Lenny Zeltser not only created some great security cheatsheets, he compiled a list of some good reference guides developed by others.
Why should you trust his FREE cheatsheets? Lenny leads a security consulting practice, teaches malware analysis, explores security topics at conferences and in articles, and volunteers as an incident handler at the Internet Storm Center.
So whether you want to learn more about specific security practices or just have a quick reference, you’ll want these cheatsheets.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Free, How to..., Security
Tagged as cheatsheet, checklist, command line, DDOS, developers, Ed Skoudis, google hacking, history of technology, incident response, jeremy stretch, lenny zeltser, log review, malware, netcat, owasp, reverse-engineering, sans, Security, sql injection, tcpdump
On Facebook, you can share your pictures; on LinkedIn, you can share your resume; on Twitter, you can share what you had for second breakfast.
On Blippy, you can share your credit card purchases!
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as blippy, Bruce Schneier, credit card, Ed Skoudis, Facebook, iTunes, netflix, purchases, second breakfast, shareoholics, social media, Twitter
Don Donzal, who created www.ethicalhacker.net and ChicagoCon (link now appears defunct), lists 10 ways for CISSPs to earn CPEs (Continuing Professional Education credits) and having fun doing it. Check out his entire article here. He wrote it in 2005, but it hasn’t aged much.
NOTE: I crossed through some of the links to now-defunct sites….remember, this was written in 2009….
Continue reading →
Like this:
Like Loading...
Filed under Free, Security
Tagged as certifiedsecuritypro, ChicagoCon, cia, cisa, CISSP, college, CPEs, Don Donzal, Ed Skoudis, ethical hacker, free, fun, hacking, isc, MBA, Security, skillz, social engineering, The Mezonic Agenda, user group, vendor, video games, webcast