Monthly Archives: March 2007


KisMAC is a free stumbler application for MacOS X, that puts your card into the monitor mode. Unlike most other applications for OS X it has the ability to run completely invisible and send no probe requests.

How to safely dispose of old mobile devices

The lifespan of notebook PCs, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that gets sold, passed on to a colleague, friend or relative, or simply thrown away in the… Read More »

Network Password Manager

Network Password Manager (NPM) is a multiuser, client-server software that allows employees to manage passwords within their company. Network Password Manager supports all standard password management functions, has flexible administrative options, convenient user interface and many advanced functions.

USB Monitor

USB Monitor is an invaluable tool for all developers and engineers, who design, create and connect to PC a whole range of equipment with universal serial bus on board. This tool captures all the USB Request Blocks (URBs) transferred from the device driver to the host controller and back.

FirePanel XP

FirePanel XP is an extension for the new firewall found in Windows XP SP2 and Windows Server2003 SP1. FirePanel XP it modifies your Windows Firewall, with features not normally available to users. You can set rules, monitor your firewall activity, watch logs, and keep realtime tabs on what exactly your connection is being exposed to.

The Dirty Dozen: Killing False Positives

In the classic war movie The Dirty Dozen, Lee Marvin’s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It’s a near-impossible assignment.

What’s Important in Web Application Security Testing

As with many other business analysis issues, there are three sides to the story when looking at Web application security testing: yours, the findings of your vulnerability assessment, and the truth. Whether you’re using a commercial or open source scanner, you’re undoubtedly going to glean a lot of information and come across vulnerabilities.

Managing Compliance in a Multi-Regulatory World

Federal and state government regulations can be a big problem for today’s organizations. There are more than 100 such regulations in the U.S. alone, and that number continues to grow. These are in addition to industry-specific mandates. They are all designed to safeguard the confidentiality, integrity, and availability of electronic data from information security breaches.… Read More »