Articles in the General Security category

QEMU Windows Guest: Bridged Networking
Introduction Bridged networking can be used when we want our guest virtual machine to get the IP address from our router and be able to see the host and all other machines in our LAN network. This is also a requirement if we want to have a server on the ...
QEMU Windows Guest: Networking
Introduction There are different kind of backend networks that we can use with QEMU. In order to specify the backend network, we need to use the -netdev command-line option. This is directly connected to the -net command-line option. The -netdev has multiple syntaxes presented below that directly correspond to the ...
QEMU Windows Guest: Installing the Operating System
Now that we've created the image for our guest, we must continue with installing the operating system on it. In Virtualbox/VMWare, we usually select the CD-ROM to boot from the iso installation image and start the virtual machine, after which the installation is automatically started by booting from ...
Qemu Windows Guest: Introduction
In this article we'll present how we can use Qemu instead of Virtualbox/VMWare. Those products are all great, but sometimes we would just like to use something a little more lightweight, which is when Qemu comes into play. Qemu can be used in one of the following ways ...
WSUS (Windows Server Update Services)
Introduction Windows Server Update Services (WSUS) can be used to manage the deployment of the latest Microsoft Windows operating system updates. When using WSUS, we can fully manage the distribution of updates within the network, we can download software updates from Microsoft, and we can deploy them to computers in ...
NMAP Scripting Engine and Categories
1. Introduction We all know what Nmap is and what we can do with it, but for those of you who don't, here's a short overview. Nmap is an open source security scanner that can scan for open ports and also do other functions as well, such as ...
Apache JMeter Part 4: Testing the Throughput and Performance of InfoSec Institute
Testing the Throughput of InfoSec Institute Running the JMeter When everything is set-up all that is left for us to do is run the JMeter and observe the results. We can do that by simply pressing the Menu – Run – Start button. Setting-up JMeter Let's present the options that we ...
Apache JMeter Part 3: Testing Website Performance
Summary We've already described most of JMeter in part 1 and part 2, but let's summarize what we've learned so far. We've seen that JMeter consists of the following elements: Thread Group: A mandatory element that specifies the number of concurrent users that will use the ...
Security Categories
1. Introduction I've been a security enthusiast for years now, and currently I'm working as a security penetration tester. Over the years it has happened that I've heard about a new security method I've never encountered before. When I started doing research about the topic, it ...