MENU
last data update: 2011/10/15, 12:42
Website loading time
during the test: 1.98 s
cable connection (average): 2.35 s
DSL connection (average): 2.72 s
modem (average): 22.3 s
HTTP headers
HTTP/1.0 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Sat, 15 Oct 2011 19:42:37 GMT
Date: Sat, 15 Oct 2011 19:42:37 GMT
Cache-Control: private, max-age=0
Last-Modified: Sat, 15 Oct 2011 18:13:45 GMT
ETag: "6ebf3fc4-cd58-494d-91d2-bb0e7a3873a8"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Information about DNS servers
taosecurity.blogspot.com | CNAME | blogspot.l.google.com | IN | 3600 |
Received from the first DNS server
Request to the server "taosecurity.blogspot.com"
Received 42 bytes from address 213.251.188.129#53 in 106 ms
Request to the server "taosecurity.blogspot.com"
You used the following DNS server:
DNS Name: dns10.ovh.net
DNS Server Address: 213.251.188.129#53
DNS server aliases:
Host taosecurity.blogspot.com not found: 5(REFUSED)
Received 42 bytes from address 213.251.188.129#53 in 103 ms
Received from the second DNS server
Request to the server "taosecurity.blogspot.com"
Received 42 bytes from address 213.251.128.129#53 in 107 ms
Request to the server "taosecurity.blogspot.com"
You used the following DNS server:
DNS Name: ns10.ovh.net
DNS Server Address: 213.251.128.129#53
DNS server aliases:
Host taosecurity.blogspot.com not found: 5(REFUSED)
Received 42 bytes from address 213.251.128.129#53 in 110 ms
Subdomains (the first 50)
Typos (misspells)
raosecurity.blogspot.com faosecurity.blogspot.com gaosecurity.blogspot.com yaosecurity.blogspot.com 6aosecurity.blogspot.com 5aosecurity.blogspot.com tzosecurity.blogspot.com tsosecurity.blogspot.com twosecurity.blogspot.com tqosecurity.blogspot.com taisecurity.blogspot.com taksecurity.blogspot.com talsecurity.blogspot.com tapsecurity.blogspot.com ta0security.blogspot.com ta9security.blogspot.com taoaecurity.blogspot.com taozecurity.blogspot.com taoxecurity.blogspot.com taodecurity.blogspot.com taoeecurity.blogspot.com taowecurity.blogspot.com taoswcurity.blogspot.com taosscurity.blogspot.com taosdcurity.blogspot.com taosrcurity.blogspot.com taos4curity.blogspot.com taos3curity.blogspot.com taosexurity.blogspot.com taosevurity.blogspot.com taosefurity.blogspot.com taosedurity.blogspot.com | taosecyrity.blogspot.com taosechrity.blogspot.com taosecjrity.blogspot.com taosecirity.blogspot.com taosec8rity.blogspot.com taosec7rity.blogspot.com taosecueity.blogspot.com taosecudity.blogspot.com taosecufity.blogspot.com taosecutity.blogspot.com taosecu5ity.blogspot.com taosecu4ity.blogspot.com taosecuruty.blogspot.com taosecurjty.blogspot.com taosecurkty.blogspot.com taosecuroty.blogspot.com taosecur9ty.blogspot.com taosecur8ty.blogspot.com taosecuriry.blogspot.com taosecurify.blogspot.com taosecurigy.blogspot.com taosecuriyy.blogspot.com taosecuri6y.blogspot.com taosecuri5y.blogspot.com taosecuritt.blogspot.com taosecuritg.blogspot.com taosecurith.blogspot.com taosecuritu.blogspot.com taosecurit7.blogspot.com taosecurit6.blogspot.com aosecurity.blogspot.com tosecurity.blogspot.com | tasecurity.blogspot.com taoecurity.blogspot.com taoscurity.blogspot.com taoseurity.blogspot.com taosecrity.blogspot.com taosecuity.blogspot.com taosecurty.blogspot.com taosecuriy.blogspot.com taosecurit.blogspot.com atosecurity.blogspot.com toasecurity.blogspot.com tasoecurity.blogspot.com taoescurity.blogspot.com taosceurity.blogspot.com taoseucrity.blogspot.com taosecruity.blogspot.com taosecuirty.blogspot.com taosecurtiy.blogspot.com taosecuriyt.blogspot.com ttaosecurity.blogspot.com taaosecurity.blogspot.com taoosecurity.blogspot.com taossecurity.blogspot.com taoseecurity.blogspot.com taoseccurity.blogspot.com taosecuurity.blogspot.com taosecurrity.blogspot.com taosecuriity.blogspot.com taosecuritty.blogspot.com taosecurityy.blogspot.com |
Location
IP: 209.85.175.132
continent: NA, country: United States (USA), city: Mountain View
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 142.23 KB
text per all code ratio: 20 %
title: TaoSecurity
description:
keywords:
encoding: UTF-8
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
the | 142 |
of | 93 |
and | 76 |
to | 74 |
is | 38 |
in | 36 |
that | 32 |
by | 31 |
at | 28 |
on | 26 |
for | 22 |
with | 22 |
this | 21 |
an | 18 |
Richard | 17 |
Bejtlich | 16 |
as | 16 |
Posted | 14 |
comments | 14 |
you | 14 |
Chinese | 14 |
be | 13 |
from | 12 |
my | 12 |
are | 12 |
China | 12 |
not | 11 |
security | 11 |
was | 11 |
Security | 10 |
or | 10 |
Labels: | 9 |
government | 9 |
read | 9 |
his | 9 |
will | 9 |
The | 9 |
they | 9 |
2011 | 9 |
have | 8 |
can | 8 |
This | 8 |
how | 8 |
like | 8 |
about | 8 |
show | 7 |
all | 7 |
it | 7 |
Tony | 7 |
threat | 6 |
more | 6 |
Rep | 6 |
if | 6 |
information | 6 |
its | 6 |
me | 5 |
china | 5 |
one | 5 |
open | 5 |
which | 5 |
only | 5 |
House | 5 |
because | 5 |
HPSCI | 5 |
study | 5 |
has | 5 |
other | 5 |
attention | 5 |
Art | 5 |
Rogers | 5 |
software | 5 |
intelligence | 5 |
organization | 5 |
Software | 5 |
espionage | 5 |
October | 5 |
had | 4 |
book | 4 |
know | 4 |
what | 4 |
into | 4 |
two | 4 |
video | 4 |
Russia | 4 |
he | 4 |
hearing | 4 |
but | 4 |
also | 4 |
engine | 4 |
cyber | 4 |
Incident | 4 |
much | 4 |
However, | 4 |
US | 4 |
Team | 4 |
Response | 4 |
these | 4 |
want | 4 |
survey | 4 |
than | 4 |
think | 4 |
TAOSSA | 4 |
If | 4 |
would | 4 |
so | 4 |
complete | 4 |
may | 4 |
authors | 4 |
Computer | 4 |
identifying | 4 |
such | 4 |
2003 | 3 |
been | 3 |
state | 3 |
trying | 3 |
results | 3 |
their | 3 |
likely | 3 |
-- | 3 |
took | 3 |
TAOSST | 3 |
aircraft | 3 |
learn | 3 |
Russian | 3 |
impressions | 3 |
posted | 3 |
statement | 3 |
who | 3 |
One | 3 |
different | 3 |
"threat | 3 |
see | 3 |
points | 3 |
our | 3 |
working | 3 |
fix | 3 |
Rogers' | 3 |
story | 3 |
Organizational | 3 |
System | 3 |
Control | 3 |
Jeff | 3 |
Networks | 3 |
CSIRT | 3 |
