My Writing
- Training Expansion of the SANS Reverse-Engineering Malware (REM) Course FOR610 in 2010
- Cheat Sheets Security Architecture Cheat Sheet for Internet Applications A cheat sheet for initial design and review of Internet application security architecture, covering four areas: business requirements (data classification, users, partners, regulations),...
- Malware Analysis 5 Steps to Building a Malware Analysis Toolkit Using Free Tools Five steps to build a malware analysis toolkit: allocate virtual systems (VirtualBox, VMware), isolate from production networks, install behavioral tools (Process Monitor, Wireshark, Regshot),...
- Fun Translated Poems
- Malware Malware Updates from Companies and Individuals on Twitter
- Encryption 3 Steps to Improving Your Data Safeguards