Thanksgiving gift from NII alumni – Khushbu Pratap nee Jithra

When we heard Khushbu Pratap’s name cropping up in Gartner’s explanation on its Magic Quadrants, we thought we would ask her about how her experience working at NII had been. Below is the unadulterated heart-taking-a-leap-of-joy response! My time at NII has been the most rewarding experience in my short professional history. I am talking from the time NII […]

Disable IIS 7.5 Banner Information

Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of URLScan 3.1 (http://learn.iis.net/page.aspx/726/urlscan-overview/). Select the correct version as per your OS (64-bit or 32-bit) The reference article to setup URLScan is http://learn.iis.net/page.aspx/475/urlscan-setup/ Enable ‘ISAPI Filters’ for your webserver. This is necessary for URLScan to be […]

Logging in MySQL

Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas in database. Getting Started: Following are the types of logs available in MySQL[1]. Log Type Information Written to Log Error log Problems encountered starting, running, or stopping mysqld General query […]

Does Your DLP Implementation Keep You Awake At Night?

With the boundary-less work culture of the 21st century, organizations have started to wake up to the fact that they cannot withhold information within the confines of their heavily guarded data-centers. Clients, employees and vendors need the information on the servers, on their laptops, and on their handheld devices in order to continue smooth functioning […]

Dump password of application pool user from IIS >= 6.0

IIS Application pools are used to separate sets of IIS worker processes that share the same configuration and application boundaries. Application pools used to isolate our web application for better security, reliability, and availability and performance and keep running with out impacting each other . The worker process serves as the process boundary that separates […]

Info-Letter vol.2

Hi all, This month’s reading list. Make sure to check out the tools sections. Traditional Pen-testing is Dead: A frank look at the state of affairs of our daily job http://www.secmaniac.com/october-2010/traditional-penetration-testing-is-dead-bsides-atlanta/

Info-Letter vol. 1

Hi all, We are starting with a monthly reading-list for people who are unable to keep up with the latest in the field of IT Security. A few articles (like the ones below) may be informational to the non-technical readers as well to improve their tech know-how and security posture 🙂