-
1
-
-
62949148566
-
-
Gozor Finished payload. (2007, May 30). [MsgID 70406] Message posted to http://forums.hak5.org/index.php/topic.6608.msg70406.html#msg70406
-
Gozor Finished payload. (2007, May 30). [MsgID 70406] Message posted to http://forums.hak5.org/index.php/topic.6608.msg70406.html#msg70406
-
-
-
-
2
-
-
62949109145
-
-
Best practices for managing and enforcing USB security. (2006, June 22). Altiris, Inc. Retrieved June 27, 2007 from http://www.altiris.com/upload/wp- bestpracticesformanagingusbsecurity.pdf
-
Best practices for managing and enforcing USB security. (2006, June 22). Altiris, Inc. Retrieved June 27, 2007 from http://www.altiris.com/upload/wp- bestpracticesformanagingusbsecurity.pdf
-
-
-
-
3
-
-
62949191669
-
-
Beware of strangers bearing iPods. (2005, June 25). New Scientist. Retrieved July 1, 2007 from http://www.newscientisttech.com/article/mg18625055. 500.html
-
Beware of strangers bearing iPods. (2005, June 25). New Scientist. Retrieved July 1, 2007 from http://www.newscientisttech.com/article/mg18625055. 500.html
-
-
-
-
4
-
-
62949235751
-
-
Effective IT policies: Acceptable use policy and the threat of lifestyle devices, (n.d.) Centennial Software, Inc. Retrieved June 27, 2007 from http://www.devicewall.com/downloads/Effective-IT-Policies-A UP-threat-of- lifestyle-devices.pdf
-
Effective IT policies: Acceptable use policy and the threat of lifestyle devices, (n.d.) Centennial Software, Inc. Retrieved June 27, 2007 from http://www.devicewall.com/downloads/Effective-IT-Policies-A UP-threat-of- lifestyle-devices.pdf
-
-
-
-
5
-
-
62949159221
-
-
Data breaches: Is anyone safe?. (2005, July). Information Management Journal. 10. Retrieved June 30, 2007, from MasterFJLE Premier database.
-
Data breaches: Is anyone safe?. (2005, July). Information Management Journal. 10. Retrieved June 30, 2007, from MasterFJLE Premier database.
-
-
-
-
6
-
-
62949235749
-
Five ways to prevent data theft by iPod
-
April 16, Retrieved June 30, 2007, from MasterFILE Premier database
-
Garretson, C. (2007, April 16). Five ways to prevent data theft by iPod. Network World, 24(15), 16. Retrieved June 30, 2007, from MasterFILE Premier database.
-
(2007)
Network World
, vol.24
, Issue.15
, pp. 16
-
-
Garretson, C.1
-
7
-
-
84869261913
-
Review: Latest Devicewall geared to SMBs
-
March 3, Retrieved July 1, 2007 from
-
Giannacopoulos, P. (2006, March 3). Review: Latest Devicewall geared to SMBs. SearchSecurity.com. Retrieved July 1, 2007 from http://searchsecurity.techtarget.com/originalContent/0,289142,sid14-gci1170609. 00.html
-
(2006)
SearchSecurity.com
, pp. 289142
-
-
Giannacopoulos, P.1
-
9
-
-
84869245777
-
USBs' giant sucking sound
-
April 20, Retrieved July 1, 2007 from
-
Higgins, K, (2007, April 20). USBs' giant sucking sound. Dark Reading. Retrieved July 1, 2007 from http://www.darkreading.com/document. asp?doc-id=122252
-
(2007)
Dark Reading
-
-
Higgins, K.1
-
10
-
-
62949110970
-
-
Jabra (n.d.). Installing Backtrack to a USB stick or hard drive. Retrieved July 1, 2007 from http://www.offensive-security.com/documentation/ backtrack-hd-install.,pdf
-
Jabra (n.d.). Installing Backtrack to a USB stick or hard drive. Retrieved July 1, 2007 from http://www.offensive-security.com/documentation/ backtrack-hd-install.,pdf
-
-
-
-
11
-
-
62949194898
-
eWeek, 23
-
11, 10. Retrieved June 30, from Computer Source database
-
Lundquist, E. (2006, April 24). USB security: A sticky situation. eWeek, 23(11), 10. Retrieved June 30, 2007, from Computer Source database.