industrial | 3 |
five | 3 |
Survey, | 3 |
people | 3 |
Robust | 3 |
Christopher | 3 |
problems | 3 |
last | 3 |
Digital | 3 |
States | 3 |
operations | 3 |
aspect | 3 |
intellectual | 3 |
including | 3 |
United | 3 |
when | 3 |
point | 3 |
conducting | 3 |
new | 3 |
another | 3 |
pointed | 3 |
Hearing | 3 |
work. | 3 |
Cybersecurity | 3 |
should | 3 |
Task | 3 |
Force | 3 |
Posts | 3 |
I'm | 3 |
what's | 3 |
really | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
of the | 21 |
Richard Bejtlich | 15 |
by Richard | 14 |
Posted by | 13 |
Bejtlich at | 13 |
on the | 10 |
comments Labels: | 9 |
that the | 7 |
and the | 6 |
of Software | 5 |
Software Security | 5 |
The Art | 5 |
Art of | 5 |
in the | 5 |
to be | 4 |
an open | 4 |
the US | 4 |
for his | 4 |
to the | 4 |
want to | 4 |
Incident Response | 4 |
the Chinese | 4 |
Labels: china | 4 |
for the | 4 |
with the | 4 |
how to | 4 |
from the | 4 |
If you | 3 |
government and | 3 |
Control System | 3 |
Robust Control | 3 |
the threat | 3 |
to China | 3 |
is that | 3 |
an organization | 3 |
the United | 3 |
United States | 3 |
System Networks | 3 |
One of | 3 |
in an | 3 |
if they | 3 |
of TAOSSA | 3 |
of my | 3 |
to this | 3 |
Organizational Survey, | 3 |
Team Organizational | 3 |
Computer Incident | 3 |
is the | 3 |
the authors | 3 |
took The | 3 |
Rep Rogers' | 3 |
to fix | 3 |
trying to | 3 |
you can | 3 |
Response Team | 3 |
by the | 3 |
security and | 3 |
Task Force | 3 |
three word phrases repeated minimum three times
Phrase | Quantity |
---|---|
by Richard Bejtlich | 14 |
Richard Bejtlich at | 13 |
Posted by Richard | 13 |
of Software Security | 5 |
Art of Software | 5 |
The Art of | 5 |
comments Labels: china | 4 |
Response Team Organizational | 3 |
Incident Response Team | 3 |
Team Organizational Survey, | 3 |
Robust Control System | 3 |
took The Art | 3 |
Computer Incident Response | 3 |
the United States | 3 |
Control System Networks | 3 |
B tags
This is not a political blog, so I'm not here to endorse candidates. However, I do want to point out another example of high-level policymakers discussing ongoing activities by China against the US and other developed economies.First, the Washington Post published an editorial by Mitt Romney which included the following:China seeks advantage through systematic exploitation of other economies. It misappropriates intellectual property by coercing “technology transfers” as a condition of market access; enables theft of intellectual property, including patents, designs and know-how; hacks into foreign commercial and government computers
The result is that China sells high-quality products to the United States at low prices. But too often the source of that high quality is American innovations stolen by Chinese companies.
I missed this in August, but former ambassador to China Jon Huntsman said the following during a debate:Huntsman Jr. pointed to China as a culprit in what he described as “the new war field” — cyber-intrusion as a way to steal corporate and government secrets.
It’s gone beyond the pale
Tony notes that the escalation in threat activity during the last few years is real. He is in a position to know, given he has worked at NSA since the 1970s. Tony says the threat activity is getting people's attention now, especially at more senior levels of the government and industry. Now targeted organizations are thinking beyond the question "does this affect my company" to "does this affect my industry?"Tony explains that a generational effect may account for the change in awareness. More senior leaders grew up with technology, so they know how to think about it. There is also more public reporting on serious security incidents today.My favorite quote was:"If you're not a little concerned, you haven't been paying attention."
[T]his is the most powerful secret service
"The history of China’s espionage activities on Russian armaments is not only limited to one precedent or one type of weapons. One of the top Chinese priorities is to produce complete replicas of Russia’s best machines and weapons
This is a truly purpose-oriented strategy of a large country - snatch anything you can and reproduce it domestically
First, I was impressed by the attitudes of all those involved with HPSCI, from the staffers to the Representatives themselves. They were all courteous and wanted to hear the opinions of Kevin and the other two witnesses (Art Coviello from RSA and Michael Hayden from the Chertoff Group), whether before, during, or after the hearing.Second, I thought Reps Mike Rogers (R-MI, HPSCI Chairman) and C.A. Dutch Ruppersberger (D-MD, HPSCI Ranking Member) offered compelling opening statements. Rep Rogers squarely pointed the finger at our overseas adversaries. As reported by PCWorld in U.S. Lawmakers Point to China as Cause of Cyberattacks, Rep Rogers said:"I don't believe that there is a precedent in history for such a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property...China's economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy."You can watch all of Rep Rogers' statement on YouTube as Rep. Mike Rogers criticizes Chinese economic cyber-espionage (currently 21 views -- let's increase that!)General Hayden reinforced Rep Rogers' sentiment with this quote:"As a professional intelligence officer, I step back in awe of the breadth, the depth, the sophistication, the persistence of the Chinese espionage effort against the United States of America."Third, I was very pleased that this hearing was conducted in an open forum, and not behind closed doors. While I haven't found the whole hearing online or on TV yet (aside from Rep Rogers' statement and that of Rep Myrick (R-NC)), I encourage as much discussion as possible about this issue. One of General Hayden's points was that we are not having a debate about how to address digital threats because no one agrees what the facts are.
