Archive

Archive for the ‘Uncategorized’ Category

How to Use your Blackberry Internet plan with your Andriod phone.

May 21, 2012 3 comments

NOTE: This method below has seized working. The only option now is to get an Airtel Sim, register for BBC or any other Blackberry internet plan using a Blackberry phone, remove the sim and insert in yourAndroid phone and ZAP!!! you are connected. No rooting! No Special Configs!! Browse away.

The post below is outdated. use an Airtel sim as stated above.

This post is for our audience from Nigeria..it may work with other network if appropriate configuration parameters like the APN, proxy, port, Username and password is known

MATERIALS
1. A rooted android phone.
2. An MTN BIS plan
3. Dolphin mini browser
4. Orbot app
INSTRUCTIONS
make sure you install the browser and the Orbot
apps before you start and you have MTN APN
settings already set up in the phone. finally, make
sure your phone is rooted.
1. create a new APN with these settings
APN = blackberry.net
proxy = blank
port = blank or 8580
Username = web
Password = web
2. save it and make it your default settings.
3. install Orbot and dolphin browser mini.
4. in Orbit settings, tick Tor everything,
transparent proxy, Tor tethering
5. activate your internet access, then start Orbot.
wait until the ON button turns green. then click the
test button,select dolphin browser and wait for the
check tor webpage to show up.
Congratulations,your BIS browsing is now active.

NOTE.
1. For some strange reason, the test webpage
doesn’t show on Opera mini but you can still
browse with it if you ticked “tor everything”
2. this works even when you have zero
naira.however, if you send 2 to 131,it would say
you have no credit.
3. i have tired this on only two android phones and
it works. you may or may not have issues.

Source: nairaland.com

Google gets green light for self-driving car


SoftIT Solutions

The state of Nevada has issued a license plate giving Google’s self-driving car the green light to travel along public roads.

The modified Toyota Prius was issued a license bearing an infinity sign next to the left of number “001” after demonstrating its auto-pilot capabilities on highways, neighborhood streets and even the hectic “strip” in Las Vegas.

The Nevada Department of Motor Vehicles proclaimed the license the first for an autonomous vehicle in the United States.

“I felt using the infinity symbol was the best way to represent the car of the future,” motor vehicle department director Bruce Breslow said in a statement posted at the state agency’s website.

The car was given a unique red license plate to make it recognizable by police and the public as a self-driving test vehicle.

“When there comes a time that vehicle manufactures market autonomous vehicles to the public, that infinity symbol will…

View original post 29 more words

Categories: Uncategorized

How to Build a Successful IT Security Career


Janet Pinkerton

Wednesday, April 18, 2012

IT security pros can never stop learning about cyber threats and best security practices. Industry professionals recommend a mix of activities to continually prep for a successful IT security career.

Network Connections Network and build knowledge by joining local chapters of IT security trade associations or online communities, suggests Amy Hagerman, assistant vice president/IT security manager at Independent Bank in Ionia, Michigan. “It’s very cost effective.”

Such groups could include:

A working friendship with a group of respected, trusted peers can be a huge resource to everyone in the group. It provides a chance to learn about new challenges or technologies, and discuss problems. “Once you get plugged into some of these groups, you build up a rapport over time, so you know who really knows what they are talking about, and whom you are able to trust,” says Hagerman.

Get Educated All three IT security professionals interviewed for this blog earned IT-related bachelor’s degrees; two invested in graduate level study. “I had to take the time to get in and learn how things worked, why things like firewalls for example, worked,” says Justin Opatrny, network planner for General Mills, who holds a bachelor’s degree in management information systems from Iowa State and a Master’s in Information Assurance from Norwich University.

Understanding the fundamentals of networking, operating systems, security threats and risk is key to professional success.  “Anybody can learn to use an IT security tool like a firewall or an IPS (intrusion prevention system),” says Opatrny. “You need to know why you are using that tool, what advantages does it have, what disadvantages does it have—so you understand the full picture. Without those foundations, you’re likely to have less success running and securing your systems properly.”

Get Certified “Certification can be a great career builder,” contends Opatrny, who holds not only the CompTIA Security+ credential, but also the CISSP from ISC2 and forensic analyst and systems/network auditing credentials from GIAC. “It gives you some level of validation that you have a base knowledge of skill.” That can be a differentiator to an entry-level IT security employee. But he adds, “You’d better be able to prove on the job that you can apply these skills and knowledge—not just that you are good at taking tests.”

Get Involved Becoming involved with trade industry groups, such as CompTIA or ISSA, is good for the industry, and it’s good for you. Opatrny teaches, writes industry articles and volunteers as a subject matter expert; both Hagerman and Lee Myers, chief technology officer for the Archdiocese of Philadelphia, helped write CompTIA’s CASP exam.  The “Share the Wealth” mentality is pretty prevalent in IT security, says Opatrny. “We are already at a disadvantage against these malicious agents. We have to take every chance we have to work with our peers, share what we’ve learned or experienced, so we don’t have to figure it all out ourselves.”

Keep Reading & Researching Beyond setting RSS feeds or Google News Reader, popular online resources for IT security professionals include:

  • BugTraq — Security Focus mailing list for the “detailed” discussion and announcement of computer security vulnerabilities: what they are, how to exploit them, and how to fix them. “There’s more information on there than any one person could absorb,” says Opatrny.
  • Center for Internet Security (daily cyber security tips, white papers, guides, videos and podcasts)
  • Experts Exchange (online forum where IT professionals provide answers on tech topics)
  • ISC2 (blog, journal, magazine)
  • ISSA (journal, executive forum, webcasts, whitepapers, e-news)
  • NIST’s Special Publications (800) series, and FIPS publications. The SP800 series are documents from NIST’s Information Technology Laboratory, featuring titles such as “Guidelines for Securing Wireless Local Area Networks” (published February 2012). “The SP800 Series is a great reference for learning different aspects of security,” says Opatrny. Myers adds that NIST FIPS (Federal Information Processing Standards) “give you a great framework.”
  • SANS Institute (research, whitepapers, newsletters, webinars)
  • Secure Computing (monthly magazine and online news)
  • U.S. Computer Emergency Readiness Team— The Home and Business section offers basic tutorials (e.g., “Understanding Denial of Service Attacks”), as well as alerts current security issues, vulnerabilities, and exploits and weekly summaries of new vulnerabilities (and patch information when available).
  • Verizon 2011 Investigative  Response (IR) Caseload Review and its Data Breach Investigations Report (DBIR) — The DBIR is a “very thorough evaluation of all of the incidents Verizon has responded to over the last year—where the attacks are coming from, how effective they’ve been, areas getting attacked,” says Hagerman. “I find that very helpful in identifying what we should be protecting against.”

Via: Comptia Certifications Blog

%d bloggers like this: