Blog

Blogs

The Ethical Tech Support Blog covers the latest news for Managed IT Services, IT Outsourcing and Ethical Tech Support in Palm, Broward, & Dade counties.

Kali Linux Live USB Creation

Creating a live USB version of Kali Linux has many perks. Live USBs provide the additional benefit of enhanced privacy because users can easily carry the

Read More »

Breaking WPA2 Security - KRACK

A recent weakness has been discovered in the WPA2 Wi-Fi protocol. Attackers are using a method called KRACK (Key Reinstallation Attack) to exploit the weakness on a wide range of devices. The attack works against all WPA2 Wi-Fi protected networks and can even lead to data injection and manipulation.

Exploiting & Patching: EternalBlue

The recent WannaCry & Petya ransomware utilize the EternalBlue exploit to own machines and load malware. EternalBlue is a remote code exploit targeted at a vulnerability in SMBv1 and NBT over TCP ports 445 and 139. SMB provides support for what are known as SMB Transactions.

Benefits of Content Filtering

Content filtering helps to filter acceptable content for viewing and accessing. The system administrator decides upon which content is acceptable or unacceptable for viewing and or accessing. When content filtering is correctly implemented, it can restrict users from accessing websites that are NSFW (not safe for work) and allow access to desired sites.