U tags
I tags
(Photo: Business Insider)This is not a political blog, so I'm not here to endorse candidates. However, I do want to point out another example of high-level policymakers discussing ongoing activities by China against the US and other developed economies.First, the Washington Post published an editorial by Mitt Romney which included the following:China seeks advantage through systematic exploitation of other economies. It misappropriates intellectual property by coercing “technology transfers” as a condition of market access; enables theft of intellectual property, including patents, designs and know-how; hacks into foreign commercial and government computers...The result is that China sells high-quality products to the United States at low prices. But too often the source of that high quality is American innovations stolen by Chinese companies.
Huntsman Jr. pointed to China as a culprit in what he described as “the new war field” — cyber-intrusion as a way to steal corporate and government secrets. “Not only have government institutions been hacked into, but private individuals have been hacked, too. It’s gone beyond the pale,” Huntsman said.
Today at MIRCon I mentioned that one of my colleagues, Jeff Yeutter, had updated the somewhat famous CERT/CC study of CIRT characteristics as part of his degree program. Jeff posted the survey online as Computer Incident Response Team Organizational Survey, 2011 with this description:In 2003, the CERT CSIRT Development Team (www.CERT.org) released a study on the state of international computer security incident response teams with the goal of providing "better insight into various CSIRT organizational structures and best practices" for new and existing members of the CSIRT community (Killcrece, Kossakowski, Ruefle, & Zajicek, 2003). The attached survey, a modified form of the original, will be used to update the 2003 study with a greater focus on the methods of organization used by American and international CIRTs, the tools that they employ, and how these vary across organizations of different sizes and industries.This research is being conducted, and is independently funded, by Jeff Yeutter, Technical Sales Executive at Mandiant, as the final project for his Master's in Information Systems with a concentration in Computer Security Management at Strayer University. This survey will also be distributed to members of the Forum of Incident Response and Security Teams (www.FIRST.org) with the assistance of Richard Bejtlich, Chief Security Officer and VP, MCIRT, at Mandiant.No identifying information is required to complete this survey. Participants may include such information if they are interested in immediately being notified of the results of the study once it is complete, or if they would like to make themselves available for follow-up questions. Any and all identifying personal or professional identifying information offered by participants will be held in strict confidence. The results of this study, minus any identifying information, may be included in a future, cost-free whitepaper.The original CERT study from 2003 can be found at: www.cert.org/archive/pdf/03tr001.pdfThe time to complete this survey is approximately 10-15 minutes.
Tony Sager from the NSA is one of my Three Wise Men. (Dan Geer and Ross Anderson are the other two.) Eric Parizo from SearchSecurity.com interviewed Tony this week and posted the video online. Tony notes that the escalation in threat activity during the last few years is real. He is in a position to know, given he has worked at NSA since the 1970s. Tony says the threat activity is getting people's attention now, especially at more senior levels of the government and industry. Now targeted organizations are thinking beyond the question "does this affect my company" to "does this affect my industry?"Tony explains that a generational effect may account for the change in awareness. More senior leaders grew up with technology, so they know how to think about it. There is also more public reporting on serious security incidents today.My favorite quote was:"If you're not a little concerned, you haven't been paying attention."
Thanks to a source who wishes to remain anonymous, I read Chinese spy mania sweeps the world, an article not from a Western publication. Rather, it's from Voice of Russia. Does any of this sound familiar?[T]his is the most powerful secret service based on the principle of attracting all ethnic Chinese, wherever they may live. An adherent of the “total espionage” strategy, Beijing even encourages emigration in the hope that its citizens will remain loyal to and useful for their historical homeland after moving to another country..."The history of China’s espionage activities on Russian armaments is not only limited to one precedent or one type of weapons. One of the top Chinese priorities is to produce complete replicas of Russia’s best machines and weapons, from the Sukhoi Su-33 fighter jet to missiles, aircraft carriers and so on. This is a truly purpose-oriented strategy of a large country - snatch anything you can and reproduce it domestically," ["IT expert"] Andrei Masalovich points out.
Russia's secretive spy agency, the Federal Security Service (FSB), issued a rare statement Wednesday claiming the state had arrested a Chinese citizen who, posing as a translator for official delegations, was working under the direction of the Chinese government in an attempt to buy state secrets from Russians about Russia's S-300 missile system.
(Photo credit: AINOnline)I just read Big New Chinese Order for Russian Fighter Engines at China Defense Blog, which quoted AINOnline:China has placed additional orders for Russian AL-31-series fighter engines. State arms trade agency Rosoboronexport clinched two big contracts earlier this year...To serve them, Salut has established partnerships with Limin Corp. and Tyan Li company in Chengdu on deliveries and manufacturing of spare parts for both the AL-31F and the AL-31FN. Russia has also agreed to provide all necessary maintenance and repair documentation to the Chinese partners.
The House Cybersecurity Task Force released its report (.pdf) today. NextGov offers a good summary in their story House GOP Cyber Task Force Touts Industry Leadership by Jessica Herrera-Flanigan.The report includes the following recommendation:Companies, including Internet Service Providers (ISPs) and security and software vendors, are already conducting active operations to mitigate cybersecurity attacks. However, these are largely done independently according to their individual business interests and priorities. Congress should facilitate an organization outside of government to act as a clearing house of information and intelligence sharing between the government and critical infrastructure to improve security and disseminate real-time information designed to help target and defeat malicious cyber activity.
Today I was fortunate to attend a hearing of the US House Permanent Select Committee on Intelligence (HPSCI). That's me on the far left of the photo, seated behind our MANDIANT CEO Kevin Mandia. I'd like to share a few thoughts on the experience.First, I was impressed by the attitudes of all those involved with HPSCI, from the staffers to the Representatives themselves. They were all courteous and wanted to hear the opinions of Kevin and the other two witnesses (Art Coviello from RSA and Michael Hayden from the Chertoff Group), whether before, during, or after the hearing.Second, I thought Reps Mike Rogers (R-MI, HPSCI Chairman) and C.A. Dutch Ruppersberger (D-MD, HPSCI Ranking Member) offered compelling opening statements. Rep Rogers squarely pointed the finger at our overseas adversaries. As reported by PCWorld in U.S. Lawmakers Point to China as Cause of Cyberattacks, Rep Rogers said:"I don't believe that there is a precedent in history for such a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property...China's economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy."
"As a professional intelligence officer, I step back in awe of the breadth, the depth, the sophistication, the persistence of the Chinese espionage effort against the United States of America."
