October 20, 2010  11:50 PM

Seven Ways to Detect System Intrusions

Posted by: Ken Harthun
Hacking, Intrusion detection, security awareness, Security practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 4, 2010  2:12 PM

Security Online vs. Security in the Real World

Posted by: Ken Harthun
Anti-malware, Anti-virus, cyber security, Encryption, Firewalls, Intrusion detection, Intrusion prevention, physical security

Security online is analogous...

March 23, 2010  1:08 AM

Technospeak: Advanced Persistent Threat

Posted by: Ken Harthun
Advanced Persistent Threat, APT, InfoSec, Intrusion detection, Security, security awareness, Security practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend

July 10, 2009  8:30 PM

“I guess I forgot to lock the door.”

Posted by: Ken Harthun
Intrusion detection, physical security, Security, Security practice

Physical security is something we often take for granted, but it can be just as important as cyber security. One of my clients recently called to say that some suspicious files had suddenly appeared on one of their servers. Naturally, I investigated, but I couldn't find any breach in the firewall...

June 18, 2009  9:29 PM

How to Use the Windows Registry for Cyber Forensics: Part 2

Posted by: Ken Harthun
Cyber Forensics, Cybercrime, Encryption, Hacking, Intrusion detection

In Part 1 of this series, I introduced you to the concept of date/time coincidence and we explored five registry keys that are useful to the forensic examiner. This time, I'll show you how data can be encrypted and hidden in the registry. If you're involved in data security, you're familiar with...

October 21, 2008  5:00 PM

The Four D’s of Cyber Security: Deny, Discriminate, Detect, & Destroy

Posted by: Ken Harthun
Instrusion prevention, Intrusion detection, Password, Security, Security management

This is an interesting and sensible approach to security.  I would call these the "Logics of Cyber Security" because they're so basic they could well be the principles upon which all cyber security can be based. The paper's authors call them "first principles," defining such as "...a basic...

August 31, 2008  4:30 PM

CERT Says Linux is Under Attack

Posted by: Ken Harthun
CERT, Cybercrime, Instrusion prevention, Intrusion detection, Linux, Rootkit, Security, Vulnerabilities

It had to happen sooner or later; as Linux gains an ever-increasing foothold (Linux market share to reach 7% in 2008 ) in the market, it will become a viable target for criminal hackers. According to the U.S. Computer Emergency...

August 5, 2008  1:01 AM

New Article Series: Software for Secure Computing

Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, HIPS, Intrusion detection, Secure Computing

I recently posted the last article in my How to Secure Your Computer series of security maxims (an eBook will be available shortly--stay tuned for details). While editing the book, I...

April 17, 2008  7:05 PM

Top Five Personal Firewalls

Posted by: Ken Harthun
Firewalls, HIPS, Instrusion prevention, Intrusion detection, Security, Vulnerabilities

How well does your personal firewall protect you? GRC's Leak Test, PCFlank, and Bob Sundling's


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: