securance.blogspot.com
Securance: July 2012
http://securance.blogspot.com/2012_07_01_archive.html
The action or means of securing; assurance, security. Monday, July 30, 2012. Is an interesting article. It is not about a hack in the 'OMG PWNED LULZ! Tradition. It's about a subtle deception. The 'attackers' - Anonymous most likely but it could have been anybody - spoofed the NY Times website:. The article appeared on a web page built to replicate the Times' popular website, right down to perfectly working links to the rest of the site. Information operations include changing your adversary's perception.
securance.blogspot.com
Securance: Subtlety is Key
http://securance.blogspot.com/2012/07/subtlety-is-key.html
The action or means of securing; assurance, security. Monday, July 30, 2012. Is an interesting article. It is not about a hack in the 'OMG PWNED LULZ! Tradition. It's about a subtle deception. The 'attackers' - Anonymous most likely but it could have been anybody - spoofed the NY Times website:. The article appeared on a web page built to replicate the Times' popular website, right down to perfectly working links to the rest of the site. Information operations include changing your adversary's perception.
securance.blogspot.com
Securance: May 2008
http://securance.blogspot.com/2008_05_01_archive.html
The action or means of securing; assurance, security. Thursday, May 1, 2008. I've always been fascinated by TEMPEST, even before I read Cryptonomicon. Today, Wired has a blog entry. Discussing a recently-declassified NSA paper. Subscribe to: Posts (Atom). A security nerd who likes to write. This blog is a collection of thoughts. Some of these thoughts support a course I teach; none should be construed as to be those of my employer. View my complete profile. Interesting People and Places.
securance.blogspot.com
Securance: Format vs. Wipe
http://securance.blogspot.com/2012/06/format-vs-wipe.html
The action or means of securing; assurance, security. Saturday, June 30, 2012. Format vs. Wipe. I thought that the differences between a drive reformat and a drive wipe were well known, but apparently they are not:. Is the deletion/overwriting of the file table and data structures that allow an operating system to find things (files) on the hard drive. Wiping a drive -. Is the destruction of all data on a drive by writing a pattern of 0's, 1's or both to every sector on that drive. If I were to reformat.
securance.blogspot.com
Securance: The Original OODA Loop
http://securance.blogspot.com/2012/06/original-ooda-loop.html
The action or means of securing; assurance, security. Friday, June 22, 2012. The Original OODA Loop. Subscribe to: Post Comments (Atom). A security nerd who likes to write. This blog is a collection of thoughts. Some of these thoughts support a course I teach; none should be construed as to be those of my employer. View my complete profile. Format vs. Wipe. The Original OODA Loop. Interesting People and Places.
securance.blogspot.com
Securance: June 2012
http://securance.blogspot.com/2012_06_01_archive.html
The action or means of securing; assurance, security. Saturday, June 30, 2012. Format vs. Wipe. I thought that the differences between a drive reformat and a drive wipe were well known, but apparently they are not:. Is the deletion/overwriting of the file table and data structures that allow an operating system to find things (files) on the hard drive. Wiping a drive -. Is the destruction of all data on a drive by writing a pattern of 0's, 1's or both to every sector on that drive. If I were to reformat.
securance.blogspot.com
Securance: Why Defense is Hard
http://securance.blogspot.com/2012/07/why-defense-is-hard.html
The action or means of securing; assurance, security. Monday, July 23, 2012. Why Defense is Hard. The attacker only has to succeed once. Or so you may have heard. It's not exactly as simple as that, but the bad cliche has a point: it's harder to be on defense than offense. And given the growth in today's systems, it's not trending in our favor. What is surprising, is this:. It's 576 pages long. For one type of (primarily) web-based attack. This book doesn't go into XSS, CRSF or other such fun things.
securance.blogspot.com
Securance: October 2008
http://securance.blogspot.com/2008_10_01_archive.html
The action or means of securing; assurance, security. Monday, October 20, 2008. Who is Jim Christy? He's a legendary member of the computer forensic community. Http:/ www.wired.com/wired/archive/15.01/cybercop.html. Subscribe to: Posts (Atom). A security nerd who likes to write. This blog is a collection of thoughts. Some of these thoughts support a course I teach; none should be construed as to be those of my employer. View my complete profile. Who is Jim Christy? Interesting People and Places.
securance.blogspot.com
Securance: May 2007
http://securance.blogspot.com/2007_05_01_archive.html
The action or means of securing; assurance, security. Tuesday, May 22, 2007. One of the positive trends in information security is that vendors are pushing security deeper into their product development lifecycles. Microsoft made news with their Trustworthy Computing security initiative a ten years ago. Their security has improved. Other vendors have smaller mountains to climb. There are a number. Offers courses on secure coding techniques. Things are looking up. Robert Lemos, SecurityFocus 2007-05-18.