-
(2006)
-
-
Lundquist, E.1
-
12
-
-
84869245512
-
Los Alamos data leaks due to 'gross mis-management'
-
March 21, Retrieved July 1, 2007 from
-
Mellor, C. (2007, March 21). Los Alamos data leaks due to 'gross mis-management'. Techworld. Retrieved July 1, 2007 from http://www.techworld.com/storage/features/index.cfm?featureID=3247&pagtvpe= all
-
(2007)
Techworld
-
-
Mellor, C.1
-
13
-
-
84869260937
-
La sécurité des clés USB mise à mal par USBDUMPER
-
July 6, Retrieved July 1, 2007 from
-
Poli, X. (2006, July 6) La sécurité des clés USB mise à mal par USBDUMPER, SecuObs.com, Retrieved July 1, 2007 from http://www.secuobs.com/news/07062006-sstic-usbdumper.shtml
-
(2006)
SecuObs.com
-
-
Poli, X.1
-
14
-
-
62949232904
-
-
Reardon, M (2005). Securing data from the threat within. CNetNews.com, Retrieved July 1, 2007 from http://news.com.com/ Securing+data+f'rom+the+threat+within/2100-7347-3-5520016.html
-
Reardon, M (2005). Securing data from the threat within. CNetNews.com, Retrieved July 1, 2007 from http://news.com.com/ Securing+data+f'rom+the+threat+within/2100-7347-3-5520016.html
-
-
-
-
15
-
-
84869260068
-
Keeping pace with emerging endpoint security technologies
-
July 17, Retrieved July 1, 2006 from
-
Rothke, B. (2006, July 17). Keeping pace with emerging endpoint security technologies. Searchsecurity.com. Retrieved July 1, 2006 from http://searchsecurity.techtarget.eom/tip/0,289483.sid14-gci1193887.00.html
-
(2006)
Searchsecurity.com
, pp. 289483
-
-
Rothke, B.1
-
16
-
-
62949218212
-
Endpoint security without the pain
-
January 23, Retrieved June 30, 2007, from Computer Source database
-
Scheier, R. (2006, January 23). Endpoint security without the pain. Computerworld, 40(4), 21-22. Retrieved June 30, 2007, from Computer Source database.
-
(2006)
Computerworld
, vol.40
, Issue.4
, pp. 21-22
-
-
Scheier, R.1
-
17
-
-
62949135555
-
Don't spring a data leak
-
December, Retrieved June 30, 2007, from Computer Source database
-
Spangler, T. (2006, December). Don't spring a data leak. Baseline, 7-9. Retrieved June 30, 2007, from Computer Source database.
-
(2006)
Baseline
, pp. 7-9
-
-
Spangler, T.1
-
18
-
-
84869244819
-
-
June 7, Retrieved June 27, 2007 from
-
Stasiukonis, S. (2006, June 7). Dark Reading. Retrieved June 27, 2007 from http://www.darkreading.com/document.asp?doc-id=95556&WT.svl= column1-1
-
(2006)
Dark Reading
-
-
Stasiukonis, S.1
-
19
-
-
62949121198
-
eWeek, 23(29)
-
20. Retrieved June 30, from Computer Source database
-
Strom, D. (2006, July 24). Getting a lock on endpoints. eWeek, 23(29), 20. Retrieved June 30, 2007, from Computer Source database.
-
(2006)
-
-
Strom, D.1
-
20
-
-
28244472718
-
The great wall syndrome
-
September/October, Retrieved June 30, 2007 from ProQuest ABI Inform Complete database
-
Thelander, M. (2005, September/October). The great wall syndrome, IT Professional, 7(5)25-30. Retrieved June 30, 2007 from ProQuest ABI Inform Complete database.
