Infosec Europe 2012
This year I spent more time attending the talks, demonstrations, etc. and had the pleasure of meeting Jack Daniel of Tenable Security, which was definitely one of the highlights of the event. I also...
View ArticleA Layered Network Security Architecture
Some weeks ago I was asked to have a quick look at a layered network architecture that was designed around several classification levels. Below is roughly what it looked like, with a few details...
View ArticleMore Random Notes on the Great Firewall
I’ve been doing more research into what most people know as the ‘Great Firewall of China’ (introduction here). Commissioned by the Ministry of Public Security, the Golden Shield is actually a more...
View ArticleInspecting Your Packets
Packet inspection is something that comes up fairly often in debates about security, surveillance, media piracy, traffic management and sometimes censorship. The technology for intercepting Internet...
View ArticleWhat Exactly are netfilter and iptables?
Sometimes there isn’t a clear line between perimeter and host-based security, and this is especially the case with iptables. This is a really low-level system of packet filtering that enables a...
View ArticleThe Adversaries’ Conspiracy Fail
I recently spent a few hours studying a somewhat interesting document posted at Cryptome.org by ‘technical engineers’ calling themselves ‘The Adversaries’. Titled ‘Full Disclosure – The Internet Dark...
View Article
More Pages to Explore .....