4
4
0
Posted 3 y ago
Responses: 2
Many good tools in here, but most are aimed at businesses or folks working to secure businesses. There are still some good ones you can use on a personal level, though. Just be careful with the ones that aren't individually focused or more geared to professional use. It's easy to get paranoid when you don't understand what's going on. I'm happy to answer questions to help, though.
One made me laugh. Paros Proxy is listed. Paros hasn't been updated since 2006, but it's still a great (but very basic) proxy tool for web application penetration testing. It has since been eclipsed by tools that have also been retired. The newest tools in that area are Burp Suite and ZAP. That area has come along way since I started.
One made me laugh. Paros Proxy is listed. Paros hasn't been updated since 2006, but it's still a great (but very basic) proxy tool for web application penetration testing. It has since been eclipsed by tools that have also been retired. The newest tools in that area are Burp Suite and ZAP. That area has come along way since I started.
(1)
(0)
SGT James Murphy
I'd love to find a list that my clients could use. These would be people who are not all that tech savvy!
(1)
(0)
Maj (Join to see)
SGT James Murphy - Most of ours aren't tech savvy either. We do have a few where our point of contact is knowledgeable. They are fun to work with.
Unfortunately, cybersecurity isn't a one size fits all proposition. About the best advice I could give is to use professional hardware and software at all times (none of the free, personal plans), patch that software when the vendor says to, encrypt your computer's hard drive, be selective about which WiFi networks you connect to, backup your data using a reputable and professionals service, and use long passwords and multi-factor authentication.
Unfortunately, cybersecurity isn't a one size fits all proposition. About the best advice I could give is to use professional hardware and software at all times (none of the free, personal plans), patch that software when the vendor says to, encrypt your computer's hard drive, be selective about which WiFi networks you connect to, backup your data using a reputable and professionals service, and use long passwords and multi-factor authentication.
(1)
(0)
Read This Next