Compare cert salaries and plan your next career move
SephStorm wrote: » If I ever start doing some sort of (Legit) Malware, i'd like to see if I can create something that exploits some completely unneeded service.
JDMurray wrote: » You should also have a look at NIST's Security Configuration Checklists Program:NIST.gov - Computer Security Division - Computer Security Resource CenterNational Vulnerability Database (NVD) National Checklist Program Repository
RobertKaucher wrote: » You mean like Code Red back in the day? That's really the way most malware work these days: exploits at the application level and applications that should never be running on a hardened system.
JDMurray wrote: » Now you're looking at the dividing line between an OS with its native services and the 3rd-patry apps and services that run on top of the OS. Just "hardening the OS" is not the same thing as hardening the apps it runs. A hardened Windows OS would still have been infected by Code Red if it were running IIS without a host header. And using a host header with IIS is generally not consider to be a security measure, but it is an effective defense against most worms and automated scanners.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.