Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, August 22, 2020

ATO Scam Alert

 🚨 SCAM ALERT 🚨 Be on the lookout for a new phone #scam claiming your #tax file number (TFN) has been suspended!


Recorded phone calls claiming to be from the #ATO and other government agencies are trying to trick people into providing personal information. These scammers will tell you there’s a legal case against you, and if you don’t follow instructions and provide the information requested, you’ll be arrested.

⚠️ Don’t follow the prompts, and don’t provide the information requested. We will never send unsolicited pre-recorded messages to your phone, or threaten you with immediate arrest. If you’re ever unsure whether an #ATO interaction is genuine, hang up and phone our scam hotline on 1800 008 540. Warn your family and friends to stay alert and visit scam alerts page to learn more:



Phishing and spear-phishing method of stealing confidential information

 In the recent Stay Smart Online, Alert email advise that there is a significant increase in the past few months of COVID themed phishing scams, using all sorts of lures to try and trick people into handing over personal details.


#Phishing and spear-phishing is a method of stealing confidential information by sending fraudulent messages to a victim, through email or message platforms. They remain among the MOST common method used by malicious #cyber actors to target Australians.

Since the #pandemic's outbreak, the Government’s #Scamwatch has received over 3,060 coronaviruses themed scam reports with over $1,371,000 in reported losses.

#Phishing campaigns can be sent via email, SMS, social media, instant messenger or a phone call. They can look extremely convincing, often imitating legitimate messages from trusted senders in government or business.

See attached are an example of #scam #email that I usually get in my (test) mailbox. Look at the subjects all trying to attract you in a way to click a link or provide details. Especially now Corona and Tax return season they are more active than before.

Hope this helps to Stay safe and on alert don't lose your money or info to the scammers.

Beware of COVID style scam

 Beware of COVID style scam. This is phone scam but COVID email, app, and web scam also present which I have shared previously


It goes like this
Scammer: Good morning, According to our system, you are likely to have been in close proximity to someone who has tested positive for COVID-19. This means that you now need to self-isolate for 14 days and take a COVID-19 test.

'OK. Can you tell me who that person was?'

Scam : 'I'm not able to tell you that. That is confidential information.

Right. Um... so ....

Scam : But you do need to be tested within the next 72 hours. So can I just get the best mailing address so that we can send a kit to you?'

Ok (gives address)

Scam : Thank you - and I just need to take a payment card so that we can finalize this and send the kit to you.'

Sorry - a payment card? I thought this was all free?' - RED ALART here people

Scam : No - I'm afraid not. There is a one-off fee of $50 for the kit and test results. Could you read off the long card number for me, please, when you're ready.'

No - that's not right

Scam: I'm afraid it is. Can you give me the card number please - this is very important, and there are penalties for not complying.'

You should Put the phone down.

This is how #scammers work. And vulnerable people will fall for it.

Friday, April 13, 2018

CISCO CCNA Cyber Ops Certification




Another achievement for the love of #Cyber #Security completed two exam to become Cisco Certified Network Associate Cyber Ops (CCNA Cyber Ops) Thanks to my family, work colleague and my networks for encouragement and support. #CCNA #CyberOps #CyberSecurity 

My review for the Cert: This cert is for security analyst interested in Security Operation Center to become CISCO Cyber Ops it required to pass two exam.

First one is like knowing networking , cryptography , general info sec concepts, web attack, linux and windows commands, file system, logs and different type of model that deal with threat.
Second exam is implementing like type of Security operations monitoring tools, incident detection,analysis and playbooks, threat hunting, Threat scoring, incident response and automation, Computer Forensics, Network Intrusion Analysis, Data and event analysis etc
Loved studying the CISCO books but felt amazing when setup LAB in my pc Three VM First is vulnerable linux pc (metasploitable vm) Second for Monitoring (Security Onion ) Linux which have monitoring tools included and Third for Hacking/Breaking the other vulnerable system using (KALI Linux) which have industry standard awesome tools included. Also love  reading Computer Security Incident Handling Guide: NIST 800-61 doc.


CCNA Cyber Ops Exam Details :
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops

Study Material for first Exam: SECFND Study Material
Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops/secfnd/study-material


Study Material for Second Exam: SECOPS Study Material
Implementing Cisco Cybersecurity Operations (SECOPS) v1.0
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops/secops/study-material

Saturday, March 3, 2018

Password what to use and how to use it ?


