Articles on Training
- Tools Controlling Adobe Acrobat/Reader JavaScript Support Disabling JavaScript in Adobe Acrobat/Reader renders many PDF exploits ineffective. If full disabling isn't practical, Adobe's JavaScript Blacklist Framework lets users selectively disable risky API...
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...
- Malware The Dark Side of Remote Desktop The Morto worm spread by scanning for RDP on port 3389 and brute-forcing Administrator passwords using common credentials. Tools like TSGrinder and Ncrack automate RDP password attacks. Mitigations...
- Incident Response How to Get into Digital Forensics or Security Incident Response Employers rarely invest in growing beginner forensics analysts, so individuals must build relevant skills within current roles. System admins can learn incident investigation tools, network admins...
- Training Psychological Similarities Between Shoplifting and Malicious Hacking Studies suggest 60% of consumers have shoplifted at some point—most are amateurs who steal sporadically. Shoplifters report excitement from adrenaline, superiority over store clerks, and belonging to...
- Career New Job, New Challenges, New Opportunities