Quantcast
Channel: Tevora Blog » Jason Pittman
Browsing latest articles
Browse All 10 View Live

A Better Mouse Trap?

So, I’ve been thinking quite a bit about PCI and what it means. Here are a few things I’m willing to put forth as statements. Of course, I have a few unanswered questions too and I’ll put them out as...

View Article



Politics will not Save Us

Politicians have a vested interest in the security of our personal information. With compromises and data leakage on the rise, there is surely plenty to be astir over. We have even seen states begin...

View Article

Find, the Power

I was doing some work on a very large log correlation server recently. By large I mean copious amounts of log files, not necessarily large in size. Essentially, the chief task was that I needed to...

View Article

The Curious Case of 1392

There are occasions in technology where events or results inspire feelings of mystery. Those, “it must be magic” moments when our existing body of knowledge is incapable of processing the situation. I...

View Article

Lions, Tigers, and…IP Addresses

For anyone who remembers their zoology, or has watched enough Animal Channel or National Geographic, the concept of large animal herds escaping predators by concentrating in tight groups should not be...

View Article


Privacy as a concept – Controlling information

Privacy, my fellow digital citizens, is a hydra of a beast. Many heads and many faces for sure, all of which enjoy a bevy of threats. Digital Footprints The notion that we leave digital footprints all...

View Article

Resuscitating John the Ripper for SHA-512

John the Ripper (http://www.openwall.com/john) is a well-known and mature password auditing tool. However, if you are working from a recent OS (e.g., Ubuntu 9.04 or later) that uses SHA-512 hashing...

View Article

Leveling Up as a Security Professional

I read a great blog post by Jason Rudolph the other day. The post made me think about all of the people I have encountered over the years that were interested in the information security profession but...

View Article


Privacy as a concept- Confidentiality threats

As we discussed previously, privacy is a relative affair.  However, despite the possible differences between what you and I consider private, we can logically group privacy threats into a few...

View Article


Privacy as a concept- Integrity threats

In the last part of our privacy series, we discussed threats to privacy from a confidentiality perspective. For this part of the series, let’s look at the oft-overlooked privacy threats related to...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images