<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">
<head>

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<title>InfoSec Daily | Your daily source of Pwnage, Policy and Politics.</title>
<meta name="description" content="information security, Information security positions, security training, diagrams, exploit, outerz0ne 2011, truecrypt android, isdpodcast, software engineer, infosec daily, infosec, infosec daily podcast, isd podcast,health information privacy and security, stuxnet, penetration, stuxnet code information, smart phone, rick hayes"/>
<link rel="stylesheet" href="/wp-content/themes/TheSource/style.css" type="text/css" media="screen"/>
<link rel="alternate" type="application/rss+xml" title="InfoSec Daily RSS Feed" href="/feed"/>
<link rel="alternate" type="application/atom+xml" title="InfoSec Daily Atom Feed" href="/feed/atom"/>
<link rel="pingback" href="/xmlrpc.php"/>

<!--[if lt IE 7]>
	<link rel="stylesheet" type="text/css" href="/wp-content/themes/TheSource/css/ie6style.css" />
	<script type="text/javascript" src="/wp-content/themes/TheSource/js/DD_belatedPNG_0.0.8a-min.js"></script>
	<script type="text/javascript">DD_belatedPNG.fix('img#logo, #cat-nav-left, #cat-nav-right, #search-form, #cat-nav-content, div.top-overlay, .slide .description, div.overlay, a#prevlink, a#nextlink, .slide a.readmore, .slide a.readmore span, .recent-cat .entry .title, #recent-posts .entry p.date, .footer-widget ul li, #tabbed-area ul#tab_controls li span');</script>
<![endif]-->
<!--[if IE 7]>
	<link rel="stylesheet" type="text/css" href="/wp-content/themes/TheSource/css/ie7style.css" />
<![endif]-->
<!--[if IE 8]>
	<link rel="stylesheet" type="text/css" href="/wp-content/themes/TheSource/css/ie8style.css" />
<![endif]-->

<script type="text/javascript">
	document.documentElement.className = 'js';
</script>

<link rel="alternate" type="application/rss+xml" title="InfoSec Daily » Feed" href="/feed"/>
<link rel="alternate" type="application/rss+xml" title="InfoSec Daily » Comments Feed" href="/comments/feed"/>
<meta content="TheSource v.3.0" name="generator"/>	
	<style type="text/css">
		body { color: #; }
		#recent-posts a { color: #a47b60; }
		ul.nav li a { color: #a47b60; }
		ul.nav li.current_page_item a, ul.nav li a:hover, #cat-nav-content ul.nav li a:hover, #cat-nav-content ul.nav li.current-cat > a  { color: #fd8126; }
		h1, h2, h3, h4, h5, h6, h1 a, h2 a, h3 a, h4 a, h5 a, h6 a { color: #fd8126; }
		
		#sidebar a { color:#fd8126; }		
		p#copyright { color:# }
		#footer a, ul.bottom-nav li a { color:# }
	</style>