Amazon.com just posted my five star review of Robust Control System Networks by Ralph Langner. From the review:I am not an industrial control systems expert, but I have plenty of experience with IT security. I read Robust Control System Networks (RCSN) to learn how an ICS expert like Ralph Langner think about security in his arena. I was not disappointed, and you won't be if you keep an open mind and remember IT security folks aren't the target audience. After reading RCSN I have a greater appreciation for the problems affecting the ICS world and how that community should address the fragility of its environment.
images
file name | alternative text |
---|---|
huntsman-perry-romney.jpg | |
icon18_email.gif | Blogging Since 8 Jan 2003 |
icon18_edit_allbkg.gif | My Photo |
bejtlich-ft3.jpg | twitter.com/taosecurity |
cirt-survey.jpg | TCP/IP Weapons School 3.0 |
sager.jpg | Books by Richard Bejtlich |
images.jpeg | Association of Former Information Warriors |
AL-31FNmod.jpg | Digital Forensics Magazine |
J-20%2B6.1.11%2B-%2Bexaust%2Bcomparison2.jpg | |
house-rep-report.jpg | |
mandia-cspan.jpg | |
hpsci_04oct11a.jpg | |
hpsci-2.jpg | |
defensenews_tigertrap.jpg | |
9781606503003.jpg | |
410MbA2t-9L._AA200.jpg | |
21DdRqjCwUL._AA200.jpg | |
taosecurity.jpg | |
icon18_wrench_allbkg.png | |
bejtlich_dcbsdcon2009_crop.jpg | |
twitter.png | |
bhad11.jpg | |
books_side.png | |
aofiw_large.png | |
dfheader.png | |
logo_bsd.png |
headers
H1
H2
Thursday, October 13, 2011
Tuesday, October 11, 2011
Friday, October 07, 2011
Thursday, October 06, 2011
Tuesday, October 04, 2011
Wednesday, September 28, 2011
Sunday, September 25, 2011
Blogging Since 8 Jan 2003
About Me
twitter.com/taosecurity
TCP/IP Weapons School 3.0
Books by Richard Bejtlich
Association of Former Information Warriors
Digital Forensics Magazine
BSD Magazine
Blog Archive
Labels
H3
Thursday, October 13, 2011
Tuesday, October 11, 2011
Friday, October 07, 2011
Thursday, October 06, 2011
Tuesday, October 04, 2011
Wednesday, September 28, 2011
Sunday, September 25, 2011
Blogging Since 8 Jan 2003
About Me
twitter.com/taosecurity
TCP/IP Weapons School 3.0
Books by Richard Bejtlich
Association of Former Information Warriors
Digital Forensics Magazine
BSD Magazine
Blog Archive
Labels
H4
H5
H6
internal links
address | anchor text |
---|---|
#main | skip to main |
#sidebar | skip to sidebar |
http://taosecurity.blogspot.com/2011/10/republican-presidential-candidates-on.html | Republican Presidential Candidates on China |
http://taosecurity.blogspot.com/2011/10/republican-presidential-candidates-on.html | 21:38 |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/2011/10/bejtlich-in-expanding-cyber-industrial.html | Bejtlich in "The expanding cyber industrial complex" |
http://taosecurity.blogspot.com/2011/10/bejtlich-in-expanding-cyber-industrial.html | 22:49 |
http://taosecurity.blogspot.com/2011/10/computer-incident-response-team.html | Computer Incident Response Team Organizational Survey, 2011 |
http://taosecurity.blogspot.com/2011/10/computer-incident-response-team.html | 22:38 |
http://taosecurity.blogspot.com/2011/10/interview-with-one-of-my-three-wise-men.html | Interview with One of My Three Wise Men |
http://taosecurity.blogspot.com/2011/10/interview-with-one-of-my-three-wise-men.html | 23:36 |
http://taosecurity.blogspot.com/search/label/apt | apt |
http://taosecurity.blogspot.com/search/label/wisdom | wisdom |
http://taosecurity.blogspot.com/2011/10/russia-v-china-sound-familiar.html | Russia v China -- Sound Familiar? |
http://taosecurity.blogspot.com/2011/10/russia-v-china-sound-familiar.html | 07:27 |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/2011/10/its-all-about-engines.html | It's All About the Engines |
http://taosecurity.blogspot.com/2011/10/its-all-about-engines.html | 22:49 |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/2011/10/house-cybersecurity-task-force-report.html | House Cybersecurity Task Force Report Released |
http://taosecurity.blogspot.com/2006/08/national-digital-security-board.html | National Digital Security Board |
http://taosecurity.blogspot.com/2011/10/house-cybersecurity-task-force-report.html | 10:24 |
http://taosecurity.blogspot.com/2011/10/c-span-posts-video-of-tuesday-hearing.html | C-SPAN Posts Video of Tuesday Hearing |
http://taosecurity.blogspot.com/2011/10/c-span-posts-video-of-tuesday-hearing.html | 09:41 |
http://taosecurity.blogspot.com/search/label/apt | apt |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/2011/10/inside-congressional-hearing-on-digital.html | Inside a Congressional Hearing on Digital Threats |
http://taosecurity.blogspot.com/2011/10/inside-congressional-hearing-on-digital.html | 20:51 |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/search/label/threats | threats |
http://taosecurity.blogspot.com/2011/09/chinese-espionage-in-five-minutes.html | Chinese Espionage in Five Minutes |
http://taosecurity.blogspot.com/2011/09/impressions-tiger-trap.html | Tiger Trap |
http://taosecurity.blogspot.com/2011/09/chinese-espionage-in-five-minutes.html | 23:47 |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/2011/09/review-of-robust-control-system.html | Review of Robust Control System Networks Posted |
http://taosecurity.blogspot.com/2011/09/review-of-robust-control-system.html | 22:11 |
http://taosecurity.blogspot.com/search/label/reviews | reviews |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security_25.html | Impressions: The Art of Software Security Testing |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security.html | The Art of Software Security Assessment |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security_25.html | 20:46 |
http://taosecurity.blogspot.com/search/label/impressions | impressions |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security.html | Impressions: The Art of Software Security Assessment |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security.html | 20:33 |
