From: Thomas, Kevin Sent: 24 August 2011 10:43To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, JavvadSent: 24 August 2011 11:03To: Thomas, Kevin Subject: Encryption Hi Kevin, … Continue reading Can you explain encryption to me.
Author: j4vv4d
Input Validation
This week's episode has been hijacked by Girl Cynic. After a high level discussion with her on what input validation is all about, she thought she could make a better episode on the topic. I gave her the example of blacklisting as sugar is blacklisted from being put into my bikes petrol tank. So she … Continue reading Input Validation
My Facebook friend is a Turnip
Some people have no idea how to manage their Facebook friends. My wife is probably the worst culprit for this type of thing. A typical exchange goes somewhat like this; Wife: I've received a friend request, what shall I do? Me: Is it someone you know? Wife: Well, I don't recognise them. Me: Ignore them … Continue reading My Facebook friend is a Turnip
SANS London 2011
This year I was fortunate enough to be accepted on SANS work-study scheme which means I’ll be attending my course like everyone else whilst at the same time facilitating and helping run the event. I’m quite looking forward to it, as it will give me the opportunity to wear the infamous red apron that all … Continue reading SANS London 2011
Google NoMap
Google recently stated that by adding _nomap to the end of your routers SSID will turn off location tracking services. This may be a stroke of genius, as there are many other applications for this concept.
Backtrack 5 Wireless Penetration Testing: Book Review
A book review of Backtrack 5 Wireless Penetration Testing by Vivek Ramachandaran. A great guide for beginners and even those with some experience in wireless penetration testing. Crammed full of tutorials so you are effectively led by your hand all step by step. The book adopts a progressive and simple-to-understand methodology whereby you are explained … Continue reading Backtrack 5 Wireless Penetration Testing: Book Review
What is the product?
Ghost in the wires: Book Review
I’ve just read Kevin Mitnick’s book Ghost In The Wires: My Adventures as the World's Most Wanted Hacker and it is definitely worth a read if you are interested in getting to hear the full story from Kevin’s perspective as he became the worlds most wanted hacker. It’s a very readable book that doesn’t require … Continue reading Ghost in the wires: Book Review
Best Practice and security Monkeys
This video was inspired by the old five monkeys in a cage experiment. Unfortunately, you can often observe security professionals and especially auditors exhibit such behaviour. They are ‘taught’ at one stage of their life that something is secure and the way to do it. Often referred to as ‘best practice’. The problem with … Continue reading Best Practice and security Monkeys
Plagiarism is bad… oh look a new song to download!
I’m confused... A lot of you would say that you already know that and may well add a few more adjectives to describe me. Recently, it has come to light that work published by corelan.be had been plagiarized in course material used by http://www.infosecinstitute.com/. You can read up on the full details either at corelan.be … Continue reading Plagiarism is bad… oh look a new song to download!
