Writing a book is challenging. Getting people to read it is even more challenging. Read my page on ebook Marketing for some thoughts and ideas to help make the most of your ebook marketing efforts.
That’s right! You can learn everything you need to know about computer security and hacking in just 4 hours by reading my new ebook, OWNED: Why hacking continues to be a problem ($9.99). The book intermixes both subjects and explains how and why hackers are able break into secured networks and computers. Information is presented in a simple and concise manner, building readers’ knowledge as they progress through the book. Readers learn the basics about security and hacking, move on to understand why hackers are so successful, learn about advanced hacker techniques, and why computer security personnel often do not see hackers on networks and computers. If you need to get up to speed overnight, this is the book for you. Preview and buy the book online today at Smashwords.com.
If a Trojan survives on your network for more than 72 hours, chances are that you’ll never find it unless you stumble upon it by accident. If your security tools don’t see it or its network traffic, how are you ever going to know it’s there?
Too many organizations are finding malware on their network – days, weeks or even months after the initial compromise. Are you experiencing these types of problems? Are you concerned that there might be well-hidden malware on your network?
A Internet Connectivity Audit (ICA) can help you identify network activity indicative of a malware infection on your network. A ICA is an in-depth analysis of ALL traffic leaving and entering your network using a custom suite of packet crunching tools that can identify much more than a simple protocol analyzer (a.k.a sniffer). In some cases, a ICA will even identify covert channels used by malware that adhere to protocol RFCs. If you want to increase your chances of finding well-hidden malware, you need a ICA.
The problem is that many organizations don’t know about ICAs or that it’s even possible to do such an audit. Why? Because the tools to do a proper ICA don’t exist on the commercial market. As a result, many organizations will never know that a hacker is on their network or that a hacker came and left. Until ICAs become a mainstream capability, hackers will continue to remain undetected on many organization’s networks.
To learn more about ICAs, click here.
Actually, I’ll just be late for work – again. It’s always a bad idea for me to get online while I’m eating breakfast, but there is just too much that happens while I’m sleeping for me to just get up, eat, get dressed and leave the house. I always feel compelled to read something, send an email or post a comment, which always seems to take much longer than it actually should.
Oops! Look at the time! Gotta go!
If a hacker knows what he’s doing, his malicious code won’t match any intrusion detection or anti-virus signatures; his covert outbound network communication will match the activity profile of your network; and after he’s done raiding all of your company’s information, he’ll delete his tools from your systems. If you were to check your system and network logs tomorrow morning, what evidence would you have that he was on your network?
While you’re sitting around the office waiting for something exciting to happen, stop by the U.S. Department of Justice’s Computer Crime & Intellectual Property Section. There is a lot of good information that you may find useful. They’ve got some interesting Computer Crime News Releases that will give you some food for thought for protecting your own environment. There is also a section for Reporting Computer, Internet-Related, or Intellectual Property Crime with links to the appropriate government agency. And much more! Check it out!
After what seems like forever, I finally published my book on Smashwords.com today. Owned: Why hacking continues to be a problem provides readers with a fresh perspective on computer security and hacking, by intermixing both subjects and explaining how and why hackers are able break into secured networks and computers. It’s currently available in several ebook formats and will be up on Barnes & Noble.com, iBookstore and Sony’s Reader Store in the next couple of weeks. You can learn more about the book on the The Book page.
I highly recommend Smashwords.com to anyone looking for an ebook publisher. It’s easy to use, the support team is very responsive (even the CEO responds to emails!) and Smashwords is expanding their reach into the entire ebook market.