Auditor security collection. If you read my blog much, you know I am a fan of Knoppix-STD. It's a great “Security Tools Distribution” using the Knoppix Live system as a base for the information security professional. This morning I read about Auditor security collection, the self proclaimed “Swiss Army Knife” for security assessments. It is… Continue reading Auditor security collection
Author: Vince Kimball
Windows Forensics: Have I been Hacked?
Windows Forensics: Have I been Hacked?. The guys over at Bleeping Computer have written a tutorial that will show you how to determine if your Windows NT, XP, or 2000 box is hacked and how you can go about cleaning up the files they may have left behind. The tutorial shows you how to detect… Continue reading Windows Forensics: Have I been Hacked?
Surveillance targeted to convention
Surveillance targeted to convention. An unprecedented number of video cameras will be trained on Boston during the Democratic National Convention, with Boston police installing some 30 cameras near the FleetCenter, the Coast Guard using infrared devices and night-vision cameras in the harbor, and dozens of pieces of surveillance equipment mounted on downtown buildings to monitor… Continue reading Surveillance targeted to convention
HailStorm was before its time
InfoWorld: HailStorm was before its time. Jon Udell. Sooner or later, we will wind up delegating the management of these facts to services acting on our behalf. HailStorm was the right idea. But the dawn of this century was the wrong time and Microsoft was the wrong company. [Tomalak's Realm]
Hourly Pay in U.S. Not Keeping Pace With Price Rises
Hourly Pay in U.S. Not Keeping Pace With Price Rises. The economy has added jobs almost every month this year, but stagnant wages could hinder prospects for economic growth. By EDUARDO PORTER. [The New York Times > Home Page]
Oddpost, DHTML, and off-line Web Applications
Oddpost, DHTML, and off-line Web Applications. As you may have guessed, I didn't know much about Oddpost until recently. But since they're now part of the collective, I had the opportunity to meet with a few of the Oddpost folks on Friday. Aside from the getting an idea of how all their server-side stuff works… Continue reading Oddpost, DHTML, and off-line Web Applications
Redefining Working In The Virtual World
Redefining Working In The Virtual World. Mike Heck, a reviewer for the weekly trade publication InfoWorld has just published a review of Groove Virtual Office v3.0. It's great to see that we received an overall “Excellent” rating and a score of 8.6 out of a possible 10. Here's what Heck had to say: “In large… Continue reading Redefining Working In The Virtual World
Arranging ideas
Arranging ideas. “In my book, knowledge management boils down to arranging ideas” This post by Amy Gahran captures something I feel quite strongly about – the role and place of thought organization vs. dialog, flow and emergence in KM. Structuring personal ideas and thoughts is a very small part of KM as I see things… Continue reading Arranging ideas
A SHADOW OPEC
A SHADOW OPEC. Global Guerrillas operating in Iraq are rapidly developing the ability to disrupt oil exports at will. The tactics they are refining will play a significant role in global guerrilla strategic operations in other regions (this is part of more extensive analysis I have done for my book on GGs). Over time, these… Continue reading A SHADOW OPEC
GG TECHNOLOGY: Secure P2P Communication
GG TECHNOLOGY: Secure P2P Communication. Here's a trend in technology that will provide Global Guerrillas with a nearly zero cost global communications system with military level encryption. Secure (encrypted) P2P (desktop to desktop communication) is on the rise due to the legal onslaught of the Recording Industry Association of America (RIAA) on open file sharing… Continue reading GG TECHNOLOGY: Secure P2P Communication