Categories
News Technical

How to search for Open Amazon S3 Buckets and their contents

How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com GrayHatWarfare created https://buckets.grayhatwarfare.com/ a free tool that lists open s3 buckets and helps you search for interesting files. For an intro on what Amazon open buckets are, please read the following: https://blog.rapid7.com/2013/03/27/open-s3-buckets/ In essence, many files are publicly accessible, some by design. These files sometimes […]

Categories
How-To News Personal

Download a copy of your Facebook data

Recently we have all have been reading about Facebook’s breach of trust. Even Mark Zuckerberg, admitted that Facebook has made mistakes. The issue: Cambridge Analytica, a U.K.-based political data-analytics firm hired by the 2016 Trump campaign, got its hands on data for 50 million Facebook users — without the users’ knowledge or consent. At this point, it’s […]

Categories
Personal Random

General Data Protection Regulation (GDPR), General Definitions

Personal Data: Broadly defined as any data element(s) that can directly or indirectly identify an individual. Examples include: name, e-mail address, government identifiers (such as a passport or Social Security Number/Social Insurance Number), credit card information, and biometric data (such as fingerprints). It can also include any records associated with or linked to such personal […]

Categories
How-To Technical

Activating RMS in Office 365

Microsoft Azure Rights Management provides a comprehensive policy-based enterprise solution to help protect your valuable information, no matter whom you share it with. These policies help improve data security using both Both Information Rights Management and Office 365 Message Encryption To activate rights management: Log into Office 365 with an account which has been assigned an […]

Categories
Hardware How-To Software Technical

Dirty Cache – Dell, Equallogic Storage Array

Dirty Cache – Dell, Equallogic Storage Array I hope you never encounter such an issue, but if you found yourself searching for a method to get online you’re in luck. Symptoms: Equallogic Storage Array  no longer responds to pings iSCSI attached volumes have all gone offline Unable to access the Equallogic Storage Array using SAN HQ […]

Categories
Software Technical

How secure are the apps you use on Smart Phones

In my last post I wrote a very brief how-to on how to Capture Traffic from Smart Devices with Fiddler by making it a network proxy. I did just that and the results for a few app’s have upset me. Mainly because it exposes not only my password and user id, it exposed the content […]