<link media="screen" type="text/css" href="/wp-content/themes/TheSource/epanel/page_templates/js/fancybox/jquery.fancybox-1.2.6.css" rel="stylesheet"/>
<link media="screen" type="text/css" href="/wp-content/themes/TheSource/epanel/page_templates/page_templates.css" rel="stylesheet"/><link rel="stylesheet" id="gce_styles-css" href="/wp-content/plugins/google-calendar-events/css/gce-style.cssver=3.3.1" type="text/css" media="all"/>
<link rel="stylesheet" id="sharedaddy-css" href="/wp-content/plugins/sharedaddy/sharing.cssver=3.3.1" type="text/css" media="all"/>
<link rel="stylesheet" id="shortcodesStyleSheets-css" href="/wp-content/themes/TheSource/epanel/shortcodes/shortcodes.cssver=3.3.1" type="text/css" media="all"/>
<link rel="stylesheet" id="podpress_frontend_styles-css" href="/wp-content/plugins/podpress/podpress.cssver=3.3.1" type="text/css" media="all"/>
<script type="text/javascript">
//<![CDATA[
var podpressL10 = {
	openblogagain : 'back to:',
	theblog : 'the blog',
	close : 'close',
	playbutton : 'Play &gt;'
}
//]]>
</script>
<script type="text/javascript" src="/wp-content/plugins/podpress/players/1pixelout/1pixelout_audio-player.js"></script>
<script type="text/javascript">//<![CDATA[
	var podPressPlayerFile = "1pixelout_player.swf";
	var podPressPopupPlayerOpt = new Object();
	podPressPopupPlayerOpt["lefticon"] = "333333";
	podPressPopupPlayerOpt["leftbg"] = "CCCCCC";
	podPressPopupPlayerOpt["volslider"] = "666666";
	podPressPopupPlayerOpt["voltrack"] = "FFFFFF";
	podPressPopupPlayerOpt["text"] = "333333";
	podPressPopupPlayerOpt["tracker"] = "DDDDDD";
	podPressPopupPlayerOpt["slider"] = "666666";
	podPressPopupPlayerOpt["loader"] = "009900";
	podPressPopupPlayerOpt["track"] = "FFFFFF";
	podPressPopupPlayerOpt["border"] = "CCCCCC";
	podPressPopupPlayerOpt["bg"] = "E5E5E5";
	podPressPopupPlayerOpt["skip"] = "666666";
	podPressPopupPlayerOpt["righticon"] = "333333";
	podPressPopupPlayerOpt["righticonhover"] = "FFFFFF";
	podPressPopupPlayerOpt["rightbg"] = "B4B4B4";
	podPressPopupPlayerOpt["rightbghover"] = "999999";
	podPressPopupPlayerOpt["initialvolume"] = "70";
	podPressPopupPlayerOpt["buffer"] = "5";
	podPressPopupPlayerOpt["checkpolicy"] = "no";
	podpressAudioPlayer.setup("/wp-content/plugins/podpress/players/1pixelout/" + podPressPlayerFile, {lefticon:"333333", leftbg:"CCCCCC", volslider:"666666", voltrack:"FFFFFF", text:"333333", tracker:"DDDDDD", slider:"666666", loader:"009900", track:"FFFFFF", border:"CCCCCC", bg:"E5E5E5", skip:"666666", righticon:"333333", righticonhover:"FFFFFF", rightbg:"B4B4B4", rightbghover:"999999", initialvolume:"70", buffer:"5", checkpolicy:"no",  pagebg:"FFFFFF", transparentpagebg:"yes", encode: "no"} );
//]]></script>
<script type="text/javascript">//<![CDATA[
var podPressBlogURL = "/";
var podPressBackendURL = "/wp-content/plugins/podpress/";
var podPressDefaultPreviewImage = "/wp-content/plugins/podpress/images/vpreview_center.png";
var podPressMP3PlayerWrapper = false;
var podPress_cortado_signed = false;
var podPressOverwriteTitleandArtist = false;
var podPressHTML5 = true;
var podPressHTML5sec = "bb8a68c93a";
var podPressHTML5_showplayersdirectly = false;
var podPressText_PlayNow = "Play Now";
var podPressText_HidePlayer = "Hide Player";
//]]></script>
<script type="text/javascript" src="/wp-includes/js/jquery/jquery.jsver=1.7.1"></script>
<script type="text/javascript" src="/wp-content/plugins/google-calendar-events/js/jquery-qtip.js"></script>
<script type="text/javascript">
/* <![CDATA[ */
var GoogleCalendarEvents = {"ajaxurl":"http:\/\/\/web\/20120301142528\/http:\/\/www.isdpodcast.com\/wp-admin\/admin-ajax.php","loading":"Loading..."};
/* ]]> */
</script>
<script type="text/javascript" src="/wp-content/plugins/google-calendar-events/js/gce-script.js"></script>
<script type="text/javascript" src="/wp-content/plugins/podpress/js/podpress.jsver=3.3.1"></script>
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="/xmlrpc.php?rsd"/>
<link rel="wlwmanifest" type="application/wlwmanifest+xml" href="/wp-includes/wlwmanifest.xml"/> 
<meta name="generator" content="WordPress 3.3.1"/>
<script type="text/javascript" src="/wp-content/plugins/powerpress/player.js"></script>
<script type="text/javascript"><!--
function powerpress_pinw(pinw){window.open('/?powerpress_pinw='+pinw, 'PowerPressPlayer','toolbar=0,status=0,resizable=1,width=460,height=320');	return false;}
powerpress_url = '/wp-content/plugins/powerpress/';
//-->
</script>
	<script type="text/javascript">
	// <![CDATA[
	
