10 episodes

The Infosec Dojo features a command each week that will help you better secure your network. We discuss commands that are useful for security, forensics, investigations, penetration testing, and troubleshooting. We focus on Windows, Linux and OSX operating systems.

Infosec Dojo Joe Sullivan

    • Technology
    • 4.0 • 2 Ratings

The Infosec Dojo features a command each week that will help you better secure your network. We discuss commands that are useful for security, forensics, investigations, penetration testing, and troubleshooting. We focus on Windows, Linux and OSX operating systems.

    Electronic Stalking and Harassment

    Electronic Stalking and Harassment

    This is a presentation I’ve been doing at a few infosec events recently. I talk about how hackers and stalkers harass you online, and how they get into your devices, email, and social media accounts.

    • 42 min
    The Importance of Web Application Security

    The Importance of Web Application Security

    In this episode: I discuss why you should be testing your web application security, and perform periodic vulnerability scans. This one is short, and the first I’ve posted  after a long break. I’ll get more into what’ s been keeping me away from this podcast in a later episode.

    • 4 min

    Security in Depth is Failing

    Security in Depth is Failing

    Security in Depth is Failing I’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for that. I think this comes down to talent, training, and learning to communicate with our business leaders. This is a problem with most businesses today  – we…

    • 9 min

    Using the SHA-1Sum for File Integrity Checks

    Using the SHA-1Sum for File Integrity Checks

    The SHA-1Sum SHA-1Sum is a Linux that calculates and verifies  SHA-1 hashes. It is commonly used to verify the integrity of files. The has values should be the same as long as the file hasn’t been modified. This is an effective way to check if system binaries have been tampered with or other files you download…

    • 11 min

Customer Reviews

4.0 out of 5
2 Ratings

2 Ratings

Top Podcasts In Technology

Listeners Also Subscribed To