Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Fear Not: Hacks, Attacks and Cracks written by Russell Handorf

Russell Handorf

Mr. Handorf serves on the Board of Directors for the FBI’s Philadelphia InfraGard Chapter, which has more than 800 members locally.

He has consulted for the US Federal and State Governments, companies and educational institutions where he performed security audits and assessments of their clients, infrastructure and networks. He was CIO and Director of Research and Development for a Philadelphia based wireless broadband solutions provider.

He teaches at Drexel University’s Goodwin College, conducts technical reviews for InfoWorld and serves as net control for the Philadelphia Amateur Radio Emergency Service. He has recently completed a Master of Science degree in Information Security.

Attack Visualizations Using GraphViz and Google Earth

– There is a saying, a picture is worth more than a thousand words. This certainly holds true, especially with determining the source of network attacks and what kind of network attacks are at your edge or internal networks. We are going to explore two kinds of visualizations that use the same data…

OSSIM : Open Source Security Information Manager

– Previously I had written about using honeypots within your infrastructure to add an extra layer of detection for malicious events. I mentioned that you can integrate it into the rest of your security event management and log aggregation via enabling syslog on the honeypot. Some of the feedback I…

Security Buzzword Bingo

– I’ve had the opportunity to travel to various security conferences and product demonstrations over the years. Lately in order to continue paying attention to a lot of these presenters, I’ve had to play the game Buzzword Bingo. Everyone should remember the game Bingo, where all the players have…

The Ears of a Hacker: Enumeration by Sound – No Tech Hacking (pt. 2)

– I previously wrote an article about Johnny Long’s latest book, No Tech Hacking. This book covers many points about security in the physical world from the perspective of a hacker by raising the question “What does a hacker see?” There’s another observation point that must be addressed, one…

How-To Easily Deploy Honeypots for Production Networks

– When discussing honeypots, security folks typically think of the researchers out there who are doing their best to track the shadow networks that plague the Internet. Their deployments are to gain attention and keep the attackers interested based on the mentality of “the lower hanging fruit.”…