		<!---- et_switcher plugin v2 ---->
		(function($)
		{
			$.fn.et_shortcodes_switcher = function(options)
			{
				var defaults =
				{
				   slides: '>div',
				   activeClass: 'active',
				   linksNav: '',
				   findParent: true, //use parent elements to define active states
				   lengthElement: 'li', //parent element, used only if findParent is set to true
				   useArrows: false,
				   arrowLeft: 'a#prev-arrow',
				   arrowRight: 'a#next-arrow',
				   auto: false,
				   autoSpeed: 5000,
				   slidePadding: '',
				   pauseOnHover: true,
				   fx: 'fade',
				   sliderType: ''
				};

				var options = $.extend(defaults, options);

				return this.each(function()
				{
									
					var slidesContainer = jQuery(this).parent().css('position','relative'),
						$slides = jQuery(this).css({'overflow':'hidden','position':'relative'}),
						$slide = $slides.find(options.slides).css({'opacity':'1','position':'absolute','top':'0px','left':'0px','display':'none'}),
						slidesNum = $slide.length,
						zIndex = slidesNum,
						currentPosition = 1,
						slideHeight = 0,
						$activeSlide,
						$nextSlide;
					
					if (options.fx === 'slide') {
						$slide.css({'opacity':'0','position':'absolute','top':'0px','left':'0px','display':'block'});
					} else {
						$slide.filter(':first').css({'display':'block'});
					}
					
					if (options.slidePadding != '') $slide.css('padding',options.slidePadding);
					
					$slide.each(function(){
						jQuery(this).css('z-index',zIndex).addClass('clearfix');
						if (options.fx === 'slide') zIndex--;
						
						slideH = jQuery(this).innerHeight();
						if (slideH > slideHeight) slideHeight = slideH;
					});
					$slides.css('height', slideHeight);
					$slides.css('width', $slides.width());
									
					var slideWidth = $slide.width(),
						slideOuterWidth = $slide.outerWidth();
					
					$slide.css('width',slideWidth);
					
					$slide.filter(':first').css('opacity','1');
					
					if (options.sliderType != '') {
						if (options.sliderType === 'images') {
							controllersHtml = '<div class="controllers-wrapper"><div class="controllers"><a href="#" class="left-arrow">Previous</a>';
							for ($i=1; $i<=slidesNum; $i++) {
								controllersHtml += '<a class="switch" href="#">'+$i+'</a>';
							}
							controllersHtml += '<a href="#" class="right-arrow">Next</a></div><div class="controllers-right"></div></div>';		
							$controllersWrap = jQuery(controllersHtml).prependTo($slides.parent());
							jQuery('.controllers-wrapper .controllers').css('width', 65 + 18*slidesNum);
						}
						
						var etimage_width = $slide.width();
			
						slidesContainer.css({'width':etimage_width});
						$slides.css({'width':etimage_width});
						
						if (options.sliderType === 'images') {
							slidesContainer.css({'height':$slide.height()});
							$slides.css({'height':$slide.height()});
							
							var controllers_width = $controllersWrap.width(),
							leftPosition = Math.round((etimage_width - controllers_width) / 2);
						
