Wednesday, October 3, 2007

Security Tools - vSpaceLab.com

Computer Security White Papers - Gary Neubauer II, vSpaceLab, San Antonio TX

Here is a list of computer security white papers and lab projects that have been completed by Gary Neubauer II throughout his 12 year history in the security field. They include developing security Perception Management vs Pychological Warfare, Password Cracking Labs, Penetration Tests, Vunerability Assessments, Network Packet Sniffing, Security Logs Files, Hacking NT Passwords, and Intrusion Detection Lab setups. There are papers on MD5 Hash Analysis, Encryption Cracking, Log FIle Analysis, Network Analysis, Snort and ACID Labs, and a paper commenting on the Cuckoo's Egg Book by Cliff Stoll.


Perception Management vs. Psychological Warfare - Gary Neubauer II, vSpaceLab, San Antonio TX - September 27, 2005

That which we call a rose, by any other name would smell as sweet.” - William Shakespeare

The definition of truth (according to dictionary.com) is: Conformity to fact, actuality or a statement proven to be or accepted as true. Truth by its very definition is exclusive, not inclusive. There is only one way that something actually occurred although it may be perceived, remembered, or told as happening in several different ways. The various views are often colored by prejudice, bias, or even misinterpretation of the facts. In the age of information, managing that information and choosing when and how to release vital pieces of that information becomes paramount to controlling how people perceive an idea, concept or a given situation.

Perception Management is a controlled strategy that aims to regulate and influence a group’s interpretations, conclusions, or decision process. Directing the perception and awareness of an event is key to manipulating the real or perceived outcome of that situation. Planned psychological operations against a target using specific information designed to shape and influence a targets emotional behavior or objective reasoning is a useful strategy in warfare.


Read more



Password Cracking Lab - Gary Neubauer II
- vSpaceLab, San Antonio TX - October 27, 2005

Computer systems usually have some method of restricting access to applications, services, or network resources. The first line of defense often comes in the form of a user account and a password for that account. If the password supplied is valid for the User ID specified, the operator is allowed to access any resource authorized for use under that User ID.

Read more


Top Security Tools - Gary Neubauer II
- vSpaceLab, San Antonio TX

Interconnected computer systems rely on communicating in a secure, dynamic and un-interrupted manner. This is a list of the top security tools that are use to discover and deploy security topologies that accomplish that goal. "Breaking Into" your own systems and securing your own hacks continues to be a sound security policy.

Read more


Ghost in the Machine - Authenticating a Trace - Gary Neubauer II
- vSpaceLab, San Antonio TX - February 27, 2006

In his book the Cuckoo’s Egg, Cliff Stoll discovers a 75 cent computer use accounting error which begins a journey that ultimately reveals a hidden network of multinational hackers linked to the KGB. This accounting error tips Stoll off to an uninvited visitor to the Lawrence Berkeley Lab computers. The trail goes through Hanover, Germany and the Project Equalizer plot. Project Equalizer was an initiative by the KGB to pay the West German Chaos Computer Club members to hack into United States military computers. [2] These groups were exploiting security vulnerabilities in government funded research labs, and military weapons research facilities.

Read more


Network Packet Sniffing using Ethereal - Gary Neubauer II
- vSpaceLab, San Antonio TX - November 27, 2005

Computers attached to networks communicate with each other using network protocols. Network data is packetized and transmitted to each other using strict protocol relationships. Most of these “conversations” are transparent to the user of the networked system and often only show up as a rotating hour glass, while the user waits for information to be transferred to his internet browser or other application. Using a network packet analyzer can reveal the protocols used in the communications streams by capturing network data packets and allowing an administrator to examine what is actually going on across the wire. Ethereal is an open source (freeware) data packet analyzer. It can be used to troubleshoot network connections, examine security vulnerabilities, and debug protocol implementations.

Read more


Contact vSpaceLab Web Design - Web Site Design Support Best Domain Names - Affordable Web Design - Best Web Hosting - Build Custom Ecommerce - Streaming Audio and Video - Home - Services - Works - Tools - Contact - Templates - Website Hosting - SEO - About vSpaceLab Virtual Space Lab - Web Space Lab - Gary Neubauer II - SEO Assault - Page Rank Lab




    No comments: