During my years of work as a consultant and trainer in the information security world, I’ve noticed a few patterns that usually exist in those who do very well in the industry vs those who just make it by. I decided to draft this article to share some of […]
In this article, we will explore the business concerns of Agile methodologies in project management. Recently, I read an article by Chris Matts and Olav Maasen discussing the challenges Agile faces. Does Agile’s approach to project management in fact endanger the safety of an organization’s projects?
The authors believe that […]
We all know that Tor enables us to be anonymous on the Internet. In this article we’ll look at how to achieve this and truly know what we’re up against.
First, let’s install Tor and start using it to get a grasp on things. There are many tutorials on the […]
After writing a recent article on the rapid introduction to Agile, I got an amazing response from readers, so the publisher and I decided to expand on the theme. Today we will examine how we can turn the idea into an efficient marketing strategy, as well as a set […]
Wolf Halton is a popular Speaker on topics of Internet Security, Linux and Open-Source Adoption, and Project Management Strategies. He’s the founder of SourceFreedom.com. He currently is a Senior (Linux Network) Infrastructure Engineer at Lyrasis.
How did you first get interested in computers?
My first access to computers came about because I was […]
It’s not uncommon that professional groups looking for an effective way to raise money for their organizations have started to host charity golf tournaments to bring in those extra funds. Not only does this type of event help groups raise money for themselves or worthy causes, it can also […]
Defcon day 3 started with one of the most awaited talks of Defcon 20. It was the talk “Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2″ by Moxie Marlinspike, David Hulton and Marsh Ray. Moxie marlinspike has been one of the most popular speakers at Defcon for the past […]
It can take an organization several years to build out an information security infrastructure capable of providing them with sufficient protection. This is especially true of small to medium sized companies, who usually have to work within tighter financial constraints, and all too often are reluctant to add additional […]
Two things made me write this article. The first was a conversation with a friend of mine, Luigi (Thanks Luigi!) The second was a conversation I had with a woman last night. She disagreed with the idea that a person’s entire life can be invaded and called me crazy. […]
This article will provide readers with an introduction to the statistical and dynamic analysis of code. However, before proceeding to analysis, we must first understand the concept of agile methodologies for code development. To begin, we’ll start with an exploration of agile/scrum methodology and how it plays into the […]
Information security and hacking conferences or gatherings are awesome events where you can hang out with cool people, a good environment where you can listen to topics related to computer security and security researches, and play challenging games like Capture the Flag (CTF), Hacker Jeopardy, Wireless Cracking and other […]
Jim MacLeod’s journey towards becoming a network security engineer wasn’t typical.
For one thing, he earned a Religion degree at Swarthmore College in Pennsylvania whereas conventional wisdom might have led him to pursue something more along the lines of a Computer Science degree. But while his post-secondary focus might seem […]
As a recruiter, I often have the question posed to me in a variety of ways, “Exactly what is it that hiring managers want?” What is it that they are looking for when they review resumes and interview candidates?
Conceptually, screening candidates for best fit is a simple thing. If […]
The sharp short sound of a black agent hibernating his Laptop’s OS echoed in the room. The box banged shut making the screen and the keypad kiss each other. The RJ-45 was still soldered to his eth0 but he didn’t care and cut the wires using a M9 bayonet […]
Our 7-Day CISSP training course is the best things you can do to prepare yourself to pass the CISSP exam.
The bootcamp style course lasts for 7 days, with 12 hours of training each day. It culminates with a final practice test that mimics that actual exam. On the last […]
Some Random Number concepts:
“Random numbers” means numbers which are random in practice (i.e. unpredictable and non – reproducible). As simple this term looks when you hear it for the first time, it is more difficult to reproduce. It is a bit different when we talk about single random numbers […]
Anonymous is the most famous ‘hacktivist’ group in the world. The informal nature of the group makes its mechanics difficult to define. Subsequently, without a formal organizational hierarchy, it’s difficult to explain Anonymous to the general public and the media. In this article, I’ll explain the history of the […]
Communications around the world are gradually going digital.
I was born in 1984. I would expect, if I entered a typical office workplace that year, to find various filing cabinets, stacks of paper letters, memos and invoices, and typewriters. Even the state-of-the-art electronic typewriters of that day, such as the […]