logging

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Some thoughts about the security job market and how to get into it. (Thanks Ron)
    E-Commerce News: Trends: Breaking Into the Security Job Market
    Tags: ( career )
  2. Anton has some comments about log context. Very important stuff.
    Anton Chuvakin Blog - "Security Warrior": On Log Context
    Tags: ( log-monitoring )
  3. This paper (pdf) takes a look at replacing session cookies with digest authentication.
    WeaningTheWebOffOfSessionCookies.pdf (application/pdf Object)
    Tags: ( session webappsec )
  4. Another really good reason for egress controls.
    Sunbelt Blog: Botnet C&C switching to http; away from IRC
    Tags: ( botnet )
  5. That's a lot of malware.
    Report: 48% of 22 million scanned computers infected with malware | Zero Day | ZDNet.com
    Tags: ( malware )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Hello there! Just wanted to let you know that this Bits post is the last one you will likely see this year. I am taking some time off from the day gig and decided I am also going to do the same here. You might see a post or two if something strikes my fancy, but the Bits posts will be on hiatus.

We'll  be picking back up on January 4th.

Here are today's Interesting Information Security Bits from around the web.

  1. Another great FUDSec article.
    FUD and Other Sales Errors - fudsec.com
    Tags: ( fud )
  2. Want to build a custom wordlist based on a website for password cracking? Look no further. Here is nice how-to on getting that setup.
    Will Hack For SUSHI >> Wordlist Generation - CeWL on Ubuntu
    Tags: ( wordlist password )
  3. George has put together a nice how-to on setting up a logging virtual machine using syslog-ng, splunk and vmware. Very good stuff.
    Building a logging VM - syslog-ng and Splunk | George Starcher
    Tags: ( loging splunk )
  4. Some good information on NTLM reflection.
    Reflecting on NTLM Reflection
    Tags: ( ntlm reflection )
  5. Here is a fun fictional story about a 'lost' laptop.
    The Confessions of a Chief Executive and his lost laptop | Infosec Cynic
    Tags: ( story laptop encryption )
  6. I always get a kick of walk-through/how-we-did-it stories. This is the beginning of a series about a physical pen test.
    Red Team Physical Security Penetration Test
    Tags: ( pentest )
  7. This is absolutely full of awesome sauce. Go check it out.
    'Twas the night before D-DoS << wirewatcher
    Tags: ( poem )
  8. If you are not familiar with SteadyState and are responsible or kiosks, labs, etc., you should check out this page.
    Maintain Shared Computers with the Free Windows SteadyState Tool
    Tags: ( kiosk )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Some good tips and resources for gathering intelligence.
    Enterprise Open Source Intelligence Gathering - Part 1 Social Networks -- spylogic.net
    Tags: ( gathering )
  2. I always enjoy pointing to posts that contain resources for education and career advancement. Here is another one.
    Room362.com - Blog - Getting your n00b fill of security
    Tags: ( career learning education )
  3. As always, tools can be used for good or for evil.
    Google Wave as a Tool for Hacking | Social Hacking
    Tags: ( )
  4. This is a fun video. Evolution of Security.
    A Video For You - F-Secure Weblog : News from the Lab
    Tags: ( general )
  5. Want to avoid complete failure from a logging perspective? Check out Anton's list of logging failures.
    Anton Chuvakin Blog - "Security Warrior": Top Log FAIL!
    Tags: ( logging )
  6. An incident response plan isn't any good if it isn't workable. Check out Martin's thoughts on the issue.
    Have a workable plan, or else... : The Security Catalyst
    Tags: ( incident-response )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everyone or at least those who share my timezone. We have a good bunch of interesting things to look at that were posted over the weekend. So here we go!

Mike Rothman posted some thoughts on the rapidly evolving Manage Security Services space. He likens it to the process banking went through. It's an interesting read.

Jennifer Jabbusch shares a really good analogy with us regarding Logging, Correlation and IT Search. Very helpful for those times when you are trying to get across an inherently technical topic to a group of non-technical people.

Via Xavier at /dev/random a free and nifty looking tool.

HijackThis™ is a free utility which quickly scans your Windows computer to find settings that may have been changed by spyware, malware or other unwanted programs. HijackThis creates a report, or log file, with the results of the scan.

Security4all points us towards a video that gives us a introduction to XSS using Webgoat. The video is hosted at securitydistro.com.

By way of John M Willis, a pointer to an article on Network World, 20 great Windows open source projects you should get to know.

Richard Bejtlich shares his experience attending a Edward Tufte class on Presenting Data and Information. I have not read Edward's stuff, but it is on my list to check out.

Jeff Lowder has an article up on BlogInfoSec.com about Agility and Risk Compensation. He has some interesting points about perceived risk and the actions that people take in light of their understanding of risk as it pertains to agility in business. He also points to a good article on wikipedia about Risk Compensation Theory. Both are worth a gander.

Well that's it for now.

Have a good day.

Kevin

Technorati Tags: , , , , , , , , , ,

{ 0 comments }