SMSMS

Product Review: PDF Watermark Remover

PDF Watermark Remover: Removes Digital Images, Stamps, Graphics, Logo

Watermarks are the digital signatures that approve that the document is the property of an organization, a person or any legal authority. Sometimes, it requires removing watermarks from the documents due to personal or professional choices. For this, PDF Watermark Remover is available as a commercial solution and its functionality and features are elaborated in the upcoming sections.

pdf-watermark-remover

Minimum Specifications Required Read more…

Share

Be the first to comment - What do you think?  Posted by George - January 14, 2015 at 6:23 am

Categories: Utilities   Tags: , , ,

Penetration testing tool for domain controllers

Smbexec is a tool that you can use for penetration testing domain controllers; the program allows running post exploitation for domain accounts and expanding the access to targeted network. This gives pentesters full access without any privilege requirement.

Latest release includes improvements so it runs faster and there are more options in configuration and a module that support file search. Using smbexec allows easily going through all machines on the network and collecting the necessary information such as the UAC configuration or other system settings beside where the domain administrators’ credentials are in use.

Read more here – http://www.sectechno.com/2014/03/30/smbexec-rapid-post-exploitation-tool/

Be the first to comment - What do you think?  Posted by George - April 4, 2014 at 1:00 pm

Categories: Security, Utilities   Tags: , ,

Tails Operating System

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is Free Software and based on Debian GNU/Linux

Read more here – https://tails.boum.org/index.en.html

Be the first to comment - What do you think?  Posted by George - December 11, 2013 at 1:00 pm

Categories: Uncategorized   Tags: , , ,

Recovering a user local profile flagged as ‘backup’

At times strange things happen with user local profiles on both Windows Servers and client systems such as, when a user local profile unexpectedly turns to a backup status and freezes in that state. When you check the profile status through the Control Panel you will see that it is flagged as backup after you log on with a temporary profile.

Read more…

Be the first to comment - What do you think?  Posted by George - November 1, 2013 at 1:23 pm

Categories: Troubleshooting   Tags: , , , , ,

Google’s Project Shield

Project Shield is an initiative launched by Google Ideas to use Google’s own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows other websites to serve their content through Google’s infrastructure without having to move their hosting location.

Read more here – http://projectshield.withgoogle.com/

Be the first to comment - What do you think?  Posted by George - October 24, 2013 at 12:53 pm

Categories: Security   Tags: , ,

Security Guidelines for Windows 7 and Windows 8

The security guidance published by the UK government’s National Technical Authority for Information Assurance (CESG), is applicable to devices running Enterprise versions of Windows 7 and Windows 8, acting as client operating systems, which include BitLocker Drive Encryption, AppLocker and Windows VPN features. The UK government’s National Technical Authority for Information Assurance (CESG) advises organisations on how to protect their information and information systems against today’s threats.

The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert.

Read more here – https://www.gov.uk/government/publications/end-user-devices-security-guidance-windows-7-and-windows-8/end-user-devices-security-guidance-windows-7-and-windows-8

Be the first to comment - What do you think?  Posted by George - October 15, 2013 at 11:29 am

Categories: Security   Tags: ,

Windows Phone 7 Application Security Survey

A survey by Andy Grant investigated the practices of major app developers with regard to data storage on Windows Phone 7. As more people use mobile devices for sensitive tasks such as, online banking and password storage, the data stored on the device increases in value. With each new mobile platform there are more opportunities for a mobile application developer to store data in an insecure manner.

Read more…

Be the first to comment - What do you think?  Posted by George - September 10, 2013 at 11:49 am

Categories: Security   Tags: , ,

Next Page »