Information Security Terminology and IT Security - Glossary [wiki] (1)
Program Analysis with Satisfiability Modulo Theories (SMT) Solvers for Bug Hunters - Part 1 [blog] (1)
Linux Without Borders, Edition 1 (Nov 2017): network-ergonomics and cloud-mounts for the impatient [blog] (1)
Darktrace - Machine Learning Network Intrusion Detection System [blog] (1)
GDPR FAQs - from DPIA (Article 25) to Data Mapping (Article 30, 32) [blog] (1)
Needful things - Windows 7, 8, 9, 10 [wiki] (1)
Malware Analysis & Forensics: Analyze Malicious Documents [wiki] (1)
Malware Analysis: foundation level workflows [wiki] (1)
Law and Data Security - a growing compendium [wiki] (1)
Create nice utility apps Nim - as little code as possible [wiki] (1)
PWNplug - onsite Pen(-)tests, Reverse Shells, and Network Access Control [blog] (1)
Web typography - just a little bit longer [wiki] (1)
SSH Multi Factor Authentication with Google Authenticator from external networks [blog] (1)
Python Programming Language and Libraries - usage journal [wiki] (1)
Discourse - tips and tricks [wiki] (1)
How did you cultivate information security at your company - or why certification isn't about applicants [blog] (1)
ESXi (6.5) - usage compendium for Road Warriors [wiki] (1)
WinDbg - security and forensics usage wiki [wiki] (1)
GitLab CE - tips and tricks [wiki] (1)
PCI DSS 3.2 Compendium (2017) [wiki] (1)
Linux KVM - usage compendium [wiki] (1)
X86 - the 32 bit assembly workflows you need in Information Security for Malware Analysis and Exploit Development [wiki] (1)
iSCSI, LUNs, arrays - OpenSource storage with Linux and tgt [blog] (1)
Cisco - network device commands usage journal for the security lab [wiki] (1)
Network Intrusion Detection System workflows for Suricata - beyond packets [wiki] (1)
Use FreeTDS on Linux and Python for Lansweeper Asset Management queries [blog] (1)
Did you ever use the word "crypto-compliance" for PCI DSS? Maybe you should [blog] (1)
Payment Card Industry Data Security Standard (version 3.2 - 2017) [wiki] (1)
The role of risk assessments and evaluation of evidence in Incident Response [blog] (1)
Malware Analysis - basic code analysis with BinNavi [blog] (1)