http://taosecurity.blogspot.com/search?updated-max=2011-09-25T20%3A33%3A00-04%3A00 | Older Posts |
http://taosecurity.blogspot.com/ | Home |
http://taosecurity.blogspot.com/feeds/posts/default | Posts (Atom) |
http://taosecurity.blogspot.com/search?updated-min=2011-01-01T00%3A00%3A00-05%3A00&updated-max=2012-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2011 |
http://taosecurity.blogspot.com/2011_10_01_archive.html | October |
http://taosecurity.blogspot.com/2011/10/republican-presidential-candidates-on.html | Republican Presidential Candidates on China |
http://taosecurity.blogspot.com/2011/10/bejtlich-in-expanding-cyber-industrial.html | Bejtlich in "The expanding cyber industrial comple... |
http://taosecurity.blogspot.com/2011/10/computer-incident-response-team.html | Computer Incident Response Team Organizational Sur... |
http://taosecurity.blogspot.com/2011/10/interview-with-one-of-my-three-wise-men.html | Interview with One of My Three Wise Men |
http://taosecurity.blogspot.com/2011/10/russia-v-china-sound-familiar.html | Russia v China -- Sound Familiar? |
http://taosecurity.blogspot.com/2011/10/its-all-about-engines.html | It's All About the Engines |
http://taosecurity.blogspot.com/2011/10/house-cybersecurity-task-force-report.html | House Cybersecurity Task Force Report Released |
http://taosecurity.blogspot.com/2011/10/c-span-posts-video-of-tuesday-hearing.html | C-SPAN Posts Video of Tuesday Hearing |
http://taosecurity.blogspot.com/2011/10/inside-congressional-hearing-on-digital.html | Inside a Congressional Hearing on Digital Threats |
http://taosecurity.blogspot.com/2011_09_01_archive.html | September |
http://taosecurity.blogspot.com/2011/09/chinese-espionage-in-five-minutes.html | Chinese Espionage in Five Minutes |
http://taosecurity.blogspot.com/2011/09/review-of-robust-control-system.html | Review of Robust Control System Networks Posted |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security_25.html | Impressions: The Art of Software Security Testing |
http://taosecurity.blogspot.com/2011/09/impressions-art-of-software-security.html | Impressions: The Art of Software Security Assessme... |
http://taosecurity.blogspot.com/2011/09/impressions-tiger-trap.html | Impressions: Tiger Trap |
http://taosecurity.blogspot.com/2011/09/bejtlich-cited-in-chinese-article-on.html | Bejtlich Cited in Chinese Article on APT |
http://taosecurity.blogspot.com/2011/09/classic-chinese-defensive-propaganda.html | Classic Chinese Defensive Propaganda |
http://taosecurity.blogspot.com/2011/09/government-takeover-of-compromised.html | Government Takeover of Compromised Digital Infrast... |
http://taosecurity.blogspot.com/2011/09/watch-national-geographic-channels.html | Watch National Geographic Channel's The Liquid Bom... |
http://taosecurity.blogspot.com/2011_08_01_archive.html | August |
http://taosecurity.blogspot.com/2011/08/taosecurity-security-effectiveness.html | TaoSecurity Security Effectiveness Model |
http://taosecurity.blogspot.com/2011/08/tcpip-weapons-school-30-in-mclean-va-26.html | TCP/IP Weapons School 3.0 in McLean, VA 26-27 Oct |
http://taosecurity.blogspot.com/2011/08/jaime-metzl-describes-chinas-threat-to.html | Jaime Metzl Describes "China's Threat to World Ord... |
http://taosecurity.blogspot.com/2011/08/expect-to-hear-ids-is-dead-again.html | Expect to Hear "IDS Is Dead" (Again) |
http://taosecurity.blogspot.com/2011/08/bejtlich-leading-session-at-ians.html | Bejtlich Leading Session at IANS |
http://taosecurity.blogspot.com/2011/08/check-out-mandiant-job-postings.html | Check Out MANDIANT Job Postings |
http://taosecurity.blogspot.com/2011/08/tao-of-nsm-errata-and-possible-book.html | Tao of NSM Errata and Possible Book Plans |
http://taosecurity.blogspot.com/2011/08/bejtlich-webinar-for-dark-reading-and.html | Bejtlich Webinar for Dark Reading and InformationW... |
http://taosecurity.blogspot.com/2011/08/bejtlich-keynote-at-hawaiian-telcom.html | Bejtlich Keynote at Hawaiian Telcom Conference |
http://taosecurity.blogspot.com/2011/08/feedback-from-latest-tcpip-weapons.html | Feedback from Latest TCP/IP Weapons School 3.0 Cla... |
http://taosecurity.blogspot.com/2011/08/impressions-android-forensics.html | Impressions: Android Forensics |
http://taosecurity.blogspot.com/2011/08/impressions-iphone-and-ios-forensics.html | Impressions: iPhone and iOS Forensics |
http://taosecurity.blogspot.com/2011/08/impressions-xbox-360-forensics.html | Impressions: XBox 360 Forensics |
http://taosecurity.blogspot.com/2011/08/impressions-digital-forensics-with-open.html | Impressions: Digital Forensics with Open Source To... |
http://taosecurity.blogspot.com/2011/08/impressions-shellcoders-handbook-2nd-ed.html | Impressions: The Shellcoder's Handbook, 2nd Ed |
http://taosecurity.blogspot.com/2011/08/impressions-reversing-secrets-of.html | Impressions: Reversing: Secrets of Reverse Enginee... |
http://taosecurity.blogspot.com/2011/08/impressions-ida-pro-book-2nd-ed.html | Impressions: The IDA Pro Book, 2nd Ed |
http://taosecurity.blogspot.com/2011/08/book-reviews-vs-impressions.html | Book Reviews vs Impressions |
http://taosecurity.blogspot.com/2011_07_01_archive.html | July |
http://taosecurity.blogspot.com/2011/07/review-of-metasploit-penetration.html | Review of Metasploit: The Penetration Tester's Gui... |
http://taosecurity.blogspot.com/2011/07/review-of-hacking-art-of-exploitation.html | Review of Hacking: The Art of Exploitation, 2nd Ed... |
http://taosecurity.blogspot.com/2011/07/review-of-gray-hat-hacking-3rd-ed.html | Review of Gray Hat Hacking, 3rd Ed Posted |
http://taosecurity.blogspot.com/2011/07/review-of-ninja-hacking-posted.html | Review of Ninja Hacking Posted |
http://taosecurity.blogspot.com/2011/07/review-of-managed-code-rootkits-posted.html | Review of Managed Code Rootkits Posted |
http://taosecurity.blogspot.com/2011/07/review-of-buffer-overflow-attacks.html | Review of Buffer Overflow Attacks Posted |
http://taosecurity.blogspot.com/2011/07/risk-modeling-not-threat-modeling.html | Risk Modeling, not "Threat Modeling" |