							$controllersWrap.css({left: leftPosition});
						}	
					}
					
					
					if (options.linksNav != '') {
						var linkSwitcher = jQuery(options.linksNav);
						
						var linkSwitcherTab = '';
						if (options.findParent) linkSwitcherTab = linkSwitcher.parent();
						else linkSwitcherTab = linkSwitcher;
						
						if (!linkSwitcherTab.filter('.active').length) linkSwitcherTab.filter(':first').addClass('active');
										
						linkSwitcher.click(function(){
							
							var targetElement;

							if (options.findParent) targetElement = jQuery(this).parent();
							else targetElement = jQuery(this);
							
							var orderNum = targetElement.prevAll(options.lengthElement).length+1;
							
							if (orderNum > currentPosition) gotoSlide(orderNum, 1);
							else gotoSlide(orderNum, -1); 
							
							return false;
						});
					}
					
					
					if (options.useArrows) {
						var $right_arrow = jQuery(options.arrowRight),
							$left_arrow = jQuery(options.arrowLeft);
											
						$right_arrow.click(function(){				
							if (currentPosition === slidesNum) 
								gotoSlide(1,1);
							else 
								gotoSlide(currentPosition+1),1;
							
							if (options.linksNav != '') changeTab();
													
							return false;
						});
						
						$left_arrow.click(function(){
							if (currentPosition === 1)
								gotoSlide(slidesNum,-1);
							else 
								gotoSlide(currentPosition-1,-1);
							
							if (options.linksNav != '') changeTab();
							
							return false;
						});
						
					}
					
									
					function changeTab(){
						if (linkSwitcherTab != '') { 
							linkSwitcherTab.siblings().removeClass('active');
							linkSwitcherTab.filter(':eq('+(currentPosition-1)+')').addClass('active');
						}
					}
					
					function gotoSlide(slideNumber,dir){
						if ($slide.filter(':animated').length) return;
					
						$slide.css('opacity','0');
																			
						$activeSlide = $slide.filter(':eq('+(currentPosition-1)+')').css('opacity','1');
										
						if (currentPosition === slideNumber) return;
										
						$nextSlide = $slide.filter(':eq('+(slideNumber-1)+')').css('opacity','1');
										
						if ((currentPosition > slideNumber || currentPosition === 1) && (dir === -1)) {
							if (options.fx === 'slide') slideBack(500);
							if (options.fx === 'fade') slideFade(500);
						} else {
							if (options.fx === 'slide') slideForward(500);
							if (options.fx === 'fade') slideFade(500);
						}
						
						currentPosition = $nextSlide.prevAll().length + 1;
						
						if (options.linksNav != '') changeTab();
						
						if (typeof interval != 'undefined' && options.auto) {
							clearInterval(interval);
							auto_rotate();
						}
											
						return false;
					}
					
					
					if (options.auto) {
						auto_rotate();
						var pauseSlider = false;
					}
					
					if (options.pauseOnHover) { 				
						slidesContainer.hover(function(){
							pauseSlider = true;
						},function(){
							pauseSlider = false;
						});
					}
					
					function auto_rotate(){
						
						interval = setInterval(function(){
							if (!pauseSlider) { 
								if (currentPosition === slidesNum) 
									gotoSlide(1,1);
								else 
									gotoSlide(currentPosition+1),1;
								
								if (options.linksNav != '') changeTab();
							}
						},options.autoSpeed);
						
					}
					
					function slideForward(speed){
						$nextSlide.css('left',slideOuterWidth+'px');
						$activeSlide.animate({left: '-'+slideOuterWidth},speed);
						$nextSlide.animate({left: 0},speed);
					}
					
					function slideBack(speed){
						$nextSlide.css('left','-'+slideOuterWidth+'px');
						$activeSlide.animate({left: slideOuterWidth},speed);
						$nextSlide.animate({left: 0},speed);
					}
					
					function slideFade(speed){					
						$activeSlide.css({zIndex: slidesNum}).fadeOut(700);
						$nextSlide.css({zIndex: (slidesNum+1)}).fadeIn(700);
					}
					
