Menu
Could you introduce yourself? Well, I am just a computer geek. I am a relatively young, self-taught enthusiast who is fairly proficient in the field of computer security, and simply enjoys playing with this stuff. Since the mid-'90s, I managed to contribute some probably worthwhile research to this area, as witnessed by a number of BUGTRAQ readers. I found and helped to solve a bunch of interesting security problems, and wrote a couple of well-received papers; I also developed several small but cool open source infosec utilities such as p0f, memfetch, Fenris, and fakebust. Well, enough with blatant self-promotion. Curious readers can find more information about my work (and what else do I do in my free time).
Recently, published your first book. What type of book is? Related Reading A Field Guide to Passive Reconnaissance and Indirect Attacks By.
Silence on the Wire is a fairly unusual guide to the world of computer security. Unusual, because instead of taking the reader through the frequently repeated fundamentals, I tell a story of this field as witnessed by me when I first learned this stuff. I show that security problems are inherent to the way we design systems, bound to just about any aspect of modern computing; and that only by understanding it can you follow and mitigate threats efficiently. Along the way, I focus on some of the more unusual, fascinating, and often arcane topics in a way that hopefully is both easy to follow and entertaining, even if you have no professional interest in security. Who should read it?
Well-if you just want to get a solid grasp of the basics, this book is not for you, at least not to accomplish this task. If you are a seasoned computer user or a developer, and want to learn to see the technology in a different way, I believe you should give SotW a try.
![]()
If you are an infosec professional and want to learn more about the technology, and rediscover the fascinating world of computer mechanics, I hope you'd enjoy SotW, too. In the first chapter, you write about the need for randomness, and how it's difficult to get truly random data from a machine built to behave deterministically. Could this necessity disappear with the growing resources that common people will have access to? For example, a blind spoofing attack could become more feasible with broadband access to the internet, and there are some countries where you can easily and cheaply get a 10Mbps or 100Mbps connection. Computers need to be able to generate truly unpredictable numbers for various purposes-implementing cryptography is a prominent example.
![]()
This is not going to change anytime soon. When users have access to more and more bandwidth and computing power, they can more easily carry out brute-force attacks against protocols and algorithms. But this only means the need for strong cryptography, cryptographically secure ISN generation, and so forth is on the rise. And to get there, we need computers to be able to deliver high-quality, unpredictable entropy-more than ever. Do you think that security concerns will require the adoption of a new version of TCP in the near future? In my opinion, TCP has some shortcomings, and these are bound to become more and more of an issue in the near future, but I do not think we're going to reach a point where we must switch to something else that instant; there is no mystery failure threshold, but performance and security features within or kludges around the protocol are becoming less efficient as the surrounding technology advances. In fact, even if we had to replace TCP on short notice, it would be next to impossible to carry out such an operation.
Look at how we're moving toward IPv6 protocol suite-ho boy!
Silence On The Wire Michal Zalewski No Starch Press 555 De Haro Street, #250, San Francisco, CA 270461 $39.95 1-800-420-7240 www.nostarch.com Silence On The Wire: A Field Guide To Passive Reconnaissance And Indirect Attacks by computer security and programming expert Michal Zalewski focuses upon fundamentals of computing so that even non-specialist general readers can understand network design and their own computing activities, becoming able to address computer security issues. Silence On The Wire follows the path of a piece of information from the moment the user's hand touches the computer keyboard to the instant when it is received by a remote party on the other end of the wire. Zalewski notes that security concerns don't simply stem from a set of isolated faults that can be worked around, but represent issues associated with every process and system, and therefore they need to be understood and studied within that broader and more comprehensive context. Informed and informative, thoughtful and thought-provoking, Silence On The Wire should be considered mandatory reading for all security professionals, and is enthusiastically recommended to the attention of technophiles with an interest in computer security for themselves and their associates.
Computer Science
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention.
Kaspersky anti-virus personal pro. Kaspersky anti virus personal pro 5.0.388. Kaspersky anti virus personal pro was specially developed for advanced users seeking the most up to date anti virus. Kaspersky Anti-Virus 5.0 Personal Pro MP5 (build 5.0.676) Same Info in: Home / Home products / Home legacy products / Kaspersky Anti-Virus 5.0 Personal Pro MP5. Choose kaspersky.our recommendation remains norton antivirus.how to go from kaspersky anti virus personal 5.0 personal pro 5.0 personal security suite 5.0 to. Kaspersky anti virus personal pro 5.0 388 key. Of computer viruses and trojan horse programs.kaspersky anti virus 6.0provides reliable and effective email protection.
Science![]()
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |