z-security.blogspot.com
Zero-Day Computer Security Blog: October 2011
http://z-security.blogspot.com/2011_10_01_archive.html
Zero-Day Computer Security Blog. Bringing You Tech Security News Daily. Wednesday, October 19, 2011. State sanctioned German Quellen-TKÜ (source wiretapping) trojan does more than listen in. You can read Ars Technica's full report here:. Impressed by FBI trojan, Germans write their own—and national scandal ensues. Links to this post. Subscribe to: Posts (Atom). Go check out the new Thriller by Bart Cleveland - The Purification. http:/ thepurification.com/. State sanctioned German Quellen-TKÜ (source wire.
z-security.blogspot.com
Zero-Day Computer Security Blog: State sanctioned German "Quellen-TKÜ" (source wiretapping) trojan doesmore than listen in.
http://z-security.blogspot.com/2011/10/state-sanctioned-german-quellen-tku.html
Zero-Day Computer Security Blog. Bringing You Tech Security News Daily. Wednesday, October 19, 2011. State sanctioned German Quellen-TKÜ (source wiretapping) trojan does more than listen in. You can read Ars Technica's full report here:. Impressed by FBI trojan, Germans write their own—and national scandal ensues. Praise me or Flame me, I appreciate the feedback. Subscribe to: Post Comments (Atom). Go check out the new Thriller by Bart Cleveland - The Purification. http:/ thepurification.com/.
z-security.blogspot.com
Zero-Day Computer Security Blog: Quick Tip - Whole Disk Encryption
http://z-security.blogspot.com/2011/02/quick-tip-whole-disk-encryption.html
Zero-Day Computer Security Blog. Bringing You Tech Security News Daily. Monday, February 21, 2011. Quick Tip - Whole Disk Encryption. Today I wanted to give a quick tip about adding encryption to your whole harddrive, not just independent files. This is important for portable devices that hold low level sensitive data, like your search history, saved passwords, or just scattered files that are too many to round up and encrypt. I personally use it on my thumb drives because I tend to drop them a lot. ...
leonward.wordpress.com
OpenFPC in 2014 | An alchemists view from the bar
https://leonward.wordpress.com/2014/09/15/openfpc-in-2014
An alchemists view from the bar. They say that time files, and they’re right (damn them, whoever they are). Lots of things have been going on in my life over the last year, but hey you likely don’t care about that, you’re here because you’re interested to find out if OpenFPC is still alive and growing… and the answer is yes – but with a bit of a twist. So here are the big changes and updates you may like to know about. Session searching now functions from the command line. I’ve wrapped together a r...
crookedwire.blogspot.com
Crooked Wire: December 2009
http://crookedwire.blogspot.com/2009_12_01_archive.html
Thursday, December 3, 2009. Network Magic and Linksys Easylink Advisor vs IDS. So a few weeks back, I was asked to investigate a possible SYN flood attack on the VPN segment. SYN flood, really? Well, packet capture after packet capture indicated multiple users on the VPN segment sending, sure enough, SYN packets through the VPN to other machines on the VPN - pretty odd, why would an end machine try to communicate with other end machines on a VPN connection? Well I don't agree with it, but hairpinning.
crookedwire.blogspot.com
Crooked Wire: Scope Creep
http://crookedwire.blogspot.com/2010/07/scope-creep.html
Wednesday, July 7, 2010. After much deliberation, I have decided to expand the topics covered in this blog to include Security, Networking, Culinary Creations, and Logical Proofs. The reason for the scope creep is that there is already a veritable morass of avenues to get the latest news on Security, however I figure I can blog about all of my interests and not feel like I am merely regurgitating ideas that are already out there. Subscribe to: Post Comments (Atom). Decoding Netflow v5 packets with PHP.
crookedwire.blogspot.com
Crooked Wire: Hogger
http://crookedwire.blogspot.com/2010/02/hogger.html
Thursday, February 18, 2010. I just put up my new FOSS, Hogger. So, with a little inspiration from the instructor I set out to write Hogger, which currently takes the output file from an nmap scan and parses it for host information, and then creates a Host Attribute Table in XML format for Snort to read. Now to be able to use the Host Attribute table, you need to have Snort compiled with –enable-targetbased. Once that is done, just add the line attribute table filename /path/to/file.
leonward.wordpress.com
My Coed y Brenin Bike Crash (March 2012) | An alchemists view from the bar
https://leonward.wordpress.com/2012/03/20/my-coed-y-brenin-bike-crash-march-2012
An alchemists view from the bar. My Coed y Brenin Bike Crash (March 2012). Leave a comment ». I had a good crash this weekend while at a trail center in Wales. I’ll live to ride another day! Here’s the video taken from the GoPRO mounted to my chest. March 20, 2012 at 2:09 pm. Laquo; List of Mountain Bike films on iTunes. OpenFPC on Security Onion. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). Lex Deux Alpes 2014.
SOCIAL ENGAGEMENT