FileHash v5.4 has recently been released, and we’ve added some URL parsing to find hashes that can be compared to existing files via the -y and –hl parameters Instead of having to manually obtain the checksums for files you want to compare, before you can use...
FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
There is every indication that businesses and networks in Western countries are very likely to face increased cybersecurity attacks in the near- to mid-term. Here are some things to consider and for the protection of personal and commercial networks (to include those...
The number of cybersecurity attacks against social media accounts is rapidly increasing, and attackers are often successful in preventing recovery of the accounts, resulting in victims having to totally abandon their former accounts. Here are some steps that should be...
On June 30, 2021, I had the privilege of presenting the second of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...