A first look at Qubes OS: An examination of Qubes R2 beta 2. Last updated April 20, 2013.
Avast! on Windows privacy configuration: A step-by-step guide on how to configure avast! 7 if you have privacy concerns. Last updated March 3, 2013.
Consistently vulnerable systems: We've analyzed a list of security advisories over the past 12 months to see whether we are living in an environment in which a user who maintains a fully-patched system is still vulnerable. Last updated November 16, 2010.
Digital photo frame forensics: This article experiments with a Kodak EasyShare digital photo frame using Ubuntu and The Sleuth Kit. Last updated August 8, 2011.
Examination of overwritten files with The Sleuth Kit: Using The Sleuth Kit to examine a file that is overwritten on a USB key. Last updated March 3, 2010.
How to evaluate a suspicious web site without visiting it: This will show how you can evaluate a suspicious web site without having to visit it. Last updated June 27, 2010.
Hping usage examples: Various practical examples for using Hping. Last updated June 6, 2009.
How to use dd as a hex editor: A tutorial showing how to use dd as a hex editor. Last updated April 13, 2010.
Installing Virtualbox 4.1 on CentOS 6.2: This article will show you how to install VirtualBox 4.1 on a fresh installation of CentOS 6.2 Linux. Last updated January 9, 2012.
Installing VMware Server 2.0.2 on CentOS 5.4: This article will show you how to install VMware server 2.0.2 on a CentOS 5.4 Linux system with SELinux and iptables enabled. Last updated June 27, 2010.
Limitations of spoofing user-agent strings to download malware: A HTTP request using Wget with a spoofed user-agent string contains tell-tale characteristics that a web site owner could use to identify the web browser making the request. Therefore we show you a better method to impersonate another web browser. Last updated April 4, 2010.
Linux Command Reference v0.6: This is a reference guide of Linux commands, geared for beginner to intermediate users. The guide is broken down into 10 sections, and tries to be as distro neutral as possible. It is recommended to print the guide and keep it by your desk to reference when needed. Last updated September 22, 2008.
List of commercial products that included malware: A list of commercial products that included malware either in the product itself, or in the software bundled with the product. Last updated April 16, 2012.
Linux security commands: List of Linux commands used for security-related tasks. Last updated November 29, 2011.
Netcat usage examples: Various practical examples for using Netcat. Last updated June 4, 2009.
Nmap database scanning: Short tutorial on how to run Nmap scripts against Oracle databases. Last updated October 14, 2012.
Protecting your Windows PC with Microsoft EMET 3.0: User guide on how to secure your Windows PC with Microsoft EMET. Last updated July 11, 2012.
Protecting your Windows PC with Microsoft EMET 2.1: User guide on how to secure your Windows PC with Microsoft EMET. Last updated May 19, 2011.
Recovery of deleted files on a TrueCrypt volume: Demonstration of the use of The Sleuth Kit to recover deleted files from a decrypted TrueCrypt volume. Last updated March 23, 2010.
Sleuth Kit commands for computer forensics: A list of various Sleuth Kit commands used in computer forensics. Last updated February 15, 2010.
Tcpdump usage examples: Various practical examples for using Tcpdump. Last updated March 13, 2010.
Testing exploits against systems running Microsoft EMET: Testing Microsoft EMET 2.0 to see how well it protects Windows systems to exploitation attempts. Last updated November 23, 2010.
Ubuntu Desktop 12.04 LTS security configuration guide: Security and privacy installation guide for Ubuntu Desktop 12.04 LTS. Last updated June 28, 2012.
Ubuntu Desktop 10.04 LTS security configuration guide: Security installation guide for Ubuntu Desktop 10.04 LTS. Last updated September 19, 2010.
Wget usage examples: Various practical examples for using Wget. Last updated April 4, 2010.
Windows security commands: List of Windows commands used for security-related tasks. Last updated May 11, 2011.