Install Kali Linux Tools in Ubuntu.

If you are like me, you don’t want to deal with the overly bloated interface that Kali presents you with. Though Kali Linux is a great distro altogether, it can become quite cumbersome quickly. If you are a native Linux user, then this should be a godsend for you if you are looking to get […]

Read more
Taylor / 0
Is 2FA Useless?

Researchers at Google have noticed that the frequency of phishing attacks crafted around 2FA has increased drastically. These new attacks are designed to "re-route" SMS (text message) based authentication codes to the attacker without the victim's knowledge.

Read more
Taylor / 0
Gotta Love Automation – Part 1

I am currently working on automating most... well, pretty much all, of my business and daily life.

Read more
Taylor / 0
Monthly Security Briefs

Jolin Consulting tries to add value to any consumer or business regardless of affiliation. Our goal is to empower everyone to embrace technology however, this task can be extremely cumbersome.

Read more
Taylor / 0
New Site Launched

New Site Launched!

Read more
Taylor / 0
Switch Security Facts

The following table lists switch features that can be implemented to increase network security:  Feature  Description  Virtual LAN (VLAN) A virtual LAN (VLAN) is a logical grouping of computers based on switch port.  VLAN membership is configured by assigning a switch port to a VLAN. A switch can have multiple VLANs configured on it, but each switch […]

Read more
Taylor / 0
Firewall Facts

A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules.  A network-based firewall inspects traffic as it flows between networks. For example, you can install a network-based firewall on the edge of your private network that connects to the Internet to protect against […]

Read more
Taylor / 0
VPN Facts

A Virtual Private Network (VPN) is a remote access connection that uses encryption to securely send data over an untrusted network. By using a VPN you can take advantage of an existing Internet connection to securely communicate between devices.  A VPN provides an alternative to:   WAN connections.  Connections using telephone lines and a remote access server.  VPNs […]

Read more
Taylor / 0
Switch Attack Facts

The following table lists common attacks that are perpetrated against switches.   Attack   Description   MAC flooding   MAC flooding overloads the switch’s MAC forwarding table to make the switch function like a hub. MAC flooding is performed by the following method:   The attacker floods the switch with packets, each containing different source MAC addresses.  The flood of packets fills up […]

Read more
Taylor / 0
App Development Security Facts

Secure coding concepts include the following:   Concept   Description   Error and exception handling   Error and exception handling is a programming language construct designed to handle the occurrence of exceptions. Exceptions are special conditions that change the normal flow of program execution. An exception is handled (resolved) by:   Saving the current state of execution in a predefined place.  Switching the execution to […]

Read more
Taylor / 0