Breaking News

Author: danwillie

Hi danwillie blogger at large at sites like America-in-2020.com, 4UScyber.com, USALive .today, SolarWindWaterDIY.com and many others. Danwillie is my blogging name. Go to danwillie .com to find out more. Webmaster, Blogger, 40 years in computer network services

SEC

SEC Busy

The SEC revealed in September 2017 that a breach of its EDGAR system detected in 2016 had allowed hackers to obtain non-public information that was used by some traders to make a profit.

Read More
Ring

What is Ring up to

Lawmakers are seeking answers from Amazon about Ring’s partnerships with police, citing contradictions between its public statements and terms of service. Excellent Article from Townhall then Business Insider The House oversight committee sent a letter to Amazon on Wednesday seeking answers about how its Ring home-security service partners with police departments. Ring has partnered with […]

Read More
Software Patches

More Patches Feb2020

Adobe Adobe’s February 2020 Patch Tuesday updates fix a total of 42 vulnerabilities across the company’s Framemaker, Acrobat and Reader, Flash Player, Digital Editions and Experience Manager products. The highest number of flaws, 21, has been fixed in the Windows version of the Framemaker document processor. The vulnerabilities have been described as critical buffer overflow, heap overflow, out-of-bounds write, […]

Read More
China-Cybersecurity

Equifax Breach- China

Not Russia Russia Russia We have heard so much from the left its all Russia. Well this breach has been going on for two years and far greater than anything on Russia. Glad FBI and DOJ have continued to investigate this instead of being side track by the rhetoric from the left. In 2014, the […]

Read More
phishing

Plishing Attacks

This article below is an excellent for understanding Plishing Attacks today. To summarize don’t click on email links unless you are absolutely sure of its origin. Keep a good plishing tool to check your email links. The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity […]

Read More

After Windows 10 19H1

Earlier this year, Microsoft management split the Windows division in half, moving Windows engineering into the same group as Azure engineering. It was only a matter of time until Windows and Azure would start sharing the same codenaming scheme, right? Windows 10 Microsoft’s latest Windows 10 19H1 test build adds updated sign-in options for Hello, […]

Read More

National Elections

At least three US states have activated and put National Guard cyber-security units on standby for midterm elections. The three states are Washington, Illinois, and, more recently, Wisconsin.

Read More
Google Police

Media Censorship

Trump takes on Google and Internet Media #stopthebias Our President has taken on the internet media and their control of content with a  new new hashtag #StopTheBias. This is important for 2018 and 2020 Elections. Below are article on this subject President Trump accused Google of promoting former President Obama’s State of the Union address […]

Read More
Domain Name Services

DNS Changing

So DNS is changing. DNS is the heart of the Internet. But today as everything else weaknesses have been found and take advantage of. We need to make it as secure as the the websites are  and The article below from Johannes B. Ullrich, at SANS talks to that. This is somewhat old news but […]

Read More

Some Free Certs Stink

Free Internet is Gone. IETF has made a nightmare out of our free internet. We know how filtering is done against religious beliefs and political beliefs and our government is complicit in this by doing nothing. The internet needs over site, not by other companies but by governments that represent us and our values.
Both TurnkeyLinux with Wordpress and Letsencrypt performed perfect unlike Comodo and Bluehost!

Read More
Obama's Yard Sale

FCC Ruling

Our Government must protect and control data for Americans. There is a role for private industry within the confines of law. We can no longer go with the previous administration response of computer hackers control of American business and people being held hostage and told to pay up because government has no solution.

Read More

Bug in Intel PC Firmware

Bug in Intel PC Firmware I5, I7, I9 and More. Nine-Year-Old Critical Vulnerability Affects Intel Active Management Technology Intel issued a critical alert  Monday concerning an escalation of privilege vulnerability affecting Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), and Intel Standard Manageability. Firmware updates are available in all cases — but that’s […]

Read More

Networking Link

Below is a summary of networking made simple. I hope it helps you to understand networking better. With most operating systems, the lower OSI layers of physical medium data link with MAC address, network with IP address, and transport with TCP or UDP, and will be understood by both devices.

Read More
DNS works

DNS Link

If a customer is trying to access your website and types in your address – for this example, we’ll say it’s www.example.biz – the browser and operating system quickly perform an internal audit to see if that computer has recently visited your website (IP address), and therefore has that website address in its cache (memory).

Read More
White House link

Cybersecurity of Federal Networks

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Read More

Blame the world for UScyber

What we need to is be responsible and design an internet that protects Americans. But the big media, and search engine cyber bullies, are crying about Russia.  I have never seen so many cry babies in my life.

Read More
America First -USAWEB

US Needs Unbiased National Database

USA Needs an Unbiased Searchable National Database. We in America have found the big media searchable databases do not follow American values.

Read More
2016 State of Application Security: Skills, Configurations and Components7

Sans help

A fully integrated AppSec program can reap benefits in overall security posture and IR capabilities.

Read More
hacktricks_google

Googlehacking

Googlehacking Google search Commands This are commands to use when in google search especially when google does like your site and a general search shows nothing. site: define: filetypes: intitle: author: Ctrl F to find ~ related “” exact “name only” – exclude .. between 2..10 Attribute to HackCollege.com with this graphic and info. So […]

Read More
Skip to content