-
(2005)
IT Professional
, vol.7
, Issue.5
, pp. 25-30
-
-
Thelander, M.1
-
21
-
-
62949105131
-
-
Toto, G. (2007). Seven signs that it's time to automate and consolidate IT policy enforcement. BigFix, Inc. Retrieved July 1, 2007 from http://www.bigfix.com/resourcecenter/seven-signs.pdf
-
Toto, G. (2007). Seven signs that it's time to automate and consolidate IT policy enforcement. BigFix, Inc. Retrieved July 1, 2007 from http://www.bigfix.com/resourcecenter/seven-signs.pdf
-
-
-
-
22
-
-
62949196783
-
-
Usher, Abe (2005), Sharp ideas: podslurping. Sharp Ideas, Inc. Retrieved June 27, 2007 from http://www.sharp-ideas.net/pod-slurping.php
-
Usher, Abe (2005), Sharp ideas: podslurping. Sharp Ideas, Inc. Retrieved June 27, 2007 from http://www.sharp-ideas.net/pod-slurping.php
-
-
-
-
23
-
-
84869249379
-
USB memory sticks pose new dangers
-
September 25, Retrieved July 1, 2007 from
-
Vijayan, J. (2006, September 25), USB memory sticks pose new dangers. Computerworld. Retrieved July 1, 2007 from http://www.computerworld.com/ action/article.do?com.mand=view ArticleBasic&articleId=9003592
-
(2006)
Computerworld
-
-
Vijayan, J.1
-
24
-
-
84869260527
-
-
October 6, Retrieved June 27, 2007 from
-
Westin, K. (2006a, October 6). USB hacks: USB dumper. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/06/usb-dumper/
-
(2006)
USB hacks: USB dumper
-
-
Westin, K.1
-
25
-
-
84869260527
-
-
October 7, Retrieved June 27, 2007 from
-
Westin, K. (2006b, October 7). USB hacks: USB switchblade. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/07/usb-switchblade/
-
(2006)
USB hacks: USB switchblade
-
-
Westin, K.1
-
26
-
-
84869260527
-
-
October 7, Retrieved June 27, 2007 from
-
Westin, K. (2006c, October 7). USB hacks: USB hacksaw. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/07/usb-hacksaw/
-
(2006)
USB hacks: USB hacksaw
-
-
Westin, K.1
-
27
-
-
84869252703
-
-
October 5, Retrieved June 27, 2007 from
-
Westin, K. (2006d, October 5). USB hacks: Mitigation. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/05/how-to-disable-usb-and-cd-rom-on-a- windows-network-using-use-group-policy
-
(2006)
USB hacks: Mitigation
-
-
Westin, K.1
-
28
-
-
62949166887
-
-
Workplace data theft common in U.K. (2007, January). Information Management Journal. 18, Retrieved June 30, 2007, from MasterFILE Premier database.
-
Workplace data theft common in U.K. (2007, January). Information Management Journal. 18, Retrieved June 30, 2007, from MasterFILE Premier database.
-
-
-
-
29
-
-
84869241623
-
-
http://www.python.org
-
-
-
-
30
-
-
84869241726
-
-
http://www.senfocre.com
-
-
-
-
31
-
-
84869260733
-
-
http://www.hak5.org
-
-
-
-
32
-
-
84869241722
-
-
http://www.u3.com
-
-
-
-
33
-
-
84869260734
-
-
http://wiki.hak5.org/wiki/USB-Switchblade
-
-
-
-
34
-
-
84869241724
-
-
http://wiki.hak5.org/wiki/USB-Hacksaw
-
-
-
-
35
-
-
84869241620
-
-
http://insecure.org/nm.ap
-
-
-
-
36
-
-
84869251761
-
-
http://www.wireshark.org
-
-
-
-
37
-
-
84869241720
-
-
httos://foundstore.com/index.htm?subnav=resources/navigation. htm&subcontent=/resources/proddesc/superscan.htm
-
-
-
-
38
-
-
84869241721
-
-
http://www.portableapps.com
-
-
-
-
39
-
-
84869260732
-
-
http://www.pegtop.net/start
-
-
-
-
40
-
-
84869260731
-
-
available at
-
Episode 2×10, available at http://www.hak5.org/episodes/
-
Episode 2×10
-
-
-
41
-
-
84869241611
-
-
http://www.truecrypt.org/
-
-
-
-
42
-
-
84869251759
-
-
http://www.gtopala.com/
-
-
-
-
43
-
-
84869260727
-
-
http://www.baremetalsoft.com/baregrep
-
-
-
-
44
-
-
84869241612
-
-
www.knoppix.org
-
-
-
-
45
-
-
84869241613
-
-
http://www.remote-exploit.org/backtrack.html
-
-
-
-
46
-
-
84869241614
-
-
http://www.metasploit.com
-
-
-
-
47
-
-
84869241715
-
-
http://www.e-fense.com/helix
-
-
-
-
48
-
-
84869241718
-
-
http://www.devicewall.com.
-
-
-
|