Home
About
About Andrew
Education
Certifications
LinkedIn
Resources
GitHub
Past Presentations
Past Conferences
Books
Research
News & Blog
Contact
Home
About
About Andrew
Education
Certifications
LinkedIn
Resources
GitHub
Past Presentations
Past Conferences
Books
Research
News & Blog
Contact
Home
Andrew Hay
Blog
Suggested Blog Reading
Category:
Suggested Blog Reading
Suggested Blog Reading
links for 2009-05-07
May 7, 2009
Andrew Hay
No Comments
Deconstructing a Webserver Attack « SANS Computer Forensics, Investigation, and Response
(tags:
webserver
attack
analysis
)
Cloud-Computing Solves Patching Problem…IT Admins Please Report to HR for Immediate Dismissal « Amrit Williams Blog
Good rant 🙂
(tags:
patch
cloud
)
Harlan Carvey-Digital Forensics Expert Author and Researcher 5/10/2009 – Larry Daniel on Blog Talk Radio
(tags:
interview
carvey
forensics
)
Suggested Blog Reading
links for 2009-05-06
May 6, 2009
Andrew Hay
No Comments
Cybergeddon: A Cyberwarfare Fable « Amrit Williams Blog
(tags:
cyberwar
)
Command Line Kung Fu: Episode #32: Wiping Securely
(tags:
secure
wipe
disk
)
US looks to hackers to protect cyber networks – Boston.com
They may be looking to hackers for ideas but they certainly aren't looking to hire said hackers.
(tags:
hacker
)
Forensic Incident Response: The malware question
(tags:
malware
incident
response
)
Suggested Blog Reading
links for 2009-05-05
May 5, 2009
Andrew Hay
No Comments
Hackers demand $10m ransom for Virginia medical data • The Register
(tags:
data
random
)
Botnets Took Control of 12 Million New IPs this Year | Threat Level
(tags:
botnet
zombie
)
Exposed: the great password scandal | News | TechRadar UK
(tags:
password
OAuth
)
HolisticInfoSec.org: The McAfee Secure Double Standard
(tags:
mcafee
xss
csrf
iframe
)
An Inexpensive Wireless IDS using Kismet and OpenWRT (pdf)
(tags:
kismet
openwrt
wireless
ids
)
XBox Forensics
(tags:
xbox
forensics
)
New version (v 1.4.2) of BASE available – isc
(tags:
base
snort
)
“A Cloud Security Ghost Story” @ Black Hat: Slides Now Available | Cloud Security
(tags:
cloud
security
blackhat
)
‹ Previous
1
…
16
17
18
19
20
…
71
Next ›
Scroll to top