Category: "Sources"

Introduction to the Sources category

  11:38, by Hagai Bar-El   , 79 words
Categories: Sources

This category contains posts that endorse or discuss sources of information, such as: books, articles, bulletins, podcasts, etc.

Be warned that like most other people, I read less than I want to, and I do not endorse sources (such as books) unless I think they deserve it. Thus, you probably do not want to restrict your education to whatever is mentioned under this category.

Lastly, if you think you have a source to endorse, guest posts will be considered.

Pages: 1 2


Recommended Podcast: Security Now

  22:43, by Hagai Bar-El   , 307 words
Categories: Sources

There are many IT security podcasts out there; too many, perhaps. Certainly too many to listen to. The challenge is to decide on which ones to follow on a regular basis. I became aware of a good candidate a couple of years ago, and since it retained its qualities (listed below) over time, I figured it is worth mentioning.

This podcast is called: “Security Now” and it is featured by Steve Gibson and Leo Laporte. Leo is a good host. He manages the show and its topics well, all in a healthy, joyful, spirit. Steve is a well-known security expert, and the creator of SpinRite — a disk maintenance and recovery tool.

Full story »


Evaluating Commercial Counter-Forensic Tools

  21:30, by Hagai Bar-El   , 548 words
Categories: IT Security, Sources

I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications perform removal of (presumably) all footprints left by browsing and file management activities, and so forth. To make a long story short: seven out of seven such applications failed, to this or that level, in fulfilling their claims.

Full story »

1 2