Security isn't thin
  ITS LARGE

    LOUD AND

      FAT

<----------

 


Putting science back into security!!!

Articles and Presentations

 

Articles

  Tunneling out

Article on tunnels

  GPUs in Security

Whitepaper on the use of CUDA and GPUs in security

  CyberSecurity Probes

Article on my design of a high speed CyberSecurity probe

  Data Retention Directive

Article on Directive 2006/24/EC of the European Parliament on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC

  Security expert Wanted - DEAD or ALIVE

The Computer Misuse ACT 2.0 may make anyone writing an exploit liable to be sent to the hole

  IDS - geting to zero false positive

linking SNORT, NMAP & Nessus - The fat boys newest project

  IDS - Catching Script kiddies

I think this one is worth a read. Covers poor implementation, common flaws and IDS avoidance - Please enjoy!!

  WAP - The WAP gap

Who Cares !! But seriously this was the first article I saw that made a serious attempt to explain the risks to those outside the phone industry

  Wireless Networks - Throwing Cash out the door

Very simple article which will get your bosses attention

  802.11 - The Exposures Demonstrated

I worked long and hard on this and I'm chuffed. This isn't one of those theoretical chin-stroking papers, it shows you how exposed you are by actually hacking a network.

 

Presentations

  IDS - E-security conference

This to goes with the ids- script kiddies article above

  E-security - Common flaws

I am told this is too techy

  WAP - The WAP gap presentation

Give me a couple of days and it'll be there

  Application Pentesting

A short presentation that suggests intergating Apllication Security Testing with the Normal System Development Lifcycle