Security isn't thin | ||
![]() |
ITS LARGE LOUD AND FAT <---------- |
|
Putting science back into security!!! |
Articles |
||
Tunneling out | Article on tunnels
|
|
GPUs in Security | Whitepaper on
the use of CUDA and GPUs in security
|
|
CyberSecurity Probes | Article on my design of a high speed CyberSecurity probe |
|
Data Retention Directive | Article on Directive 2006/24/EC of the European Parliament on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC |
|
Security expert Wanted - DEAD or ALIVE | The Computer Misuse ACT 2.0 may make anyone writing an exploit liable to be sent to the hole |
|
IDS - geting to zero false positive |
linking SNORT, NMAP & Nessus -
The fat boys newest project |
|
IDS - Catching Script kiddies | I think this one is worth a read. Covers poor implementation, common flaws and IDS avoidance - Please enjoy!! |
|
WAP - The WAP gap | Who Cares !! But seriously this was the first article I saw that made a serious attempt to explain the risks to those outside the phone industry |
|
Wireless Networks - Throwing Cash out the door | Very simple article which will get your bosses attention |
|
802.11 - The Exposures Demonstrated | I worked long and hard on this and I'm chuffed. This isn't one of those theoretical chin-stroking papers, it shows you how exposed you are by actually hacking a network. |
|
Presentations |
||
IDS - E-security conference | This to goes with the ids- script kiddies article above |
|
E-security - Common flaws | I am told this is too techy
|
|
WAP - The WAP gap presentation | Give me a couple of days and it'll be there
|
|
Application Pentesting | A short presentation that suggests intergating Apllication Security Testing with the Normal System Development Lifcycle
|