Category Archives: Security
TestDisk, Tool for recovering data and pictures on hard disks and USB drives
TestDisk is an free (open source) console based tool for recoving data. TestDisk includes another tool PhotoRec, which better for recovering photos from memory cards. (It is safer to recover files since it access USB drive as readonly.) It is … Continue reading
HxD, Tool for editing/viewing binary data like files, memory and disk
HxD is a free tool which can be used for investigating not only files but also disks and memory. It supports big files and comes with additional features, like file wiping, checksum and file comparison. For a portable simple hex … Continue reading
wxHexEditor, Portable tool for viewing/editing binary data
wxHexEditor is simple hex viewer/editor for binary files and hard & usb drives. Positive: Open source Portable Supports big files See another blog for other hex editors with more functionality.
ISO 27001 Training videos
There exist nice video set about ISO 27001, presented by Martin Dion. Worth to watch! The tree videos available are: ISO 27001 JanuaryTraining: Introduction to standards (ISO, NIST, PCI etc) ISO 27001 FebruaryTraining Information Security Roles and Responsibilities ISO 27001 … Continue reading
Risk Management Toolkit for SME
VTT (Technical Research Centre of Finland) is coordinating risk management forum via PK-RH web site. The forum is shared by many stake holder organizations. In the PK-RH main page, Risk Management Toolkit is introduced. The toolkit contains various tools: Booklets: … Continue reading
Security Training videos, aiming for CompTIA Security+ Certification
Great set of videos are offered at Professor Messer’s CompTIA SY0-301 Security+ Training . Videos are efficient and short! Worth to have a look for learning security (no matter if aiming for Security+ or not)! Section 1: Network Security … Continue reading
Public Key Infrastructure
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates (from wikipedia). Usage Example Encryption Authentication Signatures There are several tutorial videos available. Cryptography tutorial … Continue reading