Digital forensics and hardware identification

| 0 comments

I thought I would sit down and begin a series of articles surrounding digital forensics with hardware identification being the lead in. The subject of forensics is one that I personally have not placed a great deal of effort and recently I took the Computer Hacking Forensic Investigator training from EC-Council. On day one, I knew I was hooked and it may not be for reason that you may suspect. I enjoy hacking from a white hat perspective and understanding the black hats is key to being successful. Ironically on day one of the training, I quickly learned that my …

Continue reading

They Live at DEFCON22

| 0 comments

Every year in August thousands upon thousands of people flock to Las Vegas, NV for the anual DEFCON conference. This is my second year attending and I knew once I attended DEFCON21 that I was forever hooked. I cannot begin to describe what the experience is like, because the experience is what you make of it. Last year, I had fun, but I did sit back and try to determine what I should and should not do. At the end of DEFCON21, I knew that I was going to jump head first into DEFCON22 and that is exactly what I …

Continue reading

Resize an image the quick and simple way

| 0 comments

It is no secret that I have been getting more and move involved with digital photography and I really enjoy shooting water landscapes with the Canon EF 70-200mm f/4 L IS USM lens. The one hurdle that I continue to face, beyond learning all that I can about photography, is being productive during post processing. The fact is it very easy to go out and shoot hundreds of photos depending on where I am. Getting back home and turning to Adobe Lightroom and Adobe Photoshop, I end up spending much more time than I should in post processing. To that …

Continue reading

Email and file security using GPGTools

| 0 comments

Here we are talking about encryption again. Those men in black seem to be everywhere these days and I am not sure about you, but trust seems to be more and more difficult to come by these days. Before I get started about the use of GPGTools, I want to step up to the soapbox and talk a little bit about email phishing since this post is addressing email security. Phishing is a type of fraud that seeks to acquire a user’s credentials by deception. It includes theft of passwords, credit card numbers, bank account details or any other types …

Continue reading

TrueCrypt goes dark

| 0 comments

Today was an interesting day in term of security within the encryption community. The developers of TrueCrypt have made the following statement: “WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues.” It is not clear exactly what is driving this decision and one can only guess at this point unless the development team comes out an conclusively comments on what the driving factor was. What makes this even more interesting, at least from my perspective, is the fact a security audit was just completed in April 2014. At that time, the phase 1 audit did not …

Continue reading