General discussion

Locked

Adventures in Security

By tolzak ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Security Risk Management

by tolzak In reply to Adventures in Security

Risk management is an important part of securing today’s information assets.? Security has moved from the fringes of technology to take its place alongside other critical business activities.? And like other business activities, the resources expended on?the people, processes, and technology necessary to protect an organization’s information infrastructure must be justified in terms of return [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=39">This post originally appeared on an external website</a></div>

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Related Discussions

Related Forums