Monday, August 10, 2009

BOOK REVIEW: Chained Exploits

I recently read Chained Exploits - Advanced Hacking Attacks from Start to Finish, which is available on HERE.

I really liked the approach taken by the authors to keep the reader interested. Reading about security can be boring for some, but I found the book very interesting in the format the authors chose: Write a series of stories by using a fictional character.

I think any Internet user could read this book, and even any executives interested in trying to understand why security in an organization is so important, would benefit from reading this book.

It helps bring to light, with one of the stories, how web 2.0 technologies (like MySpace and Facebook) can be compromised.

It does use quite a bit of social engineering tricks, and I think that's very important, because people can be a weak link in any organization. Security awareness within any organization is becoming more and more important.

I also learned about new hacking tools. The examples used existing tools that can be downloaded from the Internet.

Book rating: 5/5.

Wednesday, August 5, 2009

Windows PowerShell Virtual User Group #10--VIDEO

Here's the video from my virtual user group meeting held in May:

The timing goes like this (format is MM:SS or HH:MM:SS):
-Intro (Marco) 0:00-3:45
-Glenn 3:55-37:05
-Sergei 37:15-1:17:40
-Bart 1:18:05-1:51:45
-Closing (Marco) 1:51:50-1:54:00

For the details on each speaker's topic, see HERE.