Posted in INFOSEC

Passwords & Data Breaches

Some friends that turn to me for information security advise recently asked my thoughts on the recent announcement of the…

Continue Reading...
Posted in Forensics

FTK Windows Server 2008 SYSTEM Filter

I recently found it necessary to quickly grab a large amount of SYSTEM registry files to determine the current control…

Continue Reading...
Posted in Forensics

More FTK Filters

In my last post, I mentioned two useful FTK filters for quickly finding files of interest. Below are two more…

Continue Reading...
Posted in Forensics

FTK Filters are Your Friend

I have been working on a forensic investigation of about 20 Windows Server 2008 R2 VMs using FTK 4.2. FTK…

Continue Reading...
Posted in INFOSEC

Going Paperless: Where Paper Meets Bits and Bytes

A client consulted me about going to a paperless environment. His company utilizes several different forms and numerous other documents…

Continue Reading...
Posted in INFOSEC

Logging User Activities within Linux with bash scripts

I am just starting to learn the power of bash scripting. So, this script below may not be the best…

Continue Reading...
Posted in INFOSEC

pam_tally2 Authentication issues

The other day I was trying to log in with a newly created user in CentOS Linux with the The…

Continue Reading...
Posted in INFOSEC

Corporate Data Leakage in the “Clouds”

Folks, I am a bit sick of hearing “cloud” used as the latest buzzword to describe anything from a simple…

Continue Reading...
Posted in INFOSEC

Security Short: Wireless ENCRYPTION…..ENCRYPTION!

Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security…

Continue Reading...
Posted in INFOSEC

Security Short: OPSEC for the home

Enterprises develop policies for protecting all kinds of assets, both physical and virtual. Some of these policies cover Operations Security…

Continue Reading...