Rodney Campbell's Blog

2007.03.12 Daily Security Reading

by on Mar.12, 2007, under Security

SubVirt: Implementing malware with virtual machines (pdf)

Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection.


DNS Security Basics

Your DNS is a sweet spot for hackers who want to compromise your network; learn to protect it.

One-third of security IT/security managers don’t secure their home machines

A survey of security and IT managers at the recent RSA conference shows that one-third don’t secure their home files or communications.


Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.