Mike Andrews was one of the coolest and most knowledgeable professors I had the opportunity of learning from, while at school @ Florida Tech. Currently, Mike is currently working as the Principle consultant at Foundstone/McAfee, taking a break from teaching. At school, we did not have video tape lectures, but I did find this video […]
Continue ReadingAuthor: Ajit Gaddam
The Great Zero Challenge
The Great Zero Challenge: A challenge to confirm whether or not a professional data recovery firm or any individual(s) or organization(s) can recover data from a hard drive that has been overwritten with zeros once. All they used is the Unix dd command using /dev/zero as input to overwrite the drive. They are doing this […]
Continue ReadingHow to crash Google Chrome
Google claims that its browser Google Chrome is able to isolate events that may crash a browser, isolated within those individual tabs. However, an issue exists with how Google Chrome handles undefined handlers in chrome.dll version 0.2.149.27 which is the latest version of the browser. A crash can result without any user interaction. When a […]
Continue ReadingInternet Browsers and their users
Comparison of the different Internet Browsers and their users. Click here for a bigger picture : http://www.flickr.com/photos/21904710@N00/2754981251/sizes/o/
Continue ReadingWhat is Defense in Depth
Defense-in-depth is fundamental to the design of a secure system. It stems from the idea that software can have flaws; people can make configuration mistakes; and hardware devices can fail. To compensate for events like these, we do not want to rely on a single mechanism to defend our resources. Instead, we deploy multiple layers […]
Continue Reading