They Live at DEFCON22

| 0 comments

Every year in August thousands upon thousands of people flock to Las Vegas, NV for the anual DEFCON conference. This is my second year attending and I knew once I attended DEFCON21 that I was forever hooked. I cannot begin to describe what the experience is like, because the experience is what you make of it. Last year, I had fun, but I did sit back and try to determine what I should and should not do. At the end of DEFCON21, I knew that I was going to jump head first into DEFCON22 and that is exactly what I …

Continue reading

Resize an image the quick and simple way

| 0 comments

It is no secret that I have been getting more and move involved with digital photography and I really enjoy shooting water landscapes with the Canon EF 70-200mm f/4 L IS USM lens. The one hurdle that I continue to face, beyond learning all that I can about photography, is being productive during post processing. The fact is it very easy to go out and shoot hundreds of photos depending on where I am. Getting back home and turning to Adobe Lightroom and Adobe Photoshop, I end up spending much more time than I should in post processing. To that …

Continue reading

Email and file security using GPGTools

| 0 comments

Here we are talking about encryption again. Those men in black seem to be everywhere these days and I am not sure about you, but trust seems to be more and more difficult to come by these days. Before I get started about the use of GPGTools, I want to step up to the soapbox and talk a little bit about email phishing since this post is addressing email security. Phishing is a type of fraud that seeks to acquire a user’s credentials by deception. It includes theft of passwords, credit card numbers, bank account details or any other types …

Continue reading

TrueCrypt goes dark

| 0 comments

Today was an interesting day in term of security within the encryption community. The developers of TrueCrypt have made the following statement: “WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues.” It is not clear exactly what is driving this decision and one can only guess at this point unless the development team comes out an conclusively comments on what the driving factor was. What makes this even more interesting, at least from my perspective, is the fact a security audit was just completed in April 2014. At that time, the phase 1 audit did not …

Continue reading

Security Live CD listing

| 0 comments

A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer’s memory, rather than loading from a hard disk drive; the CD itself is read-only. It allows users to run an operating system for any purpose without installing it or making any changes to the computer’s configuration. Live CDs can run on a computer without secondary storage, such as a hard disk drive, or with a corrupted hard disk drive or file system, allowing data recovery. A live ISO is an ISO image of a Live CD which can …

Continue reading

Malware and the risk to cybersecurity

| 0 comments

Malware is widespread and continues to grow with each passing day. There are even recent reports that adware vendors are actively purchasing Chrome extensions to peddle their adware and malware. If you are not familiar with what malware really is the jest of it is essentially malicious software. It many ways malware is a lucrative business but it is also very damaging and illegal. You need to understand that the delivery method of malware can include websites, email, electronic documents, and so much more. Think of it this way, the black hat finds a vulnerability which is a weakness in …

Continue reading