Articles on Tools
- Tools Design Information Security With Failure in Mind Security controls will eventually fail despite best intentions—design architecture to detect suspicious activities early and limit incident scope when breaches occur. Like boats engineered to stay...
- Tools Process Hacker as an Alternative to Process Explorer and Task Manager Process Hacker is an open source replacement for Task Manager and Process Explorer. It displays processes in a tree, color-codes debugged, service, and packed processes, shows network connections...
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...
- Malware Analysis 3 Free NirSoft Tools for Malware Analysis Three NirSoft utilities complement Process Monitor for behavioral malware analysis: ProcessActivityView shows file system access with bytes read/written, RegFromApp monitors registry changes, and...
- Malware Can We Rely on the Antivirus' Ability to Disinfect a System? When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...
- Tools Common Failures of Information Security Tools (Part 2) HIPS can miss attacks or wrongly block legitimate actions. Log management may fail to capture necessary events or confuse analysts with poor reporting. Vulnerability management tools may miss patches...