				});
			} 
		})(jQuery);
		<!---- end et_switcher plugin v2 ---->
		
		/////// Shortcodes Javascript ///////
		
		/// tooltip ///
		
		$et_tooltip = jQuery('.et-tooltip');
		
		$et_tooltip.live('mouseover mouseout', function(event){
			if (event.type == 'mouseover') {
				jQuery(this).find('.et-tooltip-box').animate({ opacity: 'show', bottom: '25px' }, 300);
			} else {
				jQuery(this).find('.et-tooltip-box').animate({ opacity: 'hide', bottom: '35px' }, 300);
			}
		});
		
		/// learn more ///
		
		$et_learn_more = jQuery('.et-learn-more .heading-more');
		
		$et_learn_more.live('click', function() {
			if ( jQuery(this).hasClass('open') ) 
				jQuery(this).removeClass('open');
			else 
				jQuery(this).addClass('open');
				
			jQuery(this).parent('.et-learn-more').find('.learn-more-content').animate({ opacity: 'toggle', height: 'toggle' }, 300);
		});
	
	// ]]>
	</script>
<link rel="shortcut icon" href="/wp-content/uploads/2011/02/infoSec-Daily-small1-300x157.png"/>
<meta name="description" content="Information Security Daily Podcast with hosted by Rick Hayes with Keith Pachulski, Adrian Crenshaw, Dave Shackleford, Scott Moulton, Varun Sharma, Karthik Rangarajan and Geordy Rostad. Your daily source of Pwnage, Policy and Politics."/>
<meta name="keywords" content="Information Security, Hacking, Vulnerabilities, InfoSec, Exploits, Security, Pwnage,ISD Podcast, Rick Hayes, Keith Pachulski, Adrian Crenshaw, Dave Shackleford, Scott Moulton, Varun Sharma, Karthik Rangarajan, Geordy Rostad, Pwnage, Policy, Politics, politics, Exotic Liability, Chris Nickerson, indi303, IronGeek, Iron Geek, Ian Amit, iamit, forensics, incident response,CISO, CSO, Twitter , information security, Information security positions, security training, diagrams, exploit, outerz0ne 2011, truecrypt android, isdpodcast, software engineer, infosec daily, infosec, infosec daily podcast, isd podcast,health information privacy and security, stuxnet, penetration, stuxnet code information, smart phone, rick hayes"/>
	<style type="text/css">
		#et_pt_portfolio_gallery { margin-left: 2px; }
		.et_pt_portfolio_item { margin-left: 11px; }
		.et_portfolio_small { margin-left: -14px !important; }
		.et_portfolio_small .et_pt_portfolio_item { margin-left: 22px !important; }
		.et_portfolio_large { margin-left: -12px !important; }
		.et_portfolio_large .et_pt_portfolio_item { margin-left: 13px !important; }
	</style>

</head>
<body id="home" class="home blog unknown">
 
	<div id="header-top" class="clearfix">
		<div class="container clearfix">
			<!-- Start Logo -->			
						
			<a href="/">
								<img src="/wp-content/themes/TheSource/images/logo.png" alt="Logo" id="logo"/>
			</a>
			<p id="slogan">Your daily source of Pwnage, Policy and Politics.</p>
			<!-- End Logo -->
			
			<!-- Start Page-menu -->
			<div id="page-menu">
				<div id="p-menu-left"> </div>
				<div id="p-menu-content">
				