http://taosecurity.blogspot.com/2011/07/noah-shachtmans-pirates-of-isps.html | Noah Shachtman’s Pirates of the ISPs |
http://taosecurity.blogspot.com/2011/07/sql-injection-challenge-and-time-based.html | SQL Injection Challenge and Time-Based Security |
http://taosecurity.blogspot.com/2011/07/bejtlich-teaching-in-abu-dhabi-in.html | Bejtlich Teaching in Abu Dhabi in December |
http://taosecurity.blogspot.com/2011_06_01_archive.html | June |
http://taosecurity.blogspot.com/2011/06/why-business-methods-are-as-important.html | Why Business Methods Are as Important as IP to Chi... |
http://taosecurity.blogspot.com/2011/06/with-cyber-attacks-effects-matter-more.html | With "Cyber" Attacks, Effects Matter More Than Mea... |
http://taosecurity.blogspot.com/2011/06/they-did-it.html | THEY DID IT |
http://taosecurity.blogspot.com/2011/06/security-conference-recommendations.html | Security Conference Recommendations |
http://taosecurity.blogspot.com/2011_05_01_archive.html | May |
http://taosecurity.blogspot.com/2011_04_01_archive.html | April |
http://taosecurity.blogspot.com/2011_03_01_archive.html | March |
http://taosecurity.blogspot.com/2011_02_01_archive.html | February |
http://taosecurity.blogspot.com/2011_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2010-01-01T00%3A00%3A00-05%3A00&updated-max=2011-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2010 |
http://taosecurity.blogspot.com/2010_12_01_archive.html | December |
http://taosecurity.blogspot.com/2010_11_01_archive.html | November |
http://taosecurity.blogspot.com/2010_10_01_archive.html | October |
http://taosecurity.blogspot.com/2010_09_01_archive.html | September |
http://taosecurity.blogspot.com/2010_08_01_archive.html | August |
http://taosecurity.blogspot.com/2010_07_01_archive.html | July |
http://taosecurity.blogspot.com/2010_06_01_archive.html | June |
http://taosecurity.blogspot.com/2010_05_01_archive.html | May |
http://taosecurity.blogspot.com/2010_04_01_archive.html | April |
http://taosecurity.blogspot.com/2010_03_01_archive.html | March |
http://taosecurity.blogspot.com/2010_02_01_archive.html | February |
http://taosecurity.blogspot.com/2010_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2009-01-01T00%3A00%3A00-05%3A00&updated-max=2010-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2009 |
http://taosecurity.blogspot.com/2009_12_01_archive.html | December |
http://taosecurity.blogspot.com/2009_11_01_archive.html | November |
http://taosecurity.blogspot.com/2009_10_01_archive.html | October |
http://taosecurity.blogspot.com/2009_09_01_archive.html | September |
http://taosecurity.blogspot.com/2009_08_01_archive.html | August |
http://taosecurity.blogspot.com/2009_07_01_archive.html | July |
http://taosecurity.blogspot.com/2009_06_01_archive.html | June |
http://taosecurity.blogspot.com/2009_05_01_archive.html | May |
http://taosecurity.blogspot.com/2009_04_01_archive.html | April |
http://taosecurity.blogspot.com/2009_03_01_archive.html | March |
http://taosecurity.blogspot.com/2009_02_01_archive.html | February |
http://taosecurity.blogspot.com/2009_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2008-01-01T00%3A00%3A00-05%3A00&updated-max=2009-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2008 |
http://taosecurity.blogspot.com/2008_12_01_archive.html | December |
http://taosecurity.blogspot.com/2008_11_01_archive.html | November |
http://taosecurity.blogspot.com/2008_10_01_archive.html | October |
http://taosecurity.blogspot.com/2008_09_01_archive.html | September |
http://taosecurity.blogspot.com/2008_08_01_archive.html | August |
http://taosecurity.blogspot.com/2008_07_01_archive.html | July |
http://taosecurity.blogspot.com/2008_06_01_archive.html | June |
http://taosecurity.blogspot.com/2008_05_01_archive.html | May |
http://taosecurity.blogspot.com/2008_04_01_archive.html | April |
http://taosecurity.blogspot.com/2008_03_01_archive.html | March |
http://taosecurity.blogspot.com/2008_02_01_archive.html | February |
http://taosecurity.blogspot.com/2008_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2007-01-01T00%3A00%3A00-05%3A00&updated-max=2008-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2007 |
http://taosecurity.blogspot.com/2007_12_01_archive.html | December |
http://taosecurity.blogspot.com/2007_11_01_archive.html | November |
http://taosecurity.blogspot.com/2007_10_01_archive.html | October |
http://taosecurity.blogspot.com/2007_09_01_archive.html | September |
http://taosecurity.blogspot.com/2007_08_01_archive.html | August |
http://taosecurity.blogspot.com/2007_07_01_archive.html | July |
http://taosecurity.blogspot.com/2007_06_01_archive.html | June |
http://taosecurity.blogspot.com/2007_05_01_archive.html | May |
http://taosecurity.blogspot.com/2007_04_01_archive.html | April |
http://taosecurity.blogspot.com/2007_03_01_archive.html | March |
http://taosecurity.blogspot.com/2007_02_01_archive.html | February |
http://taosecurity.blogspot.com/2007_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2006-01-01T00%3A00%3A00-05%3A00&updated-max=2007-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2006 |
http://taosecurity.blogspot.com/2006_12_01_archive.html | December |
http://taosecurity.blogspot.com/2006_11_01_archive.html | November |
http://taosecurity.blogspot.com/2006_10_01_archive.html | October |
http://taosecurity.blogspot.com/2006_09_01_archive.html | September |
http://taosecurity.blogspot.com/2006_08_01_archive.html | August |
http://taosecurity.blogspot.com/2006_07_01_archive.html | July |
http://taosecurity.blogspot.com/2006_06_01_archive.html | June |
http://taosecurity.blogspot.com/2006_05_01_archive.html | May |
http://taosecurity.blogspot.com/2006_04_01_archive.html | April |
http://taosecurity.blogspot.com/2006_03_01_archive.html | March |
http://taosecurity.blogspot.com/2006_02_01_archive.html | February |
http://taosecurity.blogspot.com/2006_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2005-01-01T00%3A00%3A00-05%3A00&updated-max=2006-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2005 |
