New Article: CentOS 6 VirtualBox Server

January 12, 2014

In this article we build a desktop system that will be used exclusively for running virtualized systems. The hardware consists of an ASRock Z87 Pro3 motherboard and Intel i7-4770 CPU on which we've installed 32 GB of RAM. This specific motherboard was selected because it was known to support a standard installation of Linux without needing any tweaks, and also because it was listed as supporting VT-d in addition to VT-x.

Updated: Links

November 3, 2013

New entries in the links section.





Updated: Resources

October 27, 2013

New entries in the resources section.





New Article: A first look at Qubes OS

April 20, 2013

Qubes is a security-oriented OS that is designed to provide strong security through isolation. Built upon Xen, X Windows, and Fedora Core 18 (as of Qubes R2 beta 2), in Qubes both the components of the operating system and the user workspaces are isolated into functional domains, such as Dom0 for the GUI and user interaction through keyboard and mouse, NetVM and FirewallVM for the network stack, network drivers and network access control, and various user AppVMs for your applications and data.

Updated: Links

February 26, 2013

New entries in the links section.





New Article: Avast! on Windows privacy configuration

February 22, 2013

Although avast! is an excellent antivirus product and is our recommended choice for those looking for a no-cost antivirus solution, the EULA for their free product has some interesting clauses that may surprise those who actually read through it.



Updated: Resources

February 17, 2013

New entries in the resources section.





New article: Nmap database scanning

October 14, 2012

This is a very short tutorial that provides some guidance on how to run Nmap scripts against Oracle databases.





Updated: Links

September 30, 2012

New entries in the links section.





Updated: Protecting your Windows PC with Microsoft EMET 3.0

July 11, 2012

This is a user guide for installing and configuring Microsoft's free Enhanced Mitigation Experience Toolkit (EMET) version 3.0. Using EMET is an extremely easy way to add additional protection mechanisms to a Windows system in order to make successful exploitations of commonly targeted applications (ex: Adobe Reader, Flash, Java, Internet Explorer, Firefox, MS Office suite, etc.) more difficult. Likewise, it can also be used to protect internet-facing services from 0-day vulnerabilities, or to harden legacy applications that are no longer supported by their vendors.

Updated: Links

July 11, 2012

New entries in the links section.





Updated: Resources

June 13, 2012

New entries in the resources section.





New article: Ubuntu Desktop 12.04 LTS security configuration guide

June 10, 2012

This is an installation guide for Ubuntu Desktop 12.04 LTS that will show you how to enable full disk encryption and confirm that it is working, how to check for and remove unnecessary network services, how to enable the firewall and view its rule set, how to enable AppArmor beyond the default profile, and various other security and privacy related changes.


New article: Protecting your Windows PC with Microsoft EMET 3.0

May 23, 2012

This is a user guide for installing and configuring Microsoft's free Enhanced Mitigation Experience Toolkit (EMET) version 3.0. Using EMET is an extremely easy way to add additional protection mechanisms to a Windows system in order to make successful exploitations of commonly targeted applications (ex: Adobe Reader, Flash, Java, Internet Explorer, Firefox, MS Office suite, etc.) more difficult. Likewise, it can also be used to protect internet-facing services from 0-day vulnerabilities, or to harden legacy applications that are no longer supported by their vendors.

Updated: List of commercial products that included malware

April 16, 2012

A list of commercial products that included malware either in the product itself, or in the software bundled with the product.