					<ul class="nav clearfix"> 
			<li class="current_page_item"><a href="/">Home</a></li>
		<li class="page_item page-item-3142"><a href="/caption-contest">Caption Contest</a></li>
<li class="page_item page-item-2"><a href="/about">Podcast Crew</a>
<ul class="children">
	<li class="page_item page-item-900"><a href="/about/matthew-m-shoemaker-1973-2010">Matthew M. Shoemaker (1973-2010)</a></li>
</ul>
</li>
<li class="page_item page-item-1167"><a href="/resources">Resources</a>
<ul class="children">
	<li class="page_item page-item-2027"><a href="/resources/62k-common-passwords">62K Common Passwords</a></li>
	<li class="page_item page-item-2921"><a href="/resources/av-vendors">AV Vendors</a></li>
	<li class="page_item page-item-2039"><a href="/resources/ipv6-resources">IPv6 Resources</a></li>
	<li class="page_item page-item-1560"><a href="/resources/security-interview-questions">Security Interview Questions</a></li>
	<li class="page_item page-item-1152"><a href="/resources/training">Training</a>
	<ul class="children">
		<li class="page_item page-item-1666"><a href="/resources/training/anti-forensics">Anti-Forensics with TimeStomp</a></li>
		<li class="page_item page-item-2128"><a href="/resources/training/javascript-injection">JavaScript Injection</a></li>
	</ul>
</li>
	<li class="page_item page-item-1264"><a href="/resources/upv">Ultimate Pentesting VM</a></li>
	<li class="page_item page-item-3094"><a href="/resources/mallory-mitm-proxy-for-application-and-device-testing">Using Mallory and airbase-ng to MiTM Mobile Applications</a></li>
</ul>
</li>
<li class="page_item page-item-1530"><a href="http://www.cafepress.com/isdpodcast" target="_blank">Store</a></li>
</ul>				
				</div>	
				<div id="p-menu-right"> </div>
			</div>	<!-- end #page-menu -->	
			<!-- End Page-menu -->	
			
			<div id="cat-nav" class="clearfix">	
				<div id="cat-nav-left"> </div>
				<div id="cat-nav-content"> 
					
					<ul class="superfish nav clearfix">	<li class="cat-item cat-item-36"><a href="/category/contact-us" title="View all posts filed under Contact Us!">Contact Us!</a>
</li>
	<li class="cat-item cat-item-35"><a href="/category/webchat" title="View all posts filed under IRC">IRC</a>
</li>
	<li class="cat-item cat-item-32"><a href="/category/live-stream" title="View all posts filed under Live! Stream">Live! Stream</a>
</li>
</ul>
					<!-- Start Searchbox -->
					<div id="search-form">
						<form method="get" id="searchform1" action="/">
							<input type="text" value="search..." name="s" id="searchinput"/>
		
							<input type="image" src="wp-content/themes/TheSource/images/search_btn.png" id="searchsubmit"/>
						</form>
					</div>
				<!-- End Searchbox -->	
				</div> <!-- end #cat-nav-content -->
				<div id="cat-nav-right"> </div>
			</div>	<!-- end #cat-nav -->	
		</div> 	<!-- end .container -->
	</div> 	<!-- end #header-top -->
	
	
	
	<!-- Start Featured -->	
<div id="featured">

			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/crew-1400x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/about">Podcast Crew</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Nov 9, 2009</p>
					<p>The ISDpodcast Team is a pretty eclectic group of highly opinionated security practitioners. We try to bring you insightful comment on the latest InfoSec news, politics and vulnerabilities that are impacting the community.
&nbsp;