Now a days Passwords for people is like we don't love them but can't live without them. So, here is something that help you to stay secure. I am sure that you know many of the following widely available and well-known guidelines for creating more secure passwords, but just in case, here is a recap:
  1. Use a mix upper- and lowercase letters, numbers, and special characters for example, Th1$1$@Samp!3
  2. Replace some letters with numbers (for example, replace i with 1 and e with 3)
  3. Do not include your name or other personal information (such as spouse /children, street address, school, birthdays, and anniversaries).
  4. Use nonsense phrases, misspellings, substitutions, or before-and-after words and phrases combining two unrelated words or phrases, such as “Avangers007” "Highway2R@bbitH0le" "TheE4gl3hasALandD0wnUnder"
  5. Combine two words by using a special character for example, P1zza&Cok3 Tra1n@ndT1ck3t, H4rry!P0t3r.
  6. Use a combination of all the other tips in this list for example, “Harry porter becomes H4rry!P0t3r, Pizza and coke becomes P1zza&Cok3 etc.
  7. Do not use repeating patterns between changes for example, password1, password2, password3, Most importantly 123456789 should never be used as password.
  8. Do not use the same passwords for work and personal accounts.
  9. Do not use passwords that are too difficult to remember.(keep it 8-14 character)
  10. Use a password manager like KeePass Password Safe, LastPass, Dashlane, Sticky Password, Roboform, TrueKey, Symantec Norton Identity Safe etc
Finally “A password should be like a toothbrush. Use it every day; change it regularly; and DON’T share it with friends.”


Faysal Hasan - is a IT System Engineer with a passion for security. He worked in information technology service delivery for more than 7 years. He received his Bachelor in IT from Southern Cross University, Australia and has earned numerous technical certifications throughout his career which include MCSE, 2xMCSA, CCNA Cyber Ops, VMWare Data Center, Citrix Xen App, Mcafee Endpoint Protection, ITIL v3,. He  also received many training that include SPLUNK, Service NOW, Prince 2 project management etc, He  is currently working as System Engineer in Enterprise Operations looking after technology infrastructure for Victoria Police.

Monday, April 2, 2012

Bangladeshi Prime Minister's Email-id Hacked By Teamgreyhat

Bangladeshi Prime Minister's Email-id Hacked By Teamgreyhat 
বাংলাদেশের প্রধান মন্ত্রির ইমেইল একাউন্ট হ্যাক


After remaining silent for a certain time hacktivist group Teamgreyhat strikes again. The past records says this hacker group is know for hacking large number of sites but this time they did some thing different. Here the target was Sheikh Hasina, Prime Minister of Bangladesh. Teamgreyhat took responsibility for hacking into the official Email-id of Bangladesh PM (pm@pmo.gov.bd). Also they have claimed to have access to rest of other 73 email-id's of Bangladesh Prime Minister Office. Teamgreyhat have submitted the following screen shots- 






The above screen shots ware taken during the hack (submitted by TGH), which is clearly indicating that the hacker group has successfully breached the Web-mail of Bangladesh Prime Minister office and exported all the emails from the pm@pmo.gov.bd. Due to security issue we are not publishing the password of that above mail id. Earlier this group has taken a major role in the past cyber-war between India & Bangladesh while hacking into Bangladeshi Stock Market, Islami Bank Ltd Bangladesh and few other high profile website of BD. We want to give you reminder that in the time of Islami Bank hacking TGH claimed that they have breached the BD Prime Minister Office(PMO) & BD Parliament Network and gained more than 40 GB sensitive data of BD govt. So it can be expected that time they have stolen the passwords of BD PM. Though Teamgreyhat did not specify the reason of this hack. .

Monday, February 13, 2012

Net Tools 2011 a Swiss Army knife for everyone interested in a set of powerful network tools

The Creation
Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks.

The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features.

It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators.

There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista, 7).

It’s entirely compatible and has thoroughly been tested on Windows XP. With the 175+ tools it is a great collection of useful tools for network users. The size of Net Tools 5.0.70 is approximately 25 Mb.

Contents:

Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Many extra features and utilities are included in this package!

Download:http://users.telenet.be/ahmadi/nettools.htm

Twitter Facebook Favorites More