FileHash v5.4 has recently been released, and we’ve added some URL parsing to find hashes that can be compared to existing files via the -y and –hl parameters Instead of having to manually obtain the checksums for files you want to compare, before you can use...
FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
There is every indication that businesses and networks in Western countries are very likely to face increased cybersecurity attacks in the near- to mid-term. Here are some things to consider and for the protection of personal and commercial networks (to include those...
On June 30, 2021, I had the privilege of presenting the second of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
On June 16, 2021, I had the privilege of presenting the first of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
Yes, you need to understand technology and cybersecurity architecture. No, it doesn’t matter what your business is about – you need to understand this if you want your business to succeed. No, it’s not “fair”. No, there’s not enough time in a day. ...