My First Autopsy

Saturday, March 22nd, 2008

I have a System Forensics class this quarter at ITT Technical Institute and this was my first true lab where I actually got to use the tools and resources against "real" data. We are doing a simulated case from The HoneyNet Project and here was the documented police report: ...

Javascript Malware Source Code

Saturday, March 22nd, 2008

This is how dangerous the web has become. Lately it is estimated that over 10K of websites fell victim to a large attack that included a remote Javascript file into the title tag of a web page. The JS malware exploits vulnerabilities in Windows, RealPlayer, and other applications to break ...

A Peek at Snort 3.0

Thursday, March 20th, 2008

The wildly popular open source Snort intrusion prevention technology is getting a major makeover. Marty Roesch, who wrote the first version of the software nearly 10 years ago, has rewritten the software from top to bottom in the next-generation Snort 3.0 release, due in beta next month and early next year ...

New Technique Eases Encryption for Databases

Thursday, March 20th, 2008

Voltage Security offers to make deploying encryption at the database level less painful with a technique called Format-Preserving Encryption. Shocking the encryption market is not easy to do, but officials at Voltage Security must hope their new approach to encryption will do exactly that. The company's flagship SecureData product uses a cryptographic ...

Turn Insomnia into a Productivity Boost

Tuesday, March 18th, 2008

Insomniac and coder Chad Perrin says that hackers who stay up all night coding can get more done in those hours than most people can in a month because an all-nighter lends itself to getting into "hack mode," or the state of flow. The Jargon Wiki defines hack mode as: A ...