Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

July 25 2010


April 29 2010


vSphere 4.0 Security Hardening Guide

Excerpt from pdf:
"vSphere Hardening Guide Introduction Scope
This set of documents provides guidance on how to securely deploy vSphere 4.0 in a production environment."

March 19 2010


Hidden Disk Areas: HPA and DCO, IJDE

Excerpt from the abstract:
"This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problematic for computer forensic investigators, since many of the common industry tools cannot detect the presence of the HPA and DCO. A review of the ATA specifications and recent white papers indicate that these areas can be accessed, modified, and written to by end users using specific open source and freely available tools, allowing data to be stored and/or hidden in these areas. This greatly increases the risk that image acquisitions may not be a true copy of the physical drive in question..."

February 12 2010


Lance Mueller Practical #3

Study and understand the JFIF file header format

January 29 2010


In the Crossfire_CIP report.pdf (application/pdf Object)

Edited excerpt from the report: The survey data gathered have been analyzed by a team from the Technology and Public Policy Program of the Center for Strategic and International Studies in Washington, DC, and supplemented with additional research and interviews. The respondents are executives who have IT, security or operational control systems responsibilities with their organization. About half said they had responsibility for such functions at a business unit level, with a quarter reporting their responsibilities were at the global level. The survey was not designed to be a statistically valid opinion poll with sampling and error margins. It is rather a rough measure of executive opinion.

October 27 2009


Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

The U.S. - China Economic and Security Review Commission contracted with Northrop Grumman Corporation to produce research report on “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation” . The government of the People’s Republic of China (PRC) is a decade into a sweeping military modernization program that has transformed its ability to fight high tech wars. A major element of this modernization effort, known as informationization, is guided by the doctrine of fighting “Local War Under Informationized Conditions,” i.e., the People’s Liberation Army’s efforts to develop a fully networked architecture capable of coordinating military operations on land, in air, at sea, in space and across the electromagnetic spectrum…”

October 21 2009


OPC Tutorial

Printed version of the online multimedia tutorial To view the online version visit:

May 24 2009


Web 2.0 Privacy and Security issues paper

The paper is aimed to highlight problems and vulnerabilities affecting Web 2.0 applications and includes recommendations for standardisation. ENISA is a centre of expertise for the European Member States and European institutions in network and information security, giving advice and recommendations and acting as a switchboard of information for good practices.

May 16 2009


USCC Testimony of Kevin Coleman Technolytics Final 041609

Opening statement of the US Senate hearing of the U.S.-China Economic and Security Review Commission: it refers to Ghostnet and other incidents attributed to China infowar tactics. In the final part of the document, there is a Q&A chapter.

May 14 2009


May 03 2009

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!