital electronics, computers, programming, logic and networking. It is also a LOT of fun to play for anyone who likes to
play fast-paced arcade games.
Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your apps and you must learn to dispatch them, pronto! At Google, we know very well how important these bugs are. In fact, Google is so serious about finding and fixing XSS issues that we are paying mercenaries up to $7,500 for dangerous XSS bugs discovered in our most sensitive products. In this training program, you will learn to find and exploit XSS bugs. You’ll use this knowledge to confuse and infuriate your adversaries by preventing such bugs from happening in your applications. There will be cake at the end of the test.
FREE ISO27k Toolkit :
ISMS overview, introductory materials and Toolkit contents
ISMS governance, management & implementation guidance
Model information security policies
Security awareness and training policy
ISMS procedures, guidelines and other supporting documents
ISMS-related job descriptions/roles and responsibilities
Myth #1: My Password Hashes Are Safe When Using NTLMv2
Myth #2. Dj#wP3M$c is a Great Password
Myth #3. 14 Characters is the Optimal Password Length
Myth #4. J0hn99 is a Good Password
Myth #5. Eventually Any Password Can Be Cracked
Myth #6. Passwords Should be Changed Every 30 Days
Myth #7. You Should Never Write Down Your Password
Myth #8: Passwords Cannot Include Spaces
Myth #9: Always Use Passfilt.dll
Myth #10: Use ALT+255 for the Strongest Possible Password
Regardless of the industry regulations an organization is subject to, most require member firms to be able to identify
employees, even if they use “buddy” names, control content that might be construed as advertising or advice and
archive all electronic communications. However, in practice not many firms are able log content posted to Facebook
or Twitter, let alone try to control the content of the actual message.
Within some industries this may even be taken a step further where creating ethical walls between business functions
is a required element of compliance. Complete, of course, with a full audit trail of who joined the “conversation”
and when, how long they stayed and when they left. Although the majority of these regulations are centered in
the banking, finance, healthcare and energy industries, most businesses are governed by a set of regulations that
demand that best practice be followed.
Just a snapshot of these regulations include:
|SEC Rules 17a-3 and 17a-4 and NASD rule 3110||Organizations must retain records of communications related to business.|
|Gramm-Leach-Bliley Act (GLBA)||Requires that the content of communications should be scanned for sensitive content that should not be sent in clear text – e.g., personally identifiable credit information; as well as content that should never be sent via public communications channels|
|FINRA Notice 07-59||Ethical walls requirement between research and investment banking departments|
|FRCP (Federal Rules of Civil Procedure)||Requires the storage of business records in whatever medium they may have been produced or stored. Email and IM are electronically stored information. Posts to social media sites must be preserved if reasonably determined to be discoverable.|
|Investment Dealers Association of Canada (IDA29.7)||Demands the retention of records with relation to business activities, regardless of its medium of creation.|
|MiFID and FSA Markets in Financial Instruments Directive (EU)||Specifically requires the retention of electronic communications conversations when trades are referenced.|
|FERC Order No. 717||The goal of this order is to create an ethical wall between the marketing and transmission functions of vertically integrated companies. Retain communications for 5 years. Plus, if communications takes place, it must be made public immediately.|
|CFTC & NFA Compliance Rule 2-29 Supervisory procedures for email and Web. NFA Interpretive Note 9063||If a Member or Associate hosts a blog, a chat room, or a forum where futures or forex are discussed, the Member or Associate is required to supervise the use of that community. This requires, at a minimum, that the Member or Associate regularly monitor the content of the sites it hosts, take down any misleading or otherwise fraudulent posts, and ban users for egregious or repeat violations.|
|Sarbanes-Oxley (SOX)||Businesses must preserve information relevant to the company reporting.|
The Cisco Mind Share Game is the most comprehensive Learning Game from Cisco yet! This fun and challenging game covers more than half the content of the CCENT / CCNA exam. It was designed to reinforce a variety of standard networking skills and help you practice these new skills in preparation for CCENT and CCNA Cisco certification exams.
The Mind Share Game FULL version covers 15 topics including:
- Binary number
- IOS fundamentals
- IP Addressing
- Ip routing
- NAT and PAT
- The osi model
- Swith operation and behavior
Achieving a high score in the game requires a keen understanding of the technology, quick recall and recognition, and shrewd gaming strategy. The Cisco Mind Share Game is a great way to improve your speed and accuracy on Cisco certification exams and have fun at the same time! Be one of the first to own this entertaining learning tool from Cisco…you’ll see immediately why thousands of networking professionals use learning games as the killer app in their exam preparation arsenal.
Download and play the Demo Version for a preview of the Mind Share Game.
The Demo version features 5 of the FULL version’s 15 exciting sections, each playable at 3 levels of difficulty. It will leave you wanting more and now more is available in the FULL version.