Author Archives: Admin
Public Key Infrastructure
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates (from wikipedia). Usage Example Encryption Authentication Signatures There are several tutorial videos available. Cryptography tutorial … Continue reading
Example Analysis of Spear-phishing email
There is a good example of a detailed investigation of a malware, available on SANS reading room. It is good for learning, not only about spear phishing threats, but also about investigation techniques. Case highlights: Spear-phishing email with attachement The … Continue reading
Notepad++, Tool for editing various text files
Notepad++ is good free alternative for editing text files. It support syntax highlighting, for example for java etc. Note, several files are accessable via tabs. Note, there might be some installation issues with Windows Vista. As an alternative way, … Continue reading
Audio book “Jane Eyre”
LibriVox is one of those sites which holds free audio books. Audio books might fit nicely especially for travellers. I was happily surprised of the quality of the audio book “Jane Eyre” by Charlotte Brontë, and read by Elizabeth Klett. … Continue reading
Duqu, beginning of future Stuxnet variants
Symantec has published a study of a new threat called Duqu. Main components and modules are shwon below. Highlights from Symantec report: The threat was written by the same authors Duqu’s purpose is to gather intelligence data and assets from … Continue reading
Security Certification directory
CSO Online article “The Security Certification Directory” contains a good list in this subject. The directory is divided into categories: Information Security certifications, like Certificate of Cloud Security Knowledge Certified Information Systems Professional, CISSP Global Information Assurance Certification (GIAC) Certified … Continue reading
Security Survey Directory
CSO Online article “The security data and survey directory” contains a good list in this subject. The directory is divided into categories: Risk Management Attack Vectors Security Spending, Budgets & Priorities Physical Security and Loss Prevention Security Controls Data Security … Continue reading