Skip to content
/dev/random

/dev/random

"If the enemy leaves a door open, you must rush in." – Sun Tzu

  • About Me
    • About Me
    • Online Presentations
    • PGP Public Key
  • Disclaimer
  • Tools
    • alerts2afterglow
    • hoover
    • inotes.py
    • known_hosts_bruteforcer
    • pastemon
    • oplb
    • ossec_dashboard
    • ossec2dshield
    • twittermon
    • rrhunter
    • syslog2loggly

Tag: Review

Book Review: Penetration Testing – A Hands-On Introduction to Hacking

July 30, 2014 Book Review, Pentesting, Security 2 comments

A few weeks ago I bought Georgia Weidman’s book about penetration testing: “A Hands-On Introduction to Hacking“. Being overloaded by many projects, I finally finished reading it and it’s now time to write a quick review. Georgia is an awesome person. There are not many recognized women in the information security

Continue reading »

Book Review: Cuckoo Malware Analysis

March 3, 2014 Book Review, Cuckoo, Malware, Security, Software 5 comments

I’m a Cuckoo user for a long time therefore it was a good opportunity to read the book “Cuckoo Malware Analysis” and write a quick review (The book is published by Packt Publishing). For the readers who don’t know what Cuckoo is, here is a brief introduction… Malwares are a

Continue reading »

Review: Mobile Security: How to Secure, Privatize and Recover Your Devices

December 20, 2013 Security One comment

I received a copy of a new book published by Packt publishing about mobile security. As mobile devices are more and more targeted by attackers, it was a good idea to publish a book on this hot topic. Written by a group of people working for IBM, the book covers

Continue reading »

Review: Instant OSSEC Host-Based Intrusion Detection System

August 25, 2013 Logs Management / SIEM, Security 9 comments

The guys from Packt Publishing asked me to review a new book from their “Instant” collection: “OSSEC Host-Based Intrusion Detection“. This collection proposes books with less than 100 pages about multiple topics. The goal is to go straight forward to the topic. OSSEC being one of my favorite application, I

Continue reading »

Top-10 Blog Posts for 2011

December 28, 2011 Uncategorized Leave a comment

That’s the Christmas break for most of us! Let’s spend some good times with friends and family. That’s also the period when people like to ask to their crystal ball or their favorite mascot what will happen in the coming months. This is not an exercise for me. I don’t

Continue reading »

Review: BT4: Assuring Security by Penetration Testing

June 1, 2011 Security, Software 2 comments

If you are working in the “information security” field, you must know the BackTrack distribution (otherwise you must be an alien coming from a far away planet!). If you search for the word “backtrack” on Amazon, you will find lot of references but only one book is fully dedicated to

Continue reading »

Book Review: IT Inventory and Resource Management With OCS Inventory NG 1.02

September 10, 2010 OS, Software Leave a comment

During my holidays, I finally took the time to finish to read the book “IT Inventory and Resources Management with OCS Inventory NV 1.02” which covers the application with the same name. Even if the inventory of devices connected to a network is primarily a system administration task, it has

Continue reading »

Book Review: Cacti 0.8 Network Monitoring

January 5, 2010 Software Leave a comment

A few weeks ago, I received a copy of Cacti 0.8 Network Monitoring from Packt Publishing. Here is my review. The book has been written by Dinangkur Kundu and S.M. Ibrahim Lavlu, who have both strong open-source softwares knowledge. Their book covers Cacti, a well-known framework (running on top of

Continue reading »

Upcoming Events

Here is a list of events that I will attend and cover via Twitter and wrap-ups. Ping me if you want to meet! The list is regularly updated.

SANS Munich 2023

Recent Articles

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?

Time Machine

Recent Tweets

  • Error: Could not authenticate you.

RSS NVD Vulnerabilities Feed

Copyright Xavier Mertens © 2003-2023 | Powered by Xameco.
This website uses cookies to improve your experience. By using our services, you agree to our use of cookies. Accept Learn more
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT