Strategies to Mitigate Targeted Cyber Intrusions
At least 85% of the targeted cyber intrusions that Defence Signals Directorate (DSD) responds to could be prevented by following the first four mitigation strategies listed in our Strategies to Mitigate Targeted Cyber Intrusions:
- use application whitelisting to help prevent malicious software and other unapproved programs from running
- patch applications such as PDF readers, Microsoft Office, Java, Flash Player and web browsers
- patch operating system vulnerabilities
- minimise the number of users with administrative privileges.
US Naval Safety Center – Approach Flight Safety Magazine
XAMPP
XAMPP is a very easy to install Apache Distribution for Linux, Solaris, Windows and Mac OS X. The package includes the Apache web server, MySQL, PHP, Perl, a FTP server and phpMyAdmin.
Light On The Hill Speech by Ben Chifley
HandBrake
HandBrake is an open-source, GPL-licensed, multiplatform, multithreaded video transcoder.
Remove Empty Directories
RED searches and deletes empty directories recursively below a given start folder and shows the result in a well arranged tree. Further you can create some custom rules for keeping and deleting folders. Empty files in directories can also be ignored.
[Found this to be an extremely useful program – Dale]