In connection with the upcoming USA presidential elections in 2012, I would like to discuss holding the election via the Internet and the risks associated with it. This is not a technical text; it does not show a technician carrying out attacks on individual choices. It is an article […]
1. Introduction to Tor Bridging
Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is that Tor bridges are not listed in the Tor directory. We also said that using a bridge is […]
We’ve seen that Tor network is constituted from Tor nodes, through which we tunnel our traffic to reach anonymity. So far we didn’t bother with terminology, because it wasn’t important; all we wanted to achieve was anonymity, which we did. But when we’re trying to configure a Tor […]
In previous articles: Part 1 and Part 2 we extensively used the Tor Browser Bundle that helps us ensure our anonymity. With the Tor Browser Bundle, we can easily start using Tor without installing and configuring any additional items. It also contains one very interesting project, a web […]
1. Using Burp with Tor
So far we’ve looked at how to set up our web browser to use Privoxy, which in turn uses Tor to achieve anonymity on the Internet. But what if we want to intercept requests with Burp? To help us better understand what’s really going on, […]
Malware threats have become very common these days. In the past, many honeypots have been created to detect malware propagation over the network. These honeypots trick the malware into believing that they are a part of the network. These honeypots are however isolated and once they have been infected, […]
During my years of work as a consultant and trainer in the information security world, I’ve noticed a few patterns that usually exist in those who do very well in the industry vs those who just make it by. I decided to draft this article to share some of […]
In this article, we will explore the business concerns of Agile methodologies in project management. Recently, I read an article by Chris Matts and Olav Maasen discussing the challenges Agile faces. Does Agile’s approach to project management in fact endanger the safety of an organization’s projects?
The authors believe that […]
We all know that Tor enables us to be anonymous on the Internet. In this article we’ll look at how to achieve this and truly know what we’re up against.
First, let’s install Tor and start using it to get a grasp on things. There are many tutorials on the […]
After writing a recent article on the rapid introduction to Agile, I got an amazing response from readers, so the publisher and I decided to expand on the theme. Today we will examine how we can turn the idea into an efficient marketing strategy, as well as a set […]
Wolf Halton is a popular Speaker on topics of Internet Security, Linux and Open-Source Adoption, and Project Management Strategies. He’s the founder of SourceFreedom.com. He currently is a Senior (Linux Network) Infrastructure Engineer at Lyrasis.
How did you first get interested in computers?
My first access to computers came about because I was […]
It’s not uncommon that professional groups looking for an effective way to raise money for their organizations have started to host charity golf tournaments to bring in those extra funds. Not only does this type of event help groups raise money for themselves or worthy causes, it can also […]
Defcon day 3 started with one of the most awaited talks of Defcon 20. It was the talk “Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2″ by Moxie Marlinspike, David Hulton and Marsh Ray. Moxie marlinspike has been one of the most popular speakers at Defcon for the past […]
It can take an organization several years to build out an information security infrastructure capable of providing them with sufficient protection. This is especially true of small to medium sized companies, who usually have to work within tighter financial constraints, and all too often are reluctant to add additional […]
Two things made me write this article. The first was a conversation with a friend of mine, Luigi (Thanks Luigi!) The second was a conversation I had with a woman last night. She disagreed with the idea that a person’s entire life can be invaded and called me crazy. […]
This article will provide readers with an introduction to the statistical and dynamic analysis of code. However, before proceeding to analysis, we must first understand the concept of agile methodologies for code development. To begin, we’ll start with an exploration of agile/scrum methodology and how it plays into the […]
Information security and hacking conferences or gatherings are awesome events where you can hang out with cool people, a good environment where you can listen to topics related to computer security and security researches, and play challenging games like Capture the Flag (CTF), Hacker Jeopardy, Wireless Cracking and other […]
Jim MacLeod’s journey towards becoming a network security engineer wasn’t typical.
For one thing, he earned a Religion degree at Swarthmore College in Pennsylvania whereas conventional wisdom might have led him to pursue something more along the lines of a Computer Science degree. But while his post-secondary focus might seem […]