Bruteforcing encrypted Excel documents. Document also shows how to download, compile and run John The Ripper using a specific wordlist. Thanks for the info Andy. https://t.co/8cojn4FcEc
22 Mar 2019
Just added a free online DNS tool to my list of DNS tools. @dmarcian provides a free SPF record checker. Read more : https://t.co/C1TtTzKbv2 (sorry, this tweet contains the correct url) https://t.co/FJzueMs5UX
17 Mar 2019
@PrivacyPros Would be great if the carreer center has 1 - an option to filter or sort by region/country 2 - an e-mail service with the filtered results for iapp members.
09 Mar 2019
Dutch Supervisory Authority provided guidance today about #GDPR and the use of #CookieWalls. "Under the GDPR (#AVG), a cookiewall is not allowed. This is because you cannot get a valid permission from your visitors with a cookiewall" (Dutch) https://t.co/JPFvLPGU4Q @privacypros https://t.co/oygqKZHmZe
07 Mar 2019
Donít bet on anything happening for at least a couple of years on U.K. adequacy post-Brexit, advised European Data Protection Supervisor Giovanni Buttarelli https://t.co/T9V9mnFSyn via @DailyDashboard @PrivacyPros
04 Mar 2019
Business Continuity Management: Escalation procedure (ICT).Many ICT-departments modelled their management processes according to the ITIL (ISO 20000) standard and have a service desk/help desk process implemented that receives user incidents. In addition to the automatic Asset management process to update the CMDB , a NOC function to check the availability of the network and their attached devices is deployed. This monitoring process can automatically generate incidents (tickets) for the service desk.
As a result, user requests and various (computer) alerts (incidents) are received daily by the help desk to be serviced as fast, complete and correct as possible. Implementing the procedure below creates an additional filter to timely detect calamities.
Picture 1. Implement the Business Continuity escalation procedure in normal ITIL Servicedesk procedures.
The Business Continuity Manager evaluates the incident, trends and decides if the Business Continuity procedures should be activated or returns the incident to the Service desk.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.3 : Tuesday 26-3-2019
© Copyright 1995-2019 Johan van Soest