network
It's convenient to use the Remote Desktop Protocol (RDP) for accessing systems over the Internet, especially in server...Read more
When analyzing malware using behavioral techniques, it’s often useful to intercept network connections in your lab....Read more
Denial of Service attacks (DoS) affect numerous organizations connected to the Internet. They disrupt normal business...Read more
NetworkMiner is a free Windows utility for analyzing network traffic. It can examine live traffic that the system is...Read more
When analyzing malware, it helps to have an isolated laboratory environment that you can infect with the malware sample to...Read more
We’re used to thinking of medicine in terms of not only its healing power, but also its side effects. We recognize...Read more
Proteus, a sea god, could change his shape to confuse adversaries and avoid capture. Thinking along these lines, I...Read more
I've been thinking about the role that deception can play in information security. Honeypots present an example of how...Read more
I’ve been thinking about the role that deception can play in information security. Honeypots present an example of...Read more
A honeypot is a decoy IT infrastructure component that is designed and deployed to be attacked. While the development of...Read more