Some ports are used by viruses and legitimate uses Port 6789 is one

Port 6789 according to Speedguide.net the port can be used by a Netsky worm variant, but is also used by the Sun cluster manager. In fact that is how the worm replicates itself across the Internet, by using the Java software on the cluster manager software (smc-https  or Solaris Management console).   Many ports are thus … Read more

SQL Injection is a programmatic attack on websites

OWASP  has a great website discussing SQL injection: The Open web application Security project is an effort to help the programming community in securing their websites And I will copy a couple of lines from their SQL_Injection_prevention_Cheat_sheet becasue it is important: Option #1: Use of Prepared Statements (Parameterized Queries) Option #2: Use of Stored Procedures … Read more

XSS = Cross Site Scripting – dangerous website vulnerability

XSS is something every website should be aware of – test for it, because the bad hackers do. Netsparker  is a good site to explain some of the potential attacks. The effect of XSS is to use the website to extract information, and even bypass the defenses of the server. In some cases if the … Read more

WordPress weaknesses requires vigilence

As Forbes article discusses: Update your plugins and widgets when they are vulnerable, use complex passwords, and otherwise use good security methodologies. It is the basics that people are not doing. What is easy to use makes it less secure, thus requiring more effort by the user or administrator to make sure it is secure … Read more

Microsoft Sysinternals have been updated.

Windows Sysinternals  is updating PsExec, ProcessExplorer, and PsPing Psexec runs on port 445 and 139 which means it runs with other Microsoft programs and can hide itself within the normal funcitons of the computer. The problem with this? hackers look for tools like this to see how they can develop a next generation malware attacks. … Read more