?
Solved

what is the 27 point network audit I see on so many websites?

Posted on 2013-01-29
3
Medium Priority
?
305 Views
Last Modified: 2013-04-01
I see a ton of websites that advertise a 27 point audit of the network.  but, I can't find what is included in the 27 points. does anyone know where this list comes from.  there are so many it must be common or created by some audit software.  also, remcommedation of audit software would be appreciated.
Thanks
Dave
0
Comment
Question by:curry199
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 10

Accepted Solution

by:
ivanovn earned 1000 total points
ID: 38861121
I am not familiar with what 27 point network audit includes, and doing a search on it does not provide any information (other than advertisements for it). From a skeptic's perspective, I am inclined to say that the 27 point network audit is just a gimmick. If it was a legitimate process that meant something, it would clearly outline what the 27 points actually are, as well as pass/fail criteria, etc. Since none of that is available, I am guessing it's an advertising gimmick. This is my personal opinion and is by no means official or factually supported answer.
0
 
LVL 17

Expert Comment

by:pergr
ID: 38861289
It looks to me like some sort of Wordpress worm.

Most sites that advertise it has this page in the same type of named directory (free-stuff)...

Perhaps the site owners did not actually put it there. Some sort of phishing?
0
 

Author Comment

by:curry199
ID: 39038968
I've requested that this question be deleted for the following reason:

old
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question