CyberArms Turns One Year Old!

I just wanted to thank all my readers for making this blog such a success. The Cyber Arms blog is now one years old!

And what a year it has been! We have met new friends, and colleagues, seen some great technologies and tactics, and hopefully grew together in our knowledge of the exciting field of computer security.

We have grown much since our first month with 36 visitors. I truly appreciate your support and your great feedback. We even were awarded our first award. The “Top Blog Award for Internet Security” by Home Security Systems.

Just to share some quick stats, our first year together we have had over 211,000 visitors! Our busiest day was June 5th with 6,924 visitors. We have 669 comments and unbelievably, 3,471 spam comments.

Our Top 5 Read Technical Posts are:

  1. Cracking 14 Character Complex Passwords in 5 Seconds
  2. Backtrack 4: Penetration Testing with Social Engineering Toolkit
  3. GPU Crackers make Seven Character Passwords Inadequate
  4. NTLM Passwords: Can’t Crack it? Just Pass it!
  5. Backtrack 4: How to use Metasploit Training Class

The article Cracking 14 Character Complex Passwords in 5 Seconds has proven to be very popular. Using stats that I can track directly, the article has been read about 20,000 times, re-tweeted 170 times, and featured on numerous security sites. I have also found the article reposted online in at least 5 different languages.

Thanks to Anthony Freed and the staff of InfoSec Island for your encouragement and support. And for reposting all my technical articles!

I also want to personally thank Simone from Rsignia, John from Dual-Comm, and Mike from SuperAntiSpyware for providing evaluation product or technical materials and of course the ever popular swag!

Thanks again everyone!

2 thoughts on “CyberArms Turns One Year Old!”

  1. Congratz,
    I just discovered the blog a few weeks ago….and it’s already in my daily routine:D Keep going, you’re doing a great job.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: