flagyl kill candida

2011
11.12

Well, time to be honest with ourselves dear security community. Even if we have firewalls, IDSs, IPSs, antiviruses, SIEMs etc our systems are not secure and will not be secure since there is no such thing as security. I know some of you are now became angry and thinking cross arguments but seriously think about […]

2011
11.09

One of the great things about Mac OSX is that it is based on Unix. One of the greatest thing in Unix is its terminal. However in my new mac I see that I need to re-type every command even I have just typed before… Usually you expect your command to be stored in .bash_history […]

2011
10.17

Security techniques are getting better and better. Account recovery is one of the example of this. Before we have people to answer their security questions (that might be well known for other people) and give their password: How To Hack A Celebrity: Miley Cyrus Is An Idiot Edition If you set up your second e-mail […]

2011
07.31

In my  previous PCI blog post we discussed risk level of vulnerabilities for PCI. In this blog post I will go over wireless requirements and how to detect rogue APs. 11.1 Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis. Note: Methods that may be used […]

2011
07.24

We have lots of password to remember : workstation, servers, banks, forums, mails etc… This makes forgetting passwords easier. Today I would like to mention how to remove reset admin password on windows. I am going to use chntpw. chntpw is a Linux utility to (re)set the password of any user that has a valid […]

2011
07.23

PCI requires you to have both external and internal vulnerability scans. We will discuss them in detail later. Today I will focus on the risk rankings that PCI uses for vulnerabilities. PCI DSS requirement 6.2: Establish a process to identify and assign a risk ranking to newly discovered security vulnerabilities. Notes: Risk rankings should be […]

2011
07.20

I received some questions about vulnerability scans for PCI DSS and would like you to know that I am writing some blog posts about them in next few weeks. I will discuss both external and internal vulnerability scans and how you can build your own vulnerability management program.

2011
03.17

Introduction Today our topic is detecting rogue virtual machines. Rogue virtual machines can pose huge threat to your organization. Even with your managed machines, you might have unauthorized virtual machines. There are some ways to keep the number of rogue vm’s very low on your network such as using software policy, restricting admin accounts for […]

2011
02.20

Definitions Trojans:A program that appears to be a legitimate program but in fact performs some malicious functions. Backdoor: A secret entry point to the system that allows someone who is aware of the backdoor gain unauthorized access. Viruses: A piece of malicious code attached a program that replicates by attaching itself to other programs. Worm: […]

2011
01.31

Today I would like to write about CEH module 5, that is Scanning. The last module was covered on this blog was Footprinting can be found here If you want to see all the modules written about CEH, you can click “Certified Ethical Hacker” section at the right side bar. Even tough I will talk […]