Posted on 10/29/201207/11/2016 Defending Against The Next Generation Distributed Denial of Service DDoS Attacks : DDoS Defense Reference Architecture
Posted on 10/02/201204/24/2014 Defending Against Google Hacking : Know What Can Be Found On Search Engines
Posted on 09/24/201211/29/2013 Lock Picking Tools : How Much Skill Do You Really Need? Bump Keys, Lock Picks, Lock Guns
Posted on 09/13/201204/24/2014 Why you should NOT use File Sharing services such as LimeWire and UTorrent : How to hide Malware / Rootkits in legitimate software.
Posted on 08/23/201204/24/2014 Configuring On-Boarding Using Identity Services Engine ISE 1.1MR / 1.1.1