wiki.ggis.biz
Security 401 - Gruff Goat Wiki
http://wiki.ggis.biz/index.php/Security_401
From Gruff Goat Wiki. On the gray side. The AR.G.O.N. NIDS (Network Intrusion Detection Systems). This article looks at some of the most popular IDS evasion attack techniques, based on fragmentation or using the TTL field. Snort's configuration and response to these attacks will also be discussed. Retrieved from " http:/ wiki.ggis.biz/index.php? This page was last modified on 11 December 2009, at 13:29. Content is available under GNU Free Documentation License 1.2. About Gruff Goat Wiki.
jedimercer.com
News « JediMercer.com
http://www.jedimercer.com/archives/category/news
Site and project news. June 7, 2014. DeepMac Reboot progress report. I’ve updated the perl code used to archive the IEEE registry files for OUI’s (now relabeled by IEEE but that’s soley for branding purposes so I’m not going to bother to switch my own terminology). The changes were mostly to deal with the new size offered (OUI 28-bit) and some minor formatting changes. Only other change was to move to a recursive directory storage for storing the files to keep things neater. The final step will be to hav...
jedimercer.com
Opinions « JediMercer.com
http://www.jedimercer.com/archives/category/opinions
May 29, 2014. TrueCrypt’s 5/28/14 Announcement – Wait and See. Yesterday (May 28th, 2014) the truecrypt.org website suddenly started redirecting to the project page on SourceForge. The redirected webpage claims TrueCrypt is insecure and won’t be fixed, and urges people to migrate to Microsoft’s proprietary, windows-only BitLocker solution (TrueCrypt is multi-platform and supports multiple Linux OS’s as well as Windows). Since the TrueCrypt announcement does not stipulate any. Details on the supposed inse...
jedimercer.com
The Puppetmasters New Clothes « JediMercer.com
http://www.jedimercer.com/archives/34
The Puppetmasters New Clothes. The Puppetmasters New Clothes. In the Science Fiction novel “The Puppet Masters” by Robert A. Heinlein, alien creatures with the ability to connect to humans nervous systems invade the Earth. This novel was made into a terrible, horrible movie so if you have seen the movie but not read the book, please go read the book. And burn any copies of the movie you can get to. 8221; The slugs were too big to not be visible and obvious when attached to a victim. Lesson have not stuck:.
jedimercer.com
Why Is This Even Necessary « JediMercer.com
http://www.jedimercer.com/archives/39
Why Is This Even Necessary. Collaborative Cop Identifier System. Why Is This Even Necessary. The views expressed in this entry, as in all entries on my website, represent my personal views alone. They do not necessarily represent the views, policies or standards of my current or any previous employers. No content on my website is promoted or endorsed by my employers. I am a free man, and my thoughts are my own. In a few weeks both Def Con and Blackhat will be going on, and there’s going to be a lot.
ph-neutral.darklab.org
ph-neutral - darklab
http://ph-neutral.darklab.org/darklab.html
Http:/ www.darklab.org.
jedimercer.com
Wake Up And Help Burn Away The Stupid « JediMercer.com
http://www.jedimercer.com/archives/37
Wake Up And Help Burn Away The Stupid. Collaborative Cop Identifier System. Wake Up And Help Burn Away The Stupid. The biggest failure in information security is actually a failure in information technology. In the business world, there is little tolerance or interest in the needs of Information Technology, but an excruitiatingly large demand. Most IT departments run on very tight budgets with minimal personel, the majority of funding going to hardware and obscenely expensive software licensing. ...They ...
jedimercer.com
Misc « JediMercer.com
http://www.jedimercer.com/archives/category/original-articles/misc
January 13, 2010. Nessus 4.2 Professional Feed. And Core Impact v10. The Victim: http:/ demo.testfire.net/. Sorry IBM… not! I have to apologize for errors in my original article. I missed a few findings in some of the reports, and mis-read a few items. Just to make this absolutely clear, errors in analysis of the results are my own fault, not a reflection of the products. And as stated, the configurations used were not ideal. Section for a spreadsheet. October 13, 2009. The InfoSec Warrior’s Rant. Always...