Interesting Information Security Bits for 11/20/2008

by kriggins on November 20, 2008

in Interesting Bits

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Richard puts forth some interesting thoughts regarding steal it or develop it from a security assurance professional's perspective.
    TaoSecurity: Intellectual Property: Develop or Steal
  2. Part three of CG's having fun with metasplolit and Oracle is ready for your review.
    Carnal0wnage Blog: Oracle Pwnage Part 3
  3. I have needed to do this in the past. Therefore, I can vouch for how handy it would have been to have the instruction that Kees has prepared for us.
    Kees Leune: Setting up your own certificate authority
  4. Rich and Adrian have the first part of what will be a multi-part exploration of creating a Web Application Security Program. Should be a very good series and one that we can all benefit from.
    Building a Web Application Security Program: Part 1, Introduction |
  5. Looks like the U.K. is putting some bite into their privacy regulations.
    Dr. InfoSec: Businesses could be fined 10% of revenues for data protection breaches
  6. This is a great walk-through on using some nifty tools to perform live memory forensics on windows boxen. Cool stuff.
    Memory Forensic Acquisition and Analysis 101 << SANS Computer Forensics, Investigation, and Response

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.


{ 2 comments… read them below or add one }

CG November 25, 2008 at 11:29 am

as usual thanks for pointing people to the blog when you think there is an interesting post.

shameless plug…there are some more oracle updates as well

Part 4. brute force user/password module and Part 5 cracking oracle passwords with john the ripper



kriggins November 25, 2008 at 1:32 pm


You are welcome. Actually parts 4 and 5 will be into today’s Interesting Bits post 🙂



Cancel reply

Leave a Comment

Previous post:

Next post: