Articles on Tools
- Tools Controlling Adobe Acrobat/Reader JavaScript Support Disabling JavaScript in Adobe Acrobat/Reader renders many PDF exploits ineffective. If full disabling isn't practical, Adobe's JavaScript Blacklist Framework lets users selectively disable risky API...
- Tools When Successful Security Measures Are Taken For Granted When security controls consistently protect without incident, beneficiaries may question their value: "No breaches recently—why do we need a CISO?" Collect meaningful metrics showing safeguards are...
- Social Networking Explaining Computer Security Terms to Ordinary People Technical jargon that security professionals use daily may be meaningless to non-IT people. A collaborative effort with SANS Institute defines commonly-used security terms like firewall, exploit, and...
- Tools Design Information Security With Failure in Mind Security controls will eventually fail despite best intentions—design architecture to detect suspicious activities early and limit incident scope when breaches occur. Like boats engineered to stay...
- Tools Process Hacker as an Alternative to Process Explorer and Task Manager Process Hacker is an open source replacement for Task Manager and Process Explorer. It displays processes in a tree, color-codes debugged, service, and packed processes, shows network connections...
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...