Sunday, December 7, 2008

grub4dos and ubcd411.iso problem - Boot Land

grub4dos and ubcd411.iso problem - Boot Land: "CODE
title boot UBCD 3.4/ntfs4dos
map hd0,0 /ubcd34-basic.iso hd32
map --hook
map hd32 /IMAGES/NTFS4DOS.IMG fd0 #ensure capital letters or not
map --hook
root fd0
chainloader +1"

Wednesday, July 9, 2008

Veltsos joins Editorial Board of SANS NewsBites Newsletter

Regular readers of the SANS NewsBites Newsletter (semi-weekly newsletter about information security) might have recognized a familiar name (Veltsos) in the comments section of some recent newsletters. Here are newsletters that Dr. Veltsos contributed comments to or full write-ups.

  1. The first Guest Editorial appearance by Chris Veltsos in SANS Newsbites. In that particular issue, Veltsos' name was mispelled (missing the last "s") SANS NewsBites Vol X, Issue: 41 (May 23, 2008).
  2. SANS NewsBites Vol X, Issue: 43 (May 30, 2008).
  3. SANS NewsBites Vol X, Issue: 45 (June 6, 2008).
  4. SANS NewsBites Vol X, Issue: 46 (June 10, 2008).
  5. This time, Veltsos contributed a writeup for one of the top stories for Issue 47. SANS NewsBites Vol X, Issue: 47 (June 13, 2008). Here's what he had to say:
    House Passes Intellectual Property Bill
    The US House of Representatives recently passed HR 4279, the Prioritizing Resources and Organization for Intellectual Property Act of 2008 (PRO-IP). The bill establishes a Property Enforcement Division within the DOJ; amends federal copyright law to increase civil damages; amends federal criminal code related to copyright infringement and counterfeit packaging, and; creates ten new intellectual property attaches to work with foreign governments to reduce counterfeiting and piracy. The bill is not without controversy as it strongly favors large content owners (RIAA, MPAA), levies increased domestic penalties, and directs state and local law enforcement agencies to combat intellectual property theft and infringement crimes.
    http://www.washingtonwatch.com/bills/show/110_HR_4279.html
    http://www.govtrack.us/congress/bill.xpd?bill=h110-4279
  6. SANS NewsBites Vol X, Issue: 48 (June 17, 2008).
  7. SANS NewsBites Vol X, Issue: 49 (June 20, 2008).
  8. This time, Veltsos contributed a major rewrite of one of the top stories for Issue 52. SANS NewsBites Vol X, Issue: 52 (July 1, 2008). Here's what he had to say:
    More Than 630,000 Laptops Lost at Airports Each Year
    A Ponemon Institute survey of 106 airports in 46 states found that as many as 637,000 laptops are reported lost each year. Overall, more than12,000 laptops are reported lost at the airports every week, and 67% arenever recovered. The 36 largest US airports account for more than 10,000lost laptops each week. The laptops are most commonly lost at securitycheckpoints and departure gates. The survey also included feedback from 864 business travelers: 53% said their laptops held confidential data; 42% said their data was not backed up; 16% said they would do nothing if they lost a laptop while traveling on business; 77% said the chance of recovering a lost laptop was less than ten percent. The study was commissioned by Dell, which has just released "a suite of data protection and asset protection services," including laptop tracking and remote data deletion.
    http://www.dell.com/downloads/global/services/dell_lost_laptop_study.pdf
    http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9105198&source=rss_topic17
    http://www.crn.com/managed-services/208801451
  9. SANS NewsBites Vol X, Issue: 53 (July 8 , 2008).
  10. SANS NewsBites Vol X, Issue: 55 (July 15 , 2008).
  11. SANS NewsBites Vol X, Issue: 56 (July 18 , 2008).
  12. Stay tuned for updates.

Friday, May 9, 2008

What is your stolen data worth? | Tech news blog - CNET News.com

If you think that one can't put a price on your private data, think again. At pennies on the dollar (5 cents per dollar), it's no wonder the e-underground economy's booming!
What is your stolen data worth? Tech news blog - CNET News.com

NSA on how to disable USB Devices

NSA on how to disable USB Devices

Tuesday, May 6, 2008

CFP - IEEE CCNC Short Papers

IEEE CCNC Short Papers due Sep 19, 2008

Tuesday, February 12, 2008

eWeek - Dealing in Vulnerabilities

eWeek - Dealing in Vulnerabilities explores the case of security vulnerability researchers who simply don't want to fork over their findings and instead tell the software maker to become one of their regular-paying customers.

Monday, February 4, 2008

PC World - How to Protect E-Mail From Prying Eyes

PC World - How to Protect E-Mail From Prying Eyes

Page 2 - Baselines Greatest Hacker Movies of All Time

Page 2 - Baselines Greatest Hacker Movies of All Time

EDiscovery and the end user

With 7.5 billion new MS-Office documents created yearly and (Gartner says) 80% of enterprise documents residing on end-user machines scattered through the enterprise, it’s no surprise that getting a handle on eDiscovery is a major challenge. Src: http://www.nextpage.com/news/releases/pr_102406.htm

Over 99% of all documents created and stored are created and stored electronically and somewhere around 60 billion emails are being created and sent each day according to the IDC. Src: http://www.lexisnexis.com/applieddiscovery/clientResources/practiceTips9.asp

Also look at: http://www.ocparalegal.org/docs/eDiscovery%20Handout.pdf