http://taosecurity.blogspot.com/2005_12_01_archive.html | December |
http://taosecurity.blogspot.com/2005_11_01_archive.html | November |
http://taosecurity.blogspot.com/2005_10_01_archive.html | October |
http://taosecurity.blogspot.com/2005_09_01_archive.html | September |
http://taosecurity.blogspot.com/2005_08_01_archive.html | August |
http://taosecurity.blogspot.com/2005_07_01_archive.html | July |
http://taosecurity.blogspot.com/2005_06_01_archive.html | June |
http://taosecurity.blogspot.com/2005_05_01_archive.html | May |
http://taosecurity.blogspot.com/2005_04_01_archive.html | April |
http://taosecurity.blogspot.com/2005_03_01_archive.html | March |
http://taosecurity.blogspot.com/2005_02_01_archive.html | February |
http://taosecurity.blogspot.com/2005_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2004-01-01T00%3A00%3A00-05%3A00&updated-max=2005-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2004 |
http://taosecurity.blogspot.com/2004_12_01_archive.html | December |
http://taosecurity.blogspot.com/2004_11_01_archive.html | November |
http://taosecurity.blogspot.com/2004_10_01_archive.html | October |
http://taosecurity.blogspot.com/2004_09_01_archive.html | September |
http://taosecurity.blogspot.com/2004_08_01_archive.html | August |
http://taosecurity.blogspot.com/2004_07_01_archive.html | July |
http://taosecurity.blogspot.com/2004_06_01_archive.html | June |
http://taosecurity.blogspot.com/2004_05_01_archive.html | May |
http://taosecurity.blogspot.com/2004_04_01_archive.html | April |
http://taosecurity.blogspot.com/2004_03_01_archive.html | March |
http://taosecurity.blogspot.com/2004_02_01_archive.html | February |
http://taosecurity.blogspot.com/2004_01_01_archive.html | January |
http://taosecurity.blogspot.com/search?updated-min=2003-01-01T00%3A00%3A00-05%3A00&updated-max=2004-01-01T00%3A00%3A00-05%3A00&max-results=50 | 2003 |
http://taosecurity.blogspot.com/2003_12_01_archive.html | December |
http://taosecurity.blogspot.com/2003_11_01_archive.html | November |
http://taosecurity.blogspot.com/2003_10_01_archive.html | October |
http://taosecurity.blogspot.com/2003_09_01_archive.html | September |
http://taosecurity.blogspot.com/2003_08_01_archive.html | August |
http://taosecurity.blogspot.com/2003_07_01_archive.html | July |
http://taosecurity.blogspot.com/2003_06_01_archive.html | June |
http://taosecurity.blogspot.com/2003_05_01_archive.html | May |
http://taosecurity.blogspot.com/2003_04_01_archive.html | April |
http://taosecurity.blogspot.com/2003_03_01_archive.html | March |
http://taosecurity.blogspot.com/2003_02_01_archive.html | February |
http://taosecurity.blogspot.com/2003_01_01_archive.html | January |
http://taosecurity.blogspot.com/search/label/afcert | afcert |
http://taosecurity.blogspot.com/search/label/Air%20Force | Air Force |
http://taosecurity.blogspot.com/search/label/analysis | analysis |
http://taosecurity.blogspot.com/search/label/announcement | announcement |
http://taosecurity.blogspot.com/search/label/apt | apt |
http://taosecurity.blogspot.com/search/label/bestbook | bestbook |
http://taosecurity.blogspot.com/search/label/blackhat | blackhat |
http://taosecurity.blogspot.com/search/label/books | books |
http://taosecurity.blogspot.com/search/label/bro | bro |
http://taosecurity.blogspot.com/search/label/bruins | bruins |
http://taosecurity.blogspot.com/search/label/ccna | ccna |
http://taosecurity.blogspot.com/search/label/china | china |
http://taosecurity.blogspot.com/search/label/cloud | cloud |
http://taosecurity.blogspot.com/search/label/clowns | clowns |
http://taosecurity.blogspot.com/search/label/conferences | conferences |
http://taosecurity.blogspot.com/search/label/controls | controls |
http://taosecurity.blogspot.com/search/label/correlation | correlation |
http://taosecurity.blogspot.com/search/label/cybercommand | cybercommand |
http://taosecurity.blogspot.com/search/label/cyberwar | cyberwar |
http://taosecurity.blogspot.com/search/label/dfm | dfm |
http://taosecurity.blogspot.com/search/label/exploits | exploits |
http://taosecurity.blogspot.com/search/label/fisma | fisma |
http://taosecurity.blogspot.com/search/label/freebsd | freebsd |
http://taosecurity.blogspot.com/search/label/GE | GE |
http://taosecurity.blogspot.com/search/label/ge-cirt | ge-cirt |
http://taosecurity.blogspot.com/search/label/hakin9 | hakin9 |
http://taosecurity.blogspot.com/search/label/history | history |
http://taosecurity.blogspot.com/search/label/impressions | impressions |
http://taosecurity.blogspot.com/search/label/infrastructure | infrastructure |
http://taosecurity.blogspot.com/search/label/ipv6 | ipv6 |
http://taosecurity.blogspot.com/search/label/law | law |
http://taosecurity.blogspot.com/search/label/leadership | leadership |
http://taosecurity.blogspot.com/search/label/malware | malware |
http://taosecurity.blogspot.com/search/label/mandiant | mandiant |
http://taosecurity.blogspot.com/search/label/microsoft | microsoft |
http://taosecurity.blogspot.com/search/label/mssp | mssp |
http://taosecurity.blogspot.com/search/label/nsm | nsm |
http://taosecurity.blogspot.com/search/label/offense | offense |
http://taosecurity.blogspot.com/search/label/oisf | oisf |
http://taosecurity.blogspot.com/search/label/openpacket | openpacket |
http://taosecurity.blogspot.com/search/label/philosophy | philosophy |
http://taosecurity.blogspot.com/search/label/pirates | pirates |
http://taosecurity.blogspot.com/search/label/powerpoint | powerpoint |
http://taosecurity.blogspot.com/search/label/press | press |
http://taosecurity.blogspot.com/search/label/psirt | psirt |
http://taosecurity.blogspot.com/search/label/reading | reading |
http://taosecurity.blogspot.com/search/label/research | research |
http://taosecurity.blogspot.com/search/label/reviews | reviews |
http://taosecurity.blogspot.com/search/label/sans | sans |
http://taosecurity.blogspot.com/search/label/sguil | sguil |
