One of the most important aspects of information security is access control. I am going to review the most common access control models, and give (very general) examples of where they are often utilized. Anyone looking to start off in information security should become very familiar with each of these models.
Recently I was asked to write an article about one of the many challenges facing Penetration Testers in 2016. I decided to focus on the role that compliance plays in the process of securing corporate systems. This is not as simple as it may seem, as being in compliance with security regulations does not necessarily mean your systems are secure. Below is the text of the published article. If you would like the original publication you can find it at pentestmag.com
The most recent update to OS X El Capitan brought a very small, but very interesting change to the Firewall features included in OS X. This new feature is called “Stealth Mode” and is designed to give you significantly more protection when operating on public networks.
Yesterday Apple released a security update for a number of critical flaws found in the NTP (Network Time Protocol) service that OS X utilizes. The most worrisome of these is a buffer overflow that allows an attacker to remotely send specially crafted packets to a system, resulting in them being able to run malicious code with the privileges of the ntpd service (system level privileges on OS X). Be aware though, since NTP is an open source protocol more than just Macs are affected.
This guide is going to cover using LFTP as an FTP client. The primary reason for using LFTP over something like Transmit is because it supports file segmentation. I will first give a very brief explanation of what file segmentation is, how it differs than normal transfers, and how it may help you.