willem.com

Limit the attack surface of your computer

Considering open ports and unused network facing services

Feb. 28, 2019 -

People pay me to hack them, provided I'll explain how it was done, so future hacks can be prevented. As security consultant, I scan for weaknesses in my clients' apps, webshops and websites. Very often a hack starts by exploiting a security hole that is visible remotely. Read along to learn how hackers find security holes and what you can do to secure them.

Continue reading
Different kinds of hosting: Shared hosting, VPS hosting and dedicated hosting visualised (a circle representing a physical server)
Different kinds of hosting: Shared hosting, VPS hosting and dedicated hosting visualised (a circle representing a physical server)
A typical server in the datacenter, a physical machine that can host apps, webshops and websites
A typical server in the datacenter, a physical machine that can host apps, webshops and websites
Once a hacker knows what software your website uses, its easy to lookup known security holes using databases like cvedetails.com
Once a hacker knows what software your website uses, its easy to lookup known security holes using databases like cvedetails.com
Contagious effect of an hacked website (red indicating trouble)
Contagious effect of an hacked website (red indicating trouble)
Keep in mind that help is available - I know my way around servers and cyber security
Keep in mind that help is available - I know my way around servers and cyber security
Using nmap to scan a hosting server, identifying network facing services and open ports
Using nmap to scan a hosting server, identifying network facing services and open ports

Other stories

all blog posts

Tagged

CloudCyber SecurityDataHackingFree SoftwareNetworkingProgrammingServerWebdesign

Articles (147)