skip to main
|
skip to sidebar
Security Bloggers Network
Labels:
security bloggers network
Dear readers,
This blog is now reachable from the
security bloggers network
. If you go to their site, the link appears on the right hand side, in the list of contributors.
Thanks to Alan Shimel, Chief Executive Officer of The CISO Group.
Newer Post
Older Post
Home
Pages
Home
itsecuriteer's tweets (III)
itsecuriteer's tweets (II)
itsecuriteer's tweets (I)
Voki's book intro
Cyber Insurance Due Diligence
Cyber Insurance book by @itsecuriteer
Creating IT security teams
the book
Popular Posts
Follow me on twitter!
Contact (e.g. to speak at your event)
itsecuriteer at gmail.com
Views
Search this blog
Labels
7z
(1)
access point
(1)
AES
(1)
aircrack
(1)
airmon
(1)
airodump
(1)
alsamixer
(1)
android
(2)
anti-fragility
(1)
antivirus
(1)
apple
(1)
applications
(1)
arp
(1)
arp-poisoning
(1)
arpwatch
(1)
articles
(1)
audacity
(1)
audio
(1)
authenticity
(1)
availability
(1)
baby steps
(1)
Backtrack 3
(1)
banking
(1)
bitcoin
(3)
black hat
(1)
blockchain
(2)
body language
(1)
book
(2)
book review
(35)
bookmark
(1)
books
(1)
bootup
(1)
Brian Krebs
(1)
bridge
(1)
business
(3)
CERT
(1)
charisma
(1)
cigtr
(1)
clamav
(1)
command line
(2)
communication
(2)
complex networks
(9)
compression
(1)
cookie
(2)
cpu
(1)
creating
(1)
crowds
(1)
crypto
(1)
cyber attacks
(1)
cyber insurance
(1)
cybercrime
(1)
cyberwar
(2)
data analysis
(1)
data privacy
(1)
data science
(3)
datalossdb.org
(1)
ddclient
(1)
degree
(1)
details
(1)
devops
(1)
dhcp
(1)
dlls
(1)
drivers
(1)
DSL
(1)
easytag
(1)
economics
(3)
elgamal
(1)
elicitation
(1)
empathy
(1)
enchantment
(1)
encryption
(3)
entrepreneur
(3)
entropy
(1)
errata
(1)
espionage
(1)
exif data
(1)
extract
(1)
ffmpeg
(1)
firesheep
(1)
firestarter
(1)
firewall
(1)
flash
(1)
flow analysis
(1)
flv
(1)
forensics
(2)
fragility
(1)
future
(1)
geo-location
(1)
gnome-alsamixer
(1)
google
(2)
governments
(1)
gps coordinates
(1)
gray hacking
(1)
Guest Additions
(1)
help
(1)
holistic
(1)
infosec leaders
(3)
innovation
(4)
instant messaging
(1)
intelligence
(2)
internet
(2)
intuition
(1)
IP address
(2)
IT security function
(5)
IT security management
(4)
itsecuriteer
(4)
java
(1)
jobs
(1)
KPIs
(1)
leading geeks book review
(1)
learning
(1)
lecture
(1)
likeable
(1)
linux
(4)
logs
(1)
lost data
(1)
mac
(1)
mac times
(1)
measuring security
(1)
metasploit
(1)
Michael Lucas
(1)
mindlessness
(2)
models
(1)
monitor
(1)
moving
(1)
Moxie
(1)
mp3
(1)
net flows
(1)
network
(1)
network science
(9)
next generation hacking
(1)
ninja
(1)
nmap
(1)
node
(1)
notary
(1)
openioc
(1)
operational security
(1)
owasp
(1)
paella
(1)
paper
(1)
passphrase
(1)
password
(1)
patching
(1)
pauldotcom podcast
(1)
pentesting
(3)
persistence
(1)
persuasion
(2)
physical machine
(1)
podcast
(1)
ports
(1)
power law
(1)
pra
(1)
pretexting
(1)
preventive measures
(2)
privacy
(2)
probabilistic risk assessment
(2)
process explorer
(1)
process hacker
(1)
processes
(2)
product security
(1)
public dns
(1)
publishing
(1)
python
(2)
ransomware
(1)
rapport
(1)
rc.local
(1)
reading
(1)
recommended sites
(5)
reddit
(1)
registration
(1)
remote
(1)
reputation
(1)
resilience
(2)
risk management
(5)
robustness
(2)
ross anderson
(1)
router
(1)
ruby
(1)
schneier
(1)
secrecy
(1)
secure it up
(1)
security
(1)
security bloggers network
(1)
security sites
(10)
security tests
(1)
sensors
(1)
server
(1)
service provider
(1)
SIC
(1)
silent
(1)
site reliability engineering
(1)
sleep
(1)
snmp
(1)
social engineering
(10)
sound
(1)
Spanish
(1)
sql injection
(1)
squareup
(1)
ssh
(1)
ssl
(1)
stanford podcast
(1)
statistics
(1)
status quo
(1)
Stiennon
(1)
student notes
(8)
survivability
(1)
team
(2)
threats
(4)
tools
(2)
tribe
(1)
trust
(1)
trustworthy
(1)
tuning
(1)
twitter
(2)
ubuntu
(3)
ubuntu 8.10
(1)
ubuntu 9.10
(1)
unattended-upgrades
(1)
unix
(1)
update
(1)
update manager
(1)
updates
(1)
upgrade
(1)
usage
(1)
USB drive
(2)
user friendliness
(1)
vdi file
(1)
video
(1)
videos
(1)
virtual machine
(1)
virtualbox
(3)
virtualisation
(1)
VMware converter
(1)
VMware player
(1)
vulnerability
(2)
vulnerability assessment
(1)
web app
(1)
whatsapp
(1)
wifi
(1)
wireless
(1)
wisdom
(1)
WPA
(1)
WPA2
(1)
Archive
►
2018
(4)
►
November
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2017
(13)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(2)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2016
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2015
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2014
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2013
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2012
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2011
(14)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(2)
►
July
(2)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
▼
2010
(16)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(2)
▼
July
(3)
Itsecuriteer in twitter
Decrypting AES-encrypted zip files
Security Bloggers Network
►
June
(2)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2009
(10)
►
October
(2)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
2008
(2)
►
December
(1)
►
June
(1)
►
2007
(5)
►
December
(4)
►
May
(1)
►
2006
(16)
►
December
(16)
Useful security links
hackingdistributed.com
securosis.com
edge.org
thefinancialbrand.com
blueliv.com
darkmatters.norsecorp.com
fireeye.com
troyhunt.com
lares.com
openioc.org
bugcrowd.com
hackerone.com
blueliv.com/blog-news/
darkmatters.norsecorp.com
fireeye.com/blog
securityerrata.org
rootshell.be
blog.didierstevens.com
secdocs.org
grahamcluley.com
krebsonsecurity.com
analysisintelligence.com
pentest-standard.org
reddit.com/r/netsec
wtfuzz.com
rationalsurvivability.com
measurablesecurity.mitre.org
datalossdb.org
cert.europa.eu
pentestit.com
securityninja.co.uk
zeltser.com
infosecisland.com
securitywizardry.com
shadowserver.org
ha.ckers.org
darkreading.com
ethicalhacker.net
jarlsberg.appspot.com
socialengineer.org
taosecurity.blogspot.com
gnucitizen.org
commandlinekungfu.com
sans.org
irongeek
pauldotcom
internet storm center
introducing this blog
el lado del mal
securehomepc
protegetupc
About the author