top of page
Baptist Enterprise LLC
Professional Network Security, IT Services, and more
Services
![IMG_5822[1]](https://static.wixstatic.com/media/1f1e12_8803167383b349e190c079264f95e8ee~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_8803167383b349e190c079264f95e8ee~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5824[1]](https://static.wixstatic.com/media/1f1e12_77641765401a4399ac19c9bbef43a765~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_77641765401a4399ac19c9bbef43a765~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5825[1]](https://static.wixstatic.com/media/1f1e12_74367b6b95d44285afd38fc2ece398a7~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_74367b6b95d44285afd38fc2ece398a7~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5826[1]](https://static.wixstatic.com/media/1f1e12_214a36c206914a8aa817886bf3717124~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_214a36c206914a8aa817886bf3717124~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5829[1]](https://static.wixstatic.com/media/1f1e12_c3ebac7401ce46e1933b92849c272afb~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_c3ebac7401ce46e1933b92849c272afb~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5831[1]](https://static.wixstatic.com/media/1f1e12_e44b57099cdd4c8d8e266c077208c6c5~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_e44b57099cdd4c8d8e266c077208c6c5~mv2_d_2448_3264_s_4_2.jpg)























![IMG_5822[1]](https://static.wixstatic.com/media/1f1e12_8803167383b349e190c079264f95e8ee~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_8803167383b349e190c079264f95e8ee~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5824[1]](https://static.wixstatic.com/media/1f1e12_77641765401a4399ac19c9bbef43a765~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_77641765401a4399ac19c9bbef43a765~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5825[1]](https://static.wixstatic.com/media/1f1e12_74367b6b95d44285afd38fc2ece398a7~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_74367b6b95d44285afd38fc2ece398a7~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5826[1]](https://static.wixstatic.com/media/1f1e12_214a36c206914a8aa817886bf3717124~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_214a36c206914a8aa817886bf3717124~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5829[1]](https://static.wixstatic.com/media/1f1e12_c3ebac7401ce46e1933b92849c272afb~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_c3ebac7401ce46e1933b92849c272afb~mv2_d_2448_3264_s_4_2.jpg)
![IMG_5831[1]](https://static.wixstatic.com/media/1f1e12_e44b57099cdd4c8d8e266c077208c6c5~mv2_d_2448_3264_s_4_2.jpg/v1/fill/w_980,h_1307,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/1f1e12_e44b57099cdd4c8d8e266c077208c6c5~mv2_d_2448_3264_s_4_2.jpg)























Windows 7
OS Install
Windows 7 OS Clean Installations
​
​










Secunia Personal
Software Inspector
Secunia (PSI)
Keeping Up-to-date on Patching Software​
-
Large software vendors such as Microsoft and Apple have protocols to alert you about patches and install them.
-
Software flaws can be threat vectors for exploiting vulnerabilities.
-
PSI Supports applications for over 3000 software vendors.
-
Secunia PSI will run in the background continually checking for updates unless Start on boot is unchecked in the Settings.
















Internet
Port
Scanner
Port Scanner
Tool used to perform Vulnerability Assessments
-
Probe the ports on your system to determine which ones are open, closed, or blocked.
-
Most communication in TCP/IP involves the exchange of information between the program running on one system (process) and the same or corresponding process running on a remote system.
-
If an attacker can determine what port number is being used, that service/application can be targeted.
-
Implement Port Security by determining port vulnerabilities with a Port Scanner.
-
www.iana.org/assignments/port-numbers for well-known and registered TCP/IP port numbers.
bottom of page