Rick Hayes is a Sr. Principal Security...</p>
					<a href="/about" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/training-1024x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources/training">Training</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Nov 6, 2010</p>
					<p>This is the repository of ISD Podcast Training material. &nbsp;Unless otherwise stated, all material provided here is free to use or incorporate with your own material. All work is licensed under a Creative Commons Attribution 3.0 Unported License.
Presentations: (PPT versions available...</p>
					<a href="/resources/training" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/Dragon-Ying-Yang-1400x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources/upv">Ultimate Pentesting VM</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Nov 24, 2010</p>
					<p>Setting up the ultimate penetration or security distribution has obviously been made significantly easier with the advent of BackTrack.&nbsp; While I regularly use BackTrack on engagements, I do make some changes that I find makes my life easier.&nbsp; This is began as a set of steps that...</p>
					<a href="/resources/upv" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/interview-1400x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources/security-interview-questions">Security Interview Questions</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Jan 22, 2011</p>
					<p>We&#39;ve collected and composed a series of potential interview questions and answers. &nbsp;These can be used by HR/Managers to gauge the level of knowledge required for a security related position. &nbsp; While most of the questions do not have right or wrong answers, they can be used...</p>
					<a href="/resources/security-interview-questions" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/store-636x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="http://www.cafepress.com/isdpodcast">Store</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Jan 13, 2011</p>
					<p></p>
					<a href="http://www.cafepress.com/isdpodcast" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/passwords-1280x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources/62k-common-passwords">62K Common Passwords</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Mar 24, 2011</p>
					<p>As part of any penetration test, you will at some point want to try common passwords to brute-force an account or access. &nbsp; As a general rule, we&#39;ve always recommended the 500 worst passwords list as a starting point.&nbsp; Unfortunately, we wanted to test more than just a few...</p>
					<a href="/resources/62k-common-passwords" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/ipv6-1024x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources/ipv6-resources">IPv6 Resources</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Mar 28, 2011</p>
					<p>IPv6 Denial of Service (DoS) Tool. &nbsp;http://isdpodcast.com/files/single_ra.tar.gz. &nbsp;Uses THC IPV6 ATTACK TOOLKIT, to generate single Router Advertisement (RA) messages with different source addresses. &nbsp;Rather than flood the network as with flood_router6, it allows you to...</p>
					<a href="/resources/ipv6-resources" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
				
		<div class="slide" style="background: #ffffff url('/wp-content/themes/TheSource/images/resources-1200x300.jpg') top center no-repeat;">
			<div class="container clearfix">
				<div class="description">
					<h2 class="title"><a href="/resources">Resources</a></h2>
					<p class="tagline">Posted by <a href="/author/rick-hayes" title="Posts by rick.hayes" rel="author">rick.hayes</a> on Nov 7, 2010</p>
					<p>This section is dedicated to increasing security resources available to the community. &nbsp;It includes samples of Reports, Policies, Procedures and Plans that can be used as templates for your own needs.
Sample Reports
Penetration Test Final Report
Sample Policies
Currently Under...</p>
					<a href="/resources" class="readmore"><span>Read More</span></a>
				</div> <!-- end .description -->			
			</div> 	<!-- end .container -->	
			
			<div class="top-overlay"></div>
			<div class="overlay"></div>
			
		</div> <!-- end .slide -->
		
			
</div> <!-- end #featured -->
<!-- End Featured -->


<div id="featured-control">
	<div class="container">
		<a id="prevlink" href="#">Previous</a>
		<a id="nextlink" href="#">Next</a>
	</div>
</div> <!-- end #featured-control -->	
	<div id="content">
				<div class="container">

<div id="main-content-wrap">
	<div id="main-content" class="clearfix">
		<div id="recent-posts" class="clearfix">
			<h4 class="title">Recent Posts</h4>
			
										
<div class="entry clearfix">
	<h2 class="title"><a href="/episode-607-pentest-lessons-live-from-rsa-and-no-decrypt-for-you">Episode 607 &#8211; Pentest Lessons, Live from RSA, and “No Decrypt for you”</a></h2>
	
