Export thread

  • SpinRite v6.1 Release #3
    Guest:
    The 3rd release of SpinRite v6.1 is published and may be obtained by all SpinRite v6.0 owners at the SpinRite v6.1 Pre-Release page. (SpinRite will shortly be officially updated to v6.1 so this page will be renamed.) The primary new feature, and the reason for this release, was the discovery of memory problems in some systems that were affecting SpinRite's operation. So SpinRite now incorporates a built-in test of the system's memory. For the full story, please see this page in the "Pre-Release Announcements & Feedback" forum.
    /Steve.
  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

    /Steve.
  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)

A public service announcement: CPEs

#1

Lob

Lob

I'd just like to remind all certified professionals "consuming" Security Now and other such podcasts that their CPE requirements can include podcasts.

My annual CPE requirement with ISC2 is being fulfilled with type A CPEs logged for listening every week to SN. And I have been audited on the podcast topic which was a short and sweet email exchange.

Given the slowdown in certain networking events, I was happy to be able to meet my goals and I thought it worth sharing (y)


#2

EdwinG

EdwinG

Allow me to ask, what's a CPE?

I know that CEP stands for Candidate to the Engineering Profession. But no clue what's CPE…


#3

P

PHolder



#4

Lob

Lob

Thanks, PHolder.

From the ISC2 themselves, grab a coffee and strap yourself in for an exciting read :D CPE Guidelines (isc2.org)


#5

Lob

Lob

@Steve .... I think I was in before the masses :;D

It used to be the case until about 3 years ago that (certainly ISC2) podcasts were not categorised and you had to shoehorn your CPEs into a different category. I've been putting SN in for my CPEs on my CISSP since 2011 (when I did the exam). Achieving CPE goals is easy given the annual contribution from you, @Steve (y)

I should have gone to Twitter to notify you :D :D

And I have been audited in 2020 for podcasts. Not SN but the one with the former Naked Security guy (notice the capitalisation!) as mentioned in the first post. Maybe that's when ISC2 added podcasts....


#6

H

Harry

I've taken ISC2 exams and recently passed the CISSP. I've known answers to a couple of questions just from listening to Security Now.


#7

Lob

Lob

@Steve The CISSP Official Study Guide, 9th edition, features 3 Dumb Routers on page 384, chapter 9 about Security Vulnerabilities, Threats, and Countermeasures

That's in addition to the chapter 8 mention of SN-646 :D

You've arrived, at last :D :D :D

Attachments


  • 3DumbRouters.jpg
    3DumbRouters.jpg
    45.5 KB · Views: 131