Re: [Pauldotcom] Controversial (maybe) question

2013-05-27 Thread David Kovar
Greetings, You could probably make a determination without deploying spyware. If you grab the MFT, analysis of it can tell you a lot about the user's activity. Get the prefetch files and registry hives. Get the various browser caches. Do traditional forensics . -David On May 25, 2013, at

Re: [Pauldotcom] Steady stream of probe email messages.

2012-07-21 Thread David Kovar
gt; system/network? > > Aaron > > On 7/20/12 7:29 PM, David Kovar wrote: >> Good evening, >> >> A mid-sized high tech client got a new CEO a few months ago. Since coming on >> board, he's received a steady stream of probe email addresses from a wide >>

[Pauldotcom] Steady stream of probe email messages.

2012-07-21 Thread David Kovar
Good evening, A mid-sized high tech client got a new CEO a few months ago. Since coming on board, he's received a steady stream of probe email addresses from a wide variety of throw away email address. The addresses are most often Gmail accounts with random letters for the name and for the addr

Re: [Pauldotcom] Linux prototype board with Firewire?

2011-05-18 Thread David Kovar
: [Pauldotcom] Linux prototype board with Firewire? >> >> I think you are going to find this difficult. You might want to consider a >> small form factor pc board. You should be able to find one with FireWire >> without too much effort. >> >> Jim >> >> O

Re: [Pauldotcom] Linux prototype board with Firewire?

2011-05-17 Thread David Kovar
ble to find one > with FireWire without too much effort. > > Jim > > On Monday, 16 May 2011, David Kovar wrote: >> Greetings, >> >> I'm trying to locate a prototyping kit for a small Linux hardware solution. >> The catch is that it needs a firewire i

[Pauldotcom] Linux prototype board with Firewire?

2011-05-16 Thread David Kovar
Greetings, I'm trying to locate a prototyping kit for a small Linux hardware solution. The catch is that it needs a firewire interface, and I've been unable to find such a beast. And this is a security related project -David ___ Pauldotcom maili

Re: [Pauldotcom] recovering office files--FREE

2011-03-16 Thread David Kovar
You can do it with PhotoRec. The name is somewhat misleading. -David On Mar 16, 2011, at 5:36 PM, Brett wrote: > I've used backtrack to recover files > > Sent from my iPhone > > On Mar 16, 2011, at 8:19, Juan Cortes wrote: > >> Guys, >> >> is there a way to recover office files. I download

Re: [Pauldotcom] Website Extractor

2011-02-07 Thread David Kovar
Greetings, Adobe Acrobat Pro will do this. One reason for using Acrobat is that it'll turn everything into a PDF, which is useful with dynamic content. HtTrack is the other option I use. -David On Feb 7, 2011, at 3:53 PM, Juan Cortes wrote: > Hope all is well guys! > > I know there's such to

Re: [Pauldotcom] Email Policy Changes

2011-01-18 Thread David Kovar
Greetings, This policy is becoming standard in a lot of corporations. I think the powers that be have more market research for their point of view than you can drum up for yours. -David On Jan 18, 2011, at 10:19 AM, Craig Freyman wrote: I agree that the policy is very bad and Bugbear is 1

Re: [Pauldotcom] Any other security practitioners in Central Illinois?

2010-06-06 Thread David Kovar
convinced to head up that way for a meet-up sometime. KP On Thu, Jun 3, 2010 at 4:59 PM, David Kovar wrote: Greetings, Is anyone on this list located near Bloomington-Normal and interested in getting together occasionally for shop talk etc? -David __

[Pauldotcom] Any other security practitioners in Central Illinois?

2010-06-03 Thread David Kovar
Greetings, Is anyone on this list located near Bloomington-Normal and interested in getting together occasionally for shop talk etc? -David ___ Pauldotcom mailing list Pauldotcom@mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinf

Re: [Pauldotcom] CISSP Study Strategy?

2010-06-03 Thread David Kovar
Greetings, I think it depends on your previous experience, study habits, and test taking ability. I test well (ie, do well on standardized tests) and had been working in IT and software engineering for 20 years when I took the test. I prepared only with the CISSP book. I'd read a chapter a

Re: [Pauldotcom] Kanguru Bio AES Drive

2010-05-28 Thread David Kovar
Ironkey's support for non-Windows platforms is sorely lacking. TrueCrypt is what I tend to use for securing a variety of portable media. -David On Tue, May 11, 2010 at 1:48 PM, iamnowonmai wrote: > Ironkey > > > Michael Miller wrote: > >>I'm a bit skeptical about flash drives and hard drives

Re: [Pauldotcom] Encrypted Disks

2010-05-28 Thread David Kovar
Greetings, I just bought one of these but in the USB/eSATA configuration. I am *quite* happy with it. I've not cracked it open to determine how secure the data really is though. It is compact, relatively rugged, fast, and works on every system I've needed to plug it into. And it was relatively in

Re: [Pauldotcom] Searching Domain for Files

2010-05-28 Thread David Kovar
Greetings, There are various tools that use a servlet running with administrator rights on the various targets controlled by one or more management systems. You can purchase the software or you can contract with the company to lease you the software under a professional services arrangement if thi

Re: [Pauldotcom] Report Generation....

2010-05-28 Thread David Kovar
Greetings, I work on Mac, Windows, and Linux. I tend to use a variety of tools depending on the platform, the nature of the engagement, and whether I was first on scene. No matter what tools I use, I plan on writing up a final report, most likely from scratch. If I've done my ongoing documentatio

Re: [Pauldotcom] Case studies?

2010-05-26 Thread David Kovar
oll >> >> On Tue, May 25, 2010 at 6:25 PM, Raffi Jamgotchian >> wrote: >>> Companies aren't really open about when they got pwned even when it's >>> scrubbed >>> >>> On May 25, 2010 8:38 AM, "David Kovar" wrote: >>>

[Pauldotcom] Case studies?

2010-05-25 Thread David Kovar
Good morning, I am focusing on my reading to broaden my awareness of the types of attacks and the nature of the people doing them. I've recently read Fatal System Error and the Art of Intrusion, along with the Defcon 17 Malware Freak Show slides as well as a lot on the Google attack. The books wer

Re: [Pauldotcom] How much do timestamps matter?

2009-08-12 Thread David Kovar
Greetings, Timestamps are one clue to a subject's activity but are rarely the smoking gun, for many reasons. They can be intentionally modified, various automated processes can update them, the system's clock may be off (intentionally or accidentally), various actions may not preserve them,