General

Last Updated on 30 June 2015, Total: 162 Blog Posts

  1. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on wigle.net to determine possible locations... Read More

  2. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  3. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  4. DDoS attack visualization

    VideoLAN developer Ludovic Fauvet turned a recent DDoS attack on VideoLAN's server into a Logstalgia video that shows an amazing, one-sided fight between thousands of requests, with the web server desperately trying to keep them all at bay... Read More

  5. May’s Newsletters Teaser

    Salient points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowsSecurity.com monthly newsletters... Read More

  6. Alert Logic key findings about the state of Cloud Security

    The cloud is not inherently less safe. Among the six security incident categories examined, Web application attack was the only threat category more prevalent in cloud hosting provider environments than in enterprise environments... Read More

  7. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  8. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  9. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  10. MSExchange.org Webinar: The Hidden Costs of Email Management

    Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More

Featured Links