This is written more for my students taking cmsy-262, but I am sure everyone can benefit. It’s a nice little synopsis of vpns and why we should use them. While the article speaks to a few free and paid options they fail to mention the ability to roll your own – if you are a […]
Category Archives: Latest Posts
The latest posts form the RGS Specialists Blog.
Give me that Shotty
That was the subject line of a recent email that I received from the head instructor of Krav Maga Maryland; attached with it a clip of a man taking on a shotgun wielding attacker as seen on Yahoo news – http://news.yahoo.com/blogs/sideshow/man-turns-tables-shotgun-wielding-attacker-141851442.html While this wasn’t the greatest gun disarm, I love how it shows the “victims” (and I use that […]
Pwnies on order – they’re here!
So I decided to start ordering everything I need for building out the PwnPad community edition – and in 3-5 days, depending on shipping, I should have my own PwnPad. While I wait for the order I have been watching some of the great videos: http://www.youtube.com/watch?v=SgisYjP_nIE More to come when I start getting everything in. […]
Post a Day in May …its back
Well its that time of year again, the Post a day in May is back – even if, just like that rash from senior week, you want it or not. During the month of May I will be updating the blog and/or twitter everyday. Just like last year, topics will vary depending on what I […]
Snippy is my new friend
If your like me you want your reports to look nice and include detail pictures – after all a picture is worth a 100 words right? So off to my long time favorites Snagit and the ole fall back alt+print screen => both work but they both have their draw backs. For Snagit you have to download the program – […]
Google “helping hands”
I was tooling through my twitter feed the other day and came across Google’s, what I am calling, “helping hands” site offering assistance to anyone that has been hacked: http://www.google.com/webmasters/hacked/ The guide is simple to follow and has several steps a webmaster can follow if they think they been hacked. I suggest anyone interested in security […]
Kali Linux (BT6)
With the release of the new Kali linux (the revamped Backtrack – much more than BT6 but I have others call it that), I wanted to put out a mind map of the tools on the distro so you can get used to where everything is. I hope you enjoy it and find it useful. http://tinyurl.com/chz6u8c […]
RSA Final keynote
Well I must say I learned a lot about trying to blog the live from a conference and have a much higher respect for those that do this day to day. I liked it but was unprepared wireless was crappy, going through the phone drained it (did have it chained to laptop and that worked […]
RSA software defined data center is turning security on its head
Software defined data center =sddc Software defined security = sds Ssdc abstract the hardware and do everything from within software. The compute storage and network have to be extended across multiple boundaries. Security expands all three. Adding the components on the right (ie security) extends the virtualization time from minutes to days – so how […]
The future of endpoint security
Ok so next time I have to remember to leave enough time to take a decent lunch. I had to miss a vendor presentation because I didn’t schedule myself a lunch break. Now it’s back on pace with the 1:10 panel discussion – the future of endpoint security. So what is the first thing I […]