IT Trenches:

tutorial

1

November 19, 2010  2:37 PM

Anatomy of a crimeware rootkit – scary stuff!



Posted by: Troy Tate
crimeware, infosec, malware, rootkit, training, trojan, tutorial

I came across a recent tutorial on reverse engineering the ZeroAccess / Max++ / Smiscer Crimeware Rootkit. This is a very malicious...

November 11, 2009  6:31 PM

Free online IT education resource



Posted by: Troy Tate
Adobe, certification, Database, information technology reference, information technology tutorial, IT education, Linux, MAC OS, Macromedia, Microsoft, Microsoft education, network technology education, Networking, programming, sql, technology education, tutorial, XML

I recently came across an excellent IT education resource that is free. It is the eTutorials.org website. According to the website it is a source of  thousands online tutorials, useful tips, articles, and researched...


July 24, 2009  6:03 PM

Using Wireshark to analyze a bot infected host



Posted by: Troy Tate
bot, data capture, education, ethereal, information security, Laura Chappell, network analysis, network security, packet analysis, packet capture, Security, tutorial, wireshark

My favorite Bitgirl (Laura Chappell) is at it again in this 15 minute presentation. She came across a host on a network that appears to be infected with some bot application. Take a few...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: