Radical Development

Technical Without the Technicalities

Life In a Digital World Means Little or No Privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who … Continue reading

Technology Is The Government’s Oldest Best Friend

| 0 comments

Recently we have all most likely have heard the news concerning the National Security Agency (NSA) is currently collecting the telephone records of millions of US customers of Verizon. This is extremely disturbing and while I have my own personal opinions as to what is or is not acceptable, this has clearly crossed the lines of trust in my humble opinion. In what world do we live that the government can simply cast a net so vast as to have this type of data for the purpose of seeking out those who are conducting illegal activities? I have heard others … Continue reading

Hacking 101: Footprinting Using Nothing But A Web Browser

| 0 comments

Welcome to this article which is to introduce the idea of foot-printing when it comes to hacking. What foot-printing really means is the act of information gathering and this can be either active or passive or even and combination of both. In order to determine the vulnerabilities of a given target you must first understand the target. To this end the information you can compile over the internet can yield tremendous results and this is known as passive foot-printing. Remember to keep good notes on the information that you are able to find. These notes will come in handy later … Continue reading

Microsoft Assessment and Planning Toolkit Explained

| 0 comments

What does the MAP toolkit do? The Microsoft Assessment and Planning (MAP) Toolkit 8.0 is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs. The MAP toolkit uses Windows Management Instrumentation (WMI), Active Directory Domain Services (AD DS), SMS Provider, and other technologies to collect data in your environment and inventories computer hardware, software, and operating systems in small or large IT environments without installing any agent software on the target computers. The download is free, but it has a laundry list of prerequisites: .Net … Continue reading

The Future of Cybersecurity Technology and Policy

| 0 comments

Only when a comprehensive understanding of the cyber threat is taken into consideration can organizations utilize process, tools, and technologies to find, correct, and combat those who launch a cyber-attack. This paper takes a look at the past, present, and future in order to present a concept that works. The idea here is a partnership with both private and public sectors in a type of responsibility where everyone works together to achieve the goal of cyber defense. This includes tools, technologies, methodology, and a common sense approach to the problem. The days of standing alone have failed and it is … Continue reading

Business Contingency Operations

| 0 comments

The idea of a Business Contingency Plan (BCP) is the act of preparation and adapting to any contingency either manmade or natural. Examples include hurricanes, earthquakes, sabotage, and even war. Upon beginning the BCP questions much be answered and these questions include subjects of what is a disaster, what are available options, how much can be endured, and what is the cost connected with the BCP. Arguably most important is the fact of exercising the BCP in order to understand if the plan results in the expected outcome. In addition, it is imperative that this plan not become stagnate. In … Continue reading

Establishing A Digital Forensics Lab

| 0 comments

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early ’80s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.  Digital forensics investigations have a … Continue reading