Entries from NP-Incomplete tagged with 'security'

Stock Spam, AV Testing articles now available.

Bird Flu Virus H5N1 Originally uploaded by Worker101. I put up the Anti-Virus Testing and Stock Spam articles for public consumption....

Small steps and shiny buttons.

MEAT Buttons Originally uploaded by Adam J. O'Donnell. It's been a few weeks since I posted anything substantial here. I took on a new role at work that has cut into the time I spend abstracting random security problems...

Ada's WaveBubble

wavebubble Originally uploaded by ladyada. As a Christmas gift to the world, Lady Ada has posted the design for a microprocessor-controlled RF jammer called WaveBubble. It covers most of the important consumer bands pretty effectively, including WaveLan and GPS....

NFR's Market Penetration.

I don't have any decent figures on NFR's market penetration, but I do know that the Sourcefire/Checkpoint deal was nixed because of security concerns. While the deal was canned shortly after the whole Dubai ports debacle, it was likely not...

Everyone point and laugh... (and why I should be faster with this site)

... at Checkpoint for buying NFR. Matasano and Tom beat me to the laugh, however. This is a lousy consolation prize for Sourcefire, which they attempted to buy last year. Does anyone even run NFR anymore?...

Maneuver Warfare and Infosec Products

The modern practice of network security is essentially an exercise in information warfare. The two competing parties, namely the network operators and the botnet managers, are continually evolving to combat the other's tactics, each driven by economic motives. The attackers...

On Testing, Part 3.

I have been commenting on the testing of security software, specifically anti-spam and anti-virus products. The main point I made in both of those posts was that testing has to be on live data feeds, regardless of how difficult the...

On Testing, Part 2.

I had begun discussing the topic of testing security products in a previous post, where I began discussing the difficulty seen in evaluating security products. Essentially, the issues revolve around generating test vectors that is representative of the current threat...

On Testing, Part 1.

Testing a security product can sometimes be a very hard job. I don't mean internal QA-type testing, where you look for logic or syntax flaws in a system; I am talking about validating that a technology is effective against a...

Punditry, PatchGuard, and Diversity

I, like many other members of the security community, have been thinking about the PatchGuard architecture that will be implemented in Vista for the past few weeks. I resisted blogging (erg) about it because I don't want to sound like...

Even more old hacker shirts.

Elias is also contributing pictures of his shirts to the OldHackerShirts tag. We must preserve these invaluable pieces of our shared heritage, even if they are sometimes horribly sweat-stained*. * I can only attest to the state of my shirts....

Old hacker t-shirts.

packetstorm-front.jpg Originally uploaded by Adam J. O'Donnell. Years of being associated with the hacker community has led me to accumulate a number of t-shirts. Elias Levy suggested that I should take pictures of them before they end up being...

Feed Subscription

If you use an RSS reader, you can subscribe to a feed of all future entries tagged 'security'. [What is this?]

Subscribe to feed Subscribe to feed

Other Tags