Wednesday, November 20, 2019
Which of the following is the first Wi-Fi troubleshooting method you can try on a mobile device?
Which of the following is the first Wi-Fi troubleshooting method you can try on a mobile device?
- Rename the SSID
- Use a static IP
- Power cycle the device
- Restart Bluetooth
EXPLANATION
Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, huh? Usually, you should let the device sit for a couple seconds after turning it off to make sure the memory in the device is fully cleared before turning it back on.Any electronic device can be power cycled, but the term is frequently used with cable modems, DSL modems, and routers. This is because small internal errors in these devices can prevent them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again.
Which of the following conditions can yield a "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" message?
Which of the following conditions can yield a "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" message?
- Allow all cryptographic protocols/ciphers, including vulnerable ones, to run on the JVM and server
- Restricting the JVM and server to use only ONE common protocol/cipher
- A cryptographic protocol/cipher mismatch between the JVM and the JRE
- A cryptographic protocol/cipher mismatch between the JVM and server
EXPLANATION
The error message "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" is notoriously a signal of an issue between the cryptographic protocols and/or ciphers available on both the server and JVM.Essentially, the error translates to "None of the cryptographic protocols and ciphers on the server and JVM match" thus the initial "Handshake" between the systems fails.
SOURCE
https://dzone.com/articles/troubleshooting-javaxnetsslsslhandshakeexception-rAssuming all features are supported, on a *NIX system, what is the best way to protect an existing $file on an Extended Filesystem (ext#) partition from any changes and set maximum access restriction? (Prompts: $ = non-root user; # = root user.)
Assuming all features are supported, on a *NIX system, what is the best way to protect an existing $file on an Extended Filesystem (ext#) partition from any changes and set maximum access restriction? (Prompts: $ = non-root user; # = root user.)
- $ chmod 000 $file && chown root:root $file
- $ chmod 1744 $file && chown root:root $file
- # chown root:root $file && chmod 1000 $file && chattr +iu $file
- # chmod 400 $file && chown root:root $file && chattr +i $file
EXPLANATION
chown root:root $file sets the user and group "root" as the owner of the file. chmod 1000 $file sets the sticky bit to 1, which means that only the owner can delete the file, and the zeroes mean that the owner, group, and world (other), respectively, have no access permissions on the file.A component of the e2fsprogs package, chattr +iu sets the file to immutable (+i), so even root cannot change it, and sets the file to undeletable (+u) so that it cannot be deleted.
This answer assumes 1) that the user has permissions to set all flags & 2) that the +u flag in chattr is supported by the Linux kernel and the filesystem on which the file is written.
For documentation, see:
https://docs.oracle.com/cd/E19683-01/816-4883/secfile-69/index.html
http://permissions-calculator.org/
Note: for more realistic (real-world) command-line options, one would allow root to read the file with chmod 1400; and since chattr +i sets the file to immutable, it will not be deletable, so chattr +u is unnecessary.
Sunday, November 17, 2019
The Betamax was to VHS, as
The Betamax was to VHS, as
- Terminate and Stay Resident is to Internal OS Commands
- Switching is to Routing
- Token-Ring is to Ethernet
- DASD is to SAN

EXPLANATION
One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks,replacing Arcnet (similar to Token-Ring) an older network topology. Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.
SOURCE
http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ringFriday, November 15, 2019
In terms of Internet Security, what is CEO Fraud?
In terms of Internet Security, what is CEO Fraud?
- A Phishing email directed at a CEO or executive within a CEO's office
- When a CEO embezzles from their company
- A criminal who impersonates a supervisor or other high ranking individual in a phishing attempt
- A CEO who impersonates someone to attain private information
EXPLANATION
Cyber criminals have developed a new attack called CEO Fraud, also known as Business Email Compromise (BEC).In these attacks, a cyber criminal pretends to be a CEO or other senior executive from your organization. The criminals send an email to staff members like yourself that try to trick you into doing something you should not do. These types of attacks are extremely effective because the cyber criminals do their research. They search your organization’s website for information, such as where it is located, who your executives are, and other organizations you work with. The cyber criminals then learn everything they can about your coworkers on sites like LinkedIn, Facebook, or Twitter. Once they know your organization’s structure, they begin to research and target specific employees.
SOURCE
https://securingthehuman.sans.org/resources/national-cyber-security-awareness-monthMonday, November 11, 2019
What does this PowerShell command do: Get-Service *spool* | Restart-Service
What does this PowerShell command do: Get-Service *spool* | Restart-Service
- Restarts any service that has "spool" in its name
- Restarts the print spooler on the computer [No Custom Service This would be correct]
- Restarts all services on the computer
- Restarts the print spooler on the print server