Author Archives: Admin

New set of International Telecommunications Regulations (ITRs), WCIT-12

Next World Conference on International Telecommunications (WCIT-12) have ITRs (International Telecommunications Regulations) on their agenda. Updates can be expected on Human Rights, Security, Privacy, Critical Infrastructure and etc. areas. For more information, see WCIT-12. From WCIT-12: This landmark conference will … Continue reading

Posted in Cybersecurity, ICT News, ICT Organizations, ICT Standards, ITU-T, Privacy, Security Standardization and Practises, Telecom Security | Comments Off on New set of International Telecommunications Regulations (ITRs), WCIT-12

Keep Yourself Safe Online, Book from Microsoft

Microsoft has published a good book called Own Your Space, Keep Yourself and Your Stuff Safe Online The book is aimed for teens, but is good material for anyone. Especially if you are thinking of Security Awareness Training.

Posted in Security Terminology, Security Training, Awareness and Reports | Comments Off on Keep Yourself Safe Online, Book from Microsoft

Test: portable VirtualBox with xubuntu linux

VirtualBox is well known tool for running guest OS inside host OS. A portable version is called Portable-VirtualBox, and it can be runned without installation (but requires admin rights). From virtualbox site: VirtualBox is a powerful x86 and AMD64/Intel64 virtualization … Continue reading

Posted in Anvanced Tools, Tests, Tips | Comments Off on Test: portable VirtualBox with xubuntu linux

Katana, collection of portable security tools and bootable distributions

Katana is a collection of security tools on USB stick. Katana is a portable multi-boot security suite which brings together many of today’s best security distributions and portable applications to run off a single Flash Drive. There are 2 ways … Continue reading

Posted in Anvanced Tools, Forensics, Tips | Comments Off on Katana, collection of portable security tools and bootable distributions

WinTaylor, forensics tools on USB stick

WinTaylor is a collection of tools for analyzing or troubleshoothing a PC. WinTaylor itself is a GUI launchboard for several other tools. Positive: No installation needed, just execute from USB In overall, good collection (nirsoft, sysinternals etc.) Source code available … Continue reading

Posted in Anvanced Tools, Forensics | Comments Off on WinTaylor, forensics tools on USB stick

Win32 Disk Imager, Tool to write image into a bootable USB

Win32 Disk Imager is basic tool for one purpose: to write disk image into USB. (In their www pages, it is called “Image Writer for Windows”). In the example below, NBCAINE image is being written into USB memory (drive L:).

Posted in Anvanced Tools, Recommended Free Tools | Comments Off on Win32 Disk Imager, Tool to write image into a bootable USB

True Cost of Compliance, by Ponemon & Tripwire

Ponemon Institute has created a report, commissioned by Tripwire, about the cost of compliance. This is good material to look for any security manager. Ponemon Institute and Tripwire Inc. conducted The True Cost of Compliance research to determine the full … Continue reading

Posted in Security Certifications, Security Management, Security Training, Awareness and Reports | Comments Off on True Cost of Compliance, by Ponemon & Tripwire