chakraborty.ch
The Shivling | Chakraborty Software
http://www.chakraborty.ch/blog
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Raid filesystem partition recovery ufs freebsd. Why “The Shivling”? Our original web server was called Shiva. The current box is Ganesha. Shivling is a Himalayan mountain. Named after Shiva’s lingam. John M. Salomon. Is principal information security consultant at Chakraborty SW, GmbH. Here he is in one of his scarier moments. He can be reached at. John [at] chakraborty [dot] ch.
kotoline.blogspot.com
WORST MENOPAUSE SYMPTOMS MAY START IN BRAIN | Serba serbi Informasi
http://kotoline.blogspot.com/2011/03/worst-menopause-symptoms-may-start-in.html
Earn cash solutions mens health womens health webcam software market place Tips health affiliate advertise health and beauty etc. WP ClickBank Member site Plugin. Tutorial de PHP MYSQL. Classics of Magic Collection. Thursday, March 31, 2011. WORST MENOPAUSE SYMPTOMS MAY START IN BRAIN. Study challenges old notion that menopause start. S in the ovariesSome of the most unpleasant symptoms of menopause. Such as hot flashes and night sweats, have long been believed to originate in the ovaries. Transition a w...
chakraborty.ch
Identity Theft | Chakraborty Software
http://www.chakraborty.ch/category/identity-theft
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Example Password Cracking Speeds. A colleague recently shared a link from Lockdown. An unfortunately no-longer updated home computer security site) describing comparative times required to crack various passwords, using different types of platforms / processing speed. Unfortunately there’s no information about hash algorithms, or salt mechanisms. Data Protection Goes South.
chakraborty.ch
Exploits | Chakraborty Software
http://www.chakraborty.ch/category/exploits
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. The Total Cost of Insecure Systems. A colleague pointed out an article from CSO online entitled “ The Death of Windows XP. 8220; Upshot: slightly less than 30% of the global installed base of operating systems is Windows XP, support/updates for Windows XP are going away except for large firms willing to cough up a lot of money, and you really should migrate, now. Is estimated t...
chakraborty.ch
Forensics | Chakraborty Software
http://www.chakraborty.ch/category/forensics
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Data Leakage and Those Pesky Employees. An oft-quoted truism is that the majority of security breaches originate with internal employees. I recently attended a presentation that astutely broke down these into three categories:. Inadvertent acts — eg. someone mails a confidential document to their private email address to work on it at home. To this I would add. So…the sec...
chakraborty.ch
Firewalls | Chakraborty Software
http://www.chakraborty.ch/category/firewalls
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Stop DDoS and Worms at ISP Level? I had a workshop at the offices of a major international backbone provider today, on the subject of security logging/monitoring/response and DDoS defense for large companies. I asked one of their sales guys why they didn’t allocating a small portion of these IPs as tarpits? 8220;Our mission isn’t to save the Internet.”. This has been around as ...
chakraborty.ch
Espionage | Chakraborty Software
http://www.chakraborty.ch/category/espionage
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Data Leakage and Those Pesky Employees. An oft-quoted truism is that the majority of security breaches originate with internal employees. I recently attended a presentation that astutely broke down these into three categories:. Inadvertent acts — eg. someone mails a confidential document to their private email address to work on it at home. To this I would add. So…the sec...
chakraborty.ch
Management | Chakraborty Software
http://www.chakraborty.ch/category/management
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. Risk Management 101 for Small Business Sysadmins. I recently read a post on a forum frequented by systems administrators titled I’m scared . The text of the post contained something like they all have local admin access. All of them. It occurred to me that there are three basic categories in the security space that such companies need:. Category #1 is a control function that ov...
chakraborty.ch
External sites | Chakraborty Software
http://www.chakraborty.ch/category/external-sites
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. The classic security view of the enterprise is that of an eggshell – a lot of IT infrastructure and data inside a perimeter protected by access control, firewalls, malware defenses, and other “monolithic”, centralised technologies. 8211; Legal data handled by external law firms. 8211; Third-party manufacturing. 8211; Connections to stock exchanges. 8211; Inadvertent disclosure ...
chakraborty.ch
Crypto | Chakraborty Software
http://www.chakraborty.ch/category/crypto
Information Security Consulting Services. Links & Resources. The Shivling - Information Security Blog. Privacy and Security Law. I just learned about the existence of an ongoing effort to publicly audit TrueCrypt. Which I’ve started using to replace all my PGP disks. The latest progress update is at. Http:/ blog.cryptographyengineering.com/2013/12/an-update-on-truecrypt.html. French Researchers “Hack” TOR. Everything You Need to Know About Cryptography in One Hour. Example Password Cracking Speeds. Perso...
SOCIAL ENGAGEMENT