I have been busy the past few months because of these PUAs (Potentially Unwanted Apps). Honestly I consider myself lucky because yours truly was an old-school AV veteran that survived the good ol’ spyware wars (circa 2003) so connecting the dots for this technical challenge will be considerably an easy task. As I have not …
Category Archives: Infosec
On Vulnerability Scanning – Part 2
Thus do many calculations lead to victory, and few calculations to defeat: how much more no calculation at all! It is by attention to this point that I can foresee who is likely to win or lose. Sun Tzu, Art of War This is the 2nd part of my Vulnerability scanning post. Background: A friend …
On Vulnerability Scanning
“The general who wins the battle makes many calculations in his temple before the battle is fought. The general who loses makes but few calculations beforehand” Sun Tzu, Art of War A friend of mine asked me if I can give my advice about vulnerability scanning. He is enrolled in an information security class in …