Protecting yourself is very challenging in the hostile environment of the internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses, and exploit them to gain access to your most sensitive secrets. They can even use your computer to store data like stolen […]
Continue ReadingAuthor: Ajit Gaddam
Preventing Security Threats from USB Storage Devices
Working in Computer Security, one of the biggest threats we face today is the threat of an Insider, an Employee who might casually walk in with his 4 GB USB Flash drive, plug it in to their computer within the corporate network and walk away with valuable data. I have seen solutions ranging from expensive […]
Continue ReadingOperating Systems Security: Year 2007 Vulnerability Report
Operating Systems Security: Year 2007 Vulnerability Report This paper analyzes the vulnerability disclosures and security updates during the year 2007 for Windows Vista Operating System when compared to its predecessor, Windows XP, along with other modern Client Operating Systems Red Hat, Ubuntu and Apple Mac OS X. The results of this analysis based on the […]
Continue ReadingPhysical Security & Information Gathering
This is a great presentation by Johnny Long at Defcon. He talks about how easy it is to gain access to secure locations without any “hacking” aka physical security. [googlevideo]http://video.google.com/videoplay?docid=2846156252478942794[/googlevideo]
Continue ReadingHow Many Passes Does the Team in White Make
It is very easy to miss something you are not looking for. How many passes does the team in white make? Test you awareness and Do the Test! [youtube]http://www.youtube.com/watch?v=Ahg6qcgoay4[/youtube]
Continue Reading