Solved

what is the 27 point network audit I see on so many websites?

Posted on 2013-01-29
3
262 Views
Last Modified: 2013-04-01
I see a ton of websites that advertise a 27 point audit of the network.  but, I can't find what is included in the 27 points. does anyone know where this list comes from.  there are so many it must be common or created by some audit software.  also, remcommedation of audit software would be appreciated.
Thanks
Dave
0
Comment
Question by:curry199
3 Comments
 
LVL 10

Accepted Solution

by:
ivanovn earned 500 total points
ID: 38861121
I am not familiar with what 27 point network audit includes, and doing a search on it does not provide any information (other than advertisements for it). From a skeptic's perspective, I am inclined to say that the 27 point network audit is just a gimmick. If it was a legitimate process that meant something, it would clearly outline what the 27 points actually are, as well as pass/fail criteria, etc. Since none of that is available, I am guessing it's an advertising gimmick. This is my personal opinion and is by no means official or factually supported answer.
0
 
LVL 17

Expert Comment

by:pergr
ID: 38861289
It looks to me like some sort of Wordpress worm.

Most sites that advertise it has this page in the same type of named directory (free-stuff)...

Perhaps the site owners did not actually put it there. Some sort of phishing?
0
 

Author Comment

by:curry199
ID: 39038968
I've requested that this question be deleted for the following reason:

old
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now