Notes from the field
Writing
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Browse by tag:
2.2 (2)
2.4 (3)
2.6 (1)
2006 (1)
2007 (1)
802.11b (2)
9-11 (1)
access control (1)
advanced techniques (1)
adversary emulation (1)
aftermath (1)
agobot (1)
aim (1)
airsnort (1)
analysis (5)
annakournikova (1)
anniversary (2)
annual review (3)
apache (7)
apple (1)
architecture (1)
audience (1)
audit (2)
auditing (1)
authentication (2)
automation (1)
awk (1)
back orifice (1)
background (1)
backups (1)
bagle (2)
basics (1)
bcp 38 (1)
bill gates (1)
bind (7)
bind 9 (1)
birthday (5)
blackhat (2)
blaster (1)
bots (2)
browsers (3)
buffer overflow (2)
bugbear (1)
bugtraq (2)
burnout (1)
c (1)
ca (2)
cabir (1)
calibrated (2)
calibration (4)
capabilities (1)
captures (4)
cardsystems (1)
career (4)
case study (1)
category (1)
cert (1)
certificate management (1)
cgi (1)
choicepoint (1)
chroot (1)
cisco (4)
ciso (3)
closed source (1)
code red (4)
code red ii (1)
commercial (3)
common mistakes (1)
community (3)
conference (1)
conferences (8)
configuration (1)
consulting (2)
containment (1)
context (1)
credential theft (3)
cryptography (4)
cybercrime (2)
data (1)
data classification (1)
data-breach (2)
ddos (18)
deception (9)
defence (1)
defence-in-depth (1)
defense in depth (1)
deployment (4)
design (2)
detection engineering (2)
development (1)
directory traversal (1)
disaster recovery (1)
discipline (3)
disclosure (5)
distributed (1)
distributed attacks (2)
diversity (3)
dns (6)
dtk (1)
economics (1)
egress filtering (3)
email (1)
email security (4)
emerging threats (2)
encryption (3)
enterprise (1)
epidemic (1)
espionage (1)
ethics (1)
evaluation (3)
evasion (1)
evolution of ddos (5)
expansion (1)
exploitation (7)
explorezip (1)
exposure (1)
extortion (1)
filtering (1)
fingerprinting (1)
firefox (2)
firewalling (6)
fms (1)
forensics (1)
format strings (1)
fred cohen (1)
freebsd (1)
ftp (1)
funding (1)
gala-coral (1)
gambling (3)
grep (1)
halloween (6)
happy99 (1)
hardening (3)
hashing (1)
honeyd (3)
honeynet (2)
honeynet project (5)
honeypot (19)
honeypots (8)
http (1)
https (1)
icq (1)
iDefense (1)
ids (7)
ids architecture (1)
ie (1)
ie7 (1)
ietf (1)
iis (8)
iloveyou (2)
image (1)
incident (11)
incident readiness (1)
incident response (5)
industry (1)
infrastructure (2)
input validation (1)
instant messaging (1)
intelligence (1)
intermediate (1)
internet architecture (1)
internet-explorer (2)
intrusion detection (2)
ios (3)
ipchains (1)
ipfwadm (1)
iptables (1)
ircbot (3)
isolation (1)
isps (1)
javascript (1)
john the ripper (1)
jpeg (1)
kernel (5)
kernel tuning (1)
key management (1)
klez (2)
lance spitzner (2)
leadership (2)
learning (4)
least privilege (4)
legacy systems (2)
linux (8)
linux capabilities (1)
linux kernel (11)
lion (1)
log analysis (7)
logging (4)
long tail (1)
loveletter (1)
macos (1)
macro viruses (1)
mafiaboy (2)
mail (2)
mail security (2)
mailing lists (1)
malware (18)
marty roesch (1)
mass mailer (1)
mass mailing (3)
melissa (2)
meta (6)
methodology (1)
microsoft (23)
midyear (6)
migration (1)
mobile (1)
mocbot (1)
mod_ssl (1)
modelling (1)
modules (1)
monitor mode (1)
monitoring (2)
monoculture (3)
mozilla (1)
mrtg (1)
ms06-001 (1)
ms06-040 (1)
multi-platform (1)
multivector (1)
mydoom (3)
myspace (1)
mytob (1)
nda (1)
netbios (1)
netfilter (4)
netsky (2)
network analysis (1)
network discovery (1)
networking (2)
nimda (3)
nmap (3)
non-technical (2)
notebook (2)
nxt vulnerability (1)
ongoing (1)
openbsd (1)
openssh (4)
openssl (4)
operating systems (5)
operational (2)
operational policy (1)
operational security (3)
operations (27)
outlook (3)
p2p (2)
packets (1)
password security (1)
patching (8)
path traversal (1)
patterns (6)
payment-card (1)
pci (1)
penetration testing (2)
perl (3)
personal (40)
pgp (1)
philosophy (4)
phishing (6)
phrack (8)
pix (1)
platform diversity (1)
pnp (1)
policy (5)
post-compromise (1)
post-mortem (3)
predictions (11)
preparation (1)
preprocessor (1)
preprocessors (1)
primer (2)
privacy (1)
privilege separation (1)
procmail (1)
production (3)
propagation (1)
protocols (1)
qaz (1)
quiet (1)
ramen (1)
rate limiting (1)
reading (14)
reconnaissance (2)
red teaming (1)
redhat (1)
reflection (14)
regulation (2)
relay (1)
release (3)
remediation (1)
remote access (2)
remote control (1)
research (12)
response (1)
retrospective (3)
review (6)
rootkit (1)
rpc (2)
rule writing (2)
russinovich (1)
sasser (1)
sb1386 (1)
scale (1)
scanning (2)
sebek (3)
secure by default (1)
security (6)
sendmail (1)
signatures (1)
sircam (1)
slackware (8)
slapper (2)
small business (2)
smb (1)
smtp (2)
snmp (1)
snort (9)
sober (1)
sobig (1)
social engineering (3)
sony (1)
source code (5)
spam (5)
speaking (1)
spf (1)
sql slammer (2)
ssh (1)
ssh-2 (1)
ssl (5)
stacheldraht (1)
story (1)
stress (1)
structural (19)
structured logs (2)
sub7 (1)
summary (4)
sustainability (1)
symbian (1)
syn cookies (1)
sysinternals (1)
system administration (3)
tcp (2)
tcp wrappers (1)
tcp/ip (1)
tcpdump (2)
telecommunications (1)
telnet (1)
tfn (1)
threat evolution (1)
tiger (1)
tippingpoint (1)
tls (3)
toolkits (1)
tools (2)
trajectory (2)
transition (2)
trends (1)
trinoo (2)
trojan (1)
trojans (1)
trust (1)
trustworthy computing (10)
udp (1)
uk infosec (1)
unicode (1)
unix (3)
usability (1)
vbs (1)
vbscript (1)
vista (2)
vml (1)
vulnerabilities (10)
vulnerability (8)
vulnerability assessment (1)
vulnerability classes (1)
war stories (3)
web (3)
web security (5)
web server (1)
welchia (1)
wep (3)
windows (8)
windows xp (1)
wireless (3)
witty (1)
wmf (2)
worm (13)
worm impact (1)
worm war (1)
worms (11)
writing (1)
wu-ftpd (1)
xpsp2 (2)
xss (1)
y2k (5)
yahoo (1)
year ahead (5)
year end (7)
year in review (10)
zero-day (2)
zotob (1)
No posts published yet.