background preloader

TaoSecurity

TaoSecurity
Related:  Intelligence Analysis Blogs

Infowar Monitor Books and Publications | Paul Baran: Publications on Distributed Communications In 1962, a nuclear confrontation seemed imminent. The United States (US) and the Union of Soviet Socialist Republics (USSR) were embroiled in the Cuban missile crisis. Both the US and the USSR were in the process of building hair-trigger nuclear ballistic missile systems. Each country pondered post-nuclear attack scenarios. US authorities considered ways to communicate in the aftermath of a nuclear attack. At the time, naysayers dismissed Baran's idea as unfeasible. Baran was born in Poland in 1926. At that time, RAND focused mostly on Cold War-related military issues. Baran envisioned a network of unmanned nodes that would act as switches, routing information from one node to another to their final destinations. Baran also developed the concept of dividing information into "message blocks" before sending them out across the network. This method of "packet switching" is a rapid store-and-forward design.

spylogic.net Darknet National Vulnerability Database SIPVicious Red Team Journal Juniper - Olive Olive refers to a regular PC or virtual machine that is running Juniper Networks’ JUNOS software. Juniper created Olive early on so they could perform testing of JUNOS during development. These days Olive is deprecated in favor of cheap, low-end M and J-series routers but is still used by people wanting to evaluate/test JUNOS or those who are studying for Juniper certifications. For the most part Olive is fully functional as a basic router. In order to get an Olive up and running you require a valid copy of a JUNOS jinstall file which can be found on a “real” Juniper router and/or obtained from Juniper under a support contract. Disclaimer Olive will exist as long as Juniper has no cause to eliminate it. Olive is in no way, shape, or form supported by Juniper or JTAC. My Olive Related Posts Other Olive Sites

PortSwigger.net Software Engineering Institute: Carnegie Mellon Posted on by Troy Townsend in Cyber-physical Systems The majority of research in cyber security focuses on incident response or network defense, either trying to keep the bad guys out or facilitating the isolation and clean-up when a computer is compromised. It's hard to find a technology website that's not touting articles on fielding better firewalls, patching operating systems, updating anti-virus signatures, and a slew of other technologies to help detect or block malicious actors from getting on your network. What's missing from this picture is a proactive understanding of who the threats are and how they intend to use the cyber domain to get what they want. Earlier this year, representatives from the government approached the SEI Emerging Technology Centerabout conducting research to assess the state of the practice of cyber intelligence. Specifically, we were asked us to accomplish three core tasks: Scope We identified 25 organizations to participate in our research including

StarDict - The best dictionary program in linux and windows

Related: