Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  Information Security Short Takes technology Blog  > 

Online Serial Book - The Cliff Nest
2018-10-22 17:30
Today is a great day. I just started the publishing of my interactive serial hashtag#book .The book is a sci-fi story that integrates hashtag#cybersecurity challenges as interactive efforts… Read More
Cracking A TrueCrypt Container
2018-10-11 19:44
This week i tried to open an old TrueCrypt container. It turned out that i had forgotten the password. So I endeavored into the realm cracking the TrueCrypt container. Here are my experience… Read More
Simple OSINT Treasure Hunt Challenge
2018-10-11 15:51
I created a simple treasure hunt challenge for young InfoSec enthusiasts and professionals. It's mainly OSINT with some very basic crypto and a tactical story. No real prize except bragging… Read More
2018-10-11 15:32
I have been hugely busy in the past weeks with several projects, so the blogging got stuck... I will try to avoid this in the future. Now back to my latest experiencePart of every Informatio… Read More
9 Things To Watch Out For In An SLA
2018-10-11 15:26
I wasn't planning to touch the issue of the Service Level Agreement (SLA) for some time, but it appears that the incident report (Link to Blog Post) has stirred attention that merit a post o… Read More
Telco SLA - Parameters And Penalties
2018-10-11 15:16
Communication links provided by Telco providers are critical to most businesses. And as any network admin will tell you, these links tend to have outages, ranging from small interruptions up… Read More
2018-10-11 11:59
It has been more than 5 years since I've last updated this blog. Going back and reading through the materials i find a lot of legacy and already forgotten tools and processes, some futu… Read More
2014-01-10 11:39
Many years ago, on a great satire TV show named "Top Lista Nadrealista" - "The Surrealists Top Chart" I watched a sketch named "Do you want to be anonymous".The sketch presented a TV crew wa… Read More
2013-11-22 08:40
We provide a huge amount of information about us to many different online services. Naturally, these companies use that information to understand us in ways we have never imagined with only… Read More
2012-06-07 07:09
For the man who illustrated our imagination, and made me personally read more...rest in peace, RayRay Bradbury, 1938-2012 Read More
2012-02-11 17:00
Cell phones don’t feel newfangled but in truth they are. With innovation comes swift change, sometimes so swift that it is difficult for forensic scientists to keep up. Criminals use c… Read More
2012-01-18 07:56
Stop SOPA and PIPA: We openly declare our support for the efforts to prevent the ability for governments to police the Internet.Kudos to WikipediaTalkback and comments are most welcomeRelate… Read More
2012-01-10 23:00
IT has come a long way in the past 15 years, and definitely has advanced into the realm of commodity service. But there are still complexities under the hood of this commodity service. One… Read More
2011-12-27 09:53
It has been a while since the last published article, and we are not going to try to make excuses.But we are enticed to do a quick note of the developing story of STRATFOR. In summary, Strat… Read More
2011-08-22 09:23
Centralizing your storage is always a very good idea - you can manage storage requirements of most servers through a central storage system, without the hassle of juggling local disks within… Read More
2011-06-30 13:54
Software security is a highly technical and vital skill in today's evolving technological marketplace. Even so, programs specializing in this area are quite rare. In fact, it's more common t… Read More
2011-06-03 09:40
Having an antivirus software is a gold standard in the Windows world. But what if you are using a Mac? The prevailing opinion is that there aren't enough viruses or malware in the wild to me… Read More
2011-05-20 15:23
Being involved in a security project requires lot of resources: a good measure of knowledge, a huge measure of experience, some amount of software and personnel. Usually time is in short s… Read More

Share the post

Information Security Short Takes

×

Subscribe to Information Security Short Takes

Get updates delivered right to your inbox!

Thank you for your subscription

×