Corporate LDAP Servers Weakness Statistics

Based in my securityfocus topic responce, and also in some information security audits that i’ve done, i think in the idea to statistical prove the attack risk level at some organization.

Number of accounts Having almost one weak key probability
10 0.401 – 40.1%
25 0.722 – 72.2%
50 0.923 – 92.3%
100 0.994 – 99.4%

Continue reading Corporate LDAP Servers Weakness Statistics

SPAN Port / Mirroring Monitoring

Some network administrators dont know how to handle and correctly install network monitoring applications, IDS and other products who requires network traffic inspection, there is no knowledgment about how span port where designed and it limitations for full-duplex networks.

When the network are in full-duplex mode, the span port have a natural loss of packets that not vary across the hardware.
Continue reading SPAN Port / Mirroring Monitoring

Is C an Object Oriented Language?

C is a good and complex language, and enables you the well the memory managment, however, the original question is: can we transform C language into Object Oriented Language without modify the compiler? And the answer is: YES, we can.

We wont have all the C++ power doing this, cannot specify private/public/protected methods, hierarchy and other stuff available on C++, only will have the power to create some interface classes and fillit with functions in runtime.
Continue reading Is C an Object Oriented Language?