Blessed are the Geeks, for they shall internet the earth

Pen Testing in AWS

Pen Testing in AWS

Pen testing in the cloud is a different beast than when your are testing on your own hardware. Here are some guidlines to use when Pen testing in AWS. Keep from getting that dreaded In Violation of Terms of Service email!

Read More →

2005 Top 10 Hacker Attack Tools

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and...

Read More →
How to build a cheap Security NOC

How to build a cheap Security NOC

The Network Operations Center or NOC is the cornerstone of all computer networks. I've worked at AT&T's NOC, been around Government NOCs and seen small scaled versions. Most look like something out of the movie, "WarGames" and surprisingly, whether you're a Linux or...

Read More →