http://taosecurity.blogspot.com/search/label/Snort%20Report | Snort Report |
http://taosecurity.blogspot.com/search/label/threat%20model | threat model |
http://taosecurity.blogspot.com/search/label/threats | threats |
http://taosecurity.blogspot.com/search/label/Traffic%20Talk | Traffic Talk |
http://taosecurity.blogspot.com/search/label/training | training |
http://taosecurity.blogspot.com/search/label/tufte | tufte |
http://taosecurity.blogspot.com/search/label/ubuntu | ubuntu |
http://taosecurity.blogspot.com/search/label/usenix | usenix |
http://taosecurity.blogspot.com/search/label/verizon | verizon |
http://taosecurity.blogspot.com/search/label/vulnerabilities | vulnerabilities |
http://taosecurity.blogspot.com/search/label/wisdom | wisdom |
external links
address | anchor text |
---|---|
http://3.bp.blogspot.com/-tGvg-q0Nocg/TpeSxllbvkI/AAAAAAAACXY/ZE1oVQxnCME/s1600/huntsman-perry-romney.jpg | |
http://articles.businessinsider.com/2011-08-18/politics/30049597_1_global-warming-governor-romney-mitt-romney | Business Insider |
http://www.washingtonpost.com/opinions/romney-china-must-respect-the-free-trade-system/2011/10/13/gIQAiffViL_story.html?hpid=z3 | Washington Post |
http://www.washingtonpost.com/politics/perry-welcomed-chinese-firm-despite-security-concern/2011/08/10/gIQAAu80EJ_story.html | this |
http://twitter.com/share | Tweet |
http://2.bp.blogspot.com/-t2UJfTiVGCs/TpUAVgD0SeI/AAAAAAAACXM/XYZlbZgvQkg/s1600/bejtlich-ft3.jpg | |
http://video.ft.com/v/1211220751001/The-expanding-cyber-industrial-complex | The expanding cyber industrial complex |
http://twitter.com/share | Tweet |
http://4.bp.blogspot.com/-QIohGuJCo_o/TpT-Q6_CU9I/AAAAAAAACXA/5PWakKeBpj8/s1600/cirt-survey.jpg | |
https://www.zoomerang.com/Survey/WEB22DC3EMSH5X | Computer Incident Response Team Organizational Survey, 2011 |
https://www.zoomerang.com/Survey/WEB22DC3EMSH5X | Computer Incident Response Team Organizational Survey, 2011 |
http://twitter.com/share | Tweet |
http://3.bp.blogspot.com/-V1QFzaPyPcc/To_FPXKI4WI/AAAAAAAACW4/OhTjUaPWgfo/s1600/sager.jpg | |
http://searchsecurity.techtarget.com/video/NSAs-Sager-on-trends-of-2011-security-breaches-advanced-persistent-threat-hype#content | interviewed |
http://twitter.com/share | Tweet |
http://english.ruvr.ru/2011/10/07/58323601.html | Chinese spy mania sweeps the world |
http://english.ruvr.ru/ | Voice of Russia |
http://abcnews.go.com/Blotter/china-espionage-spotlight/story?id=14674961 | China Still Spies the Old Fashioned Way, Russia Says |
http://twitter.com/share | Tweet |
http://2.bp.blogspot.com/-yZCXrEYe5mM/To5pMPhlPgI/AAAAAAAACWo/sKN9iRW3TP4/s1600/AL-31FNmod.jpg | |
http://www.ainonline.com/sites/ainonline.com/files/uploads/AL-31FNmod.jpg | AINOnline |
http://china-defense.blogspot.com/2011/10/big-new-chinese-order-for-russian.html | Big New Chinese Order for Russian Fighter Engines |
http://china-defense.blogspot.com/ | China Defense Blog |
http://www.ainonline.com/?q=aviation-news/ain-defense-perspective/2011-10-03/big-new-chinese-order-russian-fighter-engines | AINOnline |
http://1.bp.blogspot.com/-ohe6tLM_F_Y/To5qS-dZaNI/AAAAAAAACWw/Sh5KQM4k31w/s1600/J-20%2B6.1.11%2B-%2Bexaust%2Bcomparison2.jpg | |
http://twitter.com/share | Tweet |
http://3.bp.blogspot.com/-Q-0X69skA9k/To26KkjRhQI/AAAAAAAACWg/_eaCvQCsP60/s1600/house-rep-report.jpg | |
http://thornberry.house.gov/News/DocumentSingle.aspx?DocumentID=263044 | House Cybersecurity Task Force |
http://thornberry.house.gov/UploadedFiles/CSTF_Final_Recommendations.pdf | report |
http://cybersecurityreport.nextgov.com/2011/10/house_republican_task_force_recommendations_tout_industry_leadership.php | House GOP Cyber Task Force Touts Industry Leadership |
http://twitter.com/share | Tweet |
http://2.bp.blogspot.com/-ay91FFNM2vo/To2wKShN0bI/AAAAAAAACWY/o6WzR6nDDEY/s1600/mandia-cspan.jpg | |
http://www.c-span.org/Events/C-SPAN-Event/10737424548/ | C-SPAN |
http://twitter.com/share | Tweet |
http://2.bp.blogspot.com/-sl-fIjTQ1V4/TouqE9Qtq_I/AAAAAAAACWE/i-zsA7uT4Rs/s1600/hpsci_04oct11a.jpg | |
http://intelligence.house.gov/ | US House Permanent Select Committee on Intelligence |
http://www.mandiant.com/ | MANDIANT |
http://www.pcworld.com/article/241094/us_lawmakers_point_to_china_as_cause_of_cyberattacks.html | U.S. Lawmakers Point to China as Cause of Cyberattacks |
http://www.youtube.com/watch?v=c2JfA8Vgahs | Rep. Mike Rogers criticizes Chinese economic cyber-espionage |
http://1.bp.blogspot.com/-M34iGKC5AWQ/TouupnWFBnI/AAAAAAAACWM/4ZQ7NlZLY9Y/s1600/hpsci-2.jpg | |
http://www.youtube.com/watch?v=oC5BmFSGXsI | Rep Myrick (R-NC) |
http://www.twitter.com/taosecurity | @taosecurity |
http://twitter.com/share | Tweet |
http://www.blogger.com/comment.g?blogID=4088979&postID=7992892328354351329&isPopup=true | 1 comments |
http://4.bp.blogspot.com/-pfL6bpIF8bQ/ToPqZ7vXhaI/AAAAAAAACV8/T9HwNH2Jr5k/s1600/defensenews_tigertrap.jpg | |
http://www.defensenewstv.com/video.php#/Segments/History+of+China+spying+on+U.S./57636759001/52684858001/1151883555001 | History of China spying on U.S. |
http://twitter.com/share | Tweet |
http://www.blogger.com/comment.g?blogID=4088979&postID=5601959821860243856&isPopup=true | 1 comments |
http://www.amazon.com/gp/cdp/member-reviews/A2ZVOU9X5W2S47/ | Amazon.com |
http://www.momentumpress.net/books/robust-control-system-networks-how-achieve-reliable-control-after-stuxnet | Robust Control System Networks |
http://www.langner.com/en/ | Ralph Langner |
http://www.amazon.com/review/R23F25FAG3DTU9/ref=cm_cr_rdp_perm | review |
http://twitter.com/share | Tweet |
http://www.amazon.com/exec/obidos/ASIN/0321304861/ | The Art of Software Security Testing |
http://twitter.com/share | Tweet |
http://www.amazon.com/exec/obidos/ASIN/0321444426/ | The Art of Software Security Assessment |
http://twitter.com/share | Tweet |
http://www.blogger.com/profile/13512184196416665417 | My Photo |
http://www.blogger.com/profile/13512184196416665417 | View my complete profile |
http://www.bsdmag.org/ | img |
http://www.blogger.com | Blogger |