	<div class="entry-content clearfix">
				
		<div class="podPress_content podPress_content_audio_mp3">
<div class="podpress_playerspace podpress_playerspace_audio_mp3 podpress_mp3player" style="display:block;"><div id="podPressPlayerSpace_1"><!-- podPress --></div></div>
<div class="podPress_downloadlinks podPress_downloadlinks_audio_mp3"><a href="/podpress_trac0/infosec-daily-podcast-episode-607.mp3" target="new" title="Download: InfoSec Daily Podcast Episode 607" class="podpress_downloadimglink podpress_downloadimglink_audio_mp3"><img src="/wp-content/plugins/podpress/images/audio_mp3_button.png" class="podPress_imgicon podpress_imgicon_audio_mp3" alt=""/></a> <span class="podpress_mediafile_title podpress_mediafile_title_audio_mp3">InfoSec Daily Podcast Episode 607</span> <span class="podpress_mediafile_dursize podpress_mediafile_dursize_audio_mp3">[ 42:14 | 19.36 MB ]</span> <a href="#podPressPlayerSpace_1" class="podpress_playlink podpress_playlink_audio_mp3" onclick="javascript:podPressShowHidePlayer('1', '/podpress_trac/play/3566/0/infosec-daily-podcast-episode-607.mp3', 290, 24, 'false', '/wp-content/plugins/podpress/images/vpreview_center.png', 'InfoSec Daily Podcast Episode 607', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.'); return false;"><span id="podPressPlayerSpace_1_PlayLink" class="podPress_playerspace_playlink">Play Now</span></a><input type="hidden" id="podPressPlayerSpace_1_OrigURL" value="/podcasts/infosec-daily-podcast-episode-607.mp3"/> | <a href="#podPressPlayerSpace_1" class="podpress_playinpopup podpress_playinpopup_audio_mp3" onclick="javascript:podPressPopupPlayer('1', '/podpress_trac/play/3566/0/infosec-daily-podcast-episode-607.mp3', 290, 24, 'InfoSec Daily', '3566', 'InfoSec Daily Podcast Episode 607', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.'); return false;">Play in Popup</a> | <a href="/podpress_trac0/infosec-daily-podcast-episode-607.mp3" target="new" class="podpress_downloadlink podpress_downloadlink_audio_mp3">Download</a> (31)</div></div>
<script type="text/javascript">podPressShowHidePlayer('1', '/podpress_trac/play/3566/0/infosec-daily-podcast-episode-607.mp3', 290, 24, 'false', '/wp-content/plugins/podpress/images/vpreview_center.png', 'InfoSec Daily Podcast Episode 607', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.');</script><p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">InfoSec Daily Podcast Episode 607 for February 29, 2012. &nbsp;Tonight&#39;s podcast is hosted by Rick Hayes, Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.</span><br/>
	&nbsp;</p>
<p dir="ltr" style="margin-right: 5pt; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Announcements:</span></p>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Social Engineering Training</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: March 5-9, 2012<br class="kix-line-break"/><br/>
	Where: Seattle, Washington</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 21-24, 2012<br class="kix-line-break"/><br/>
	Where: Black Hat Vegas</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: August 20-24, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: &nbsp;Bristol, UK</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: &nbsp;November 12-16, 2012<br class="kix-line-break"/><br/>
	Where: &nbsp;Columbia, MD </span><br/>
	<a href="http://www.social-engineer.com/social-engineer-training"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.social-engineer.com/social-engineer-training</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">InfoSec Southwest</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: March 30-April 1</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Austin, TX</span><br/>
	<a href="http://www.infosecsouthwest.com/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.Infosecsouthwest.com</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Linuxfest Northwest 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: Saturday, April 28th-29th, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Bellingham Technical College &#8211; Bellingham, WA</span><br/>
	<a href="http://www.linuxfestnorthwest.org/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.linuxfestnorthwest.org/</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP now open!</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">AIDE 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: May 21-25, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: MU Forensic Science Center</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Huntington, West Virginia </span><br/>
	<a href="http://aide.marshall.edu/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://aide.marshall.edu</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">LayerOne 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: May 26-27, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Clarion Hotel &#8211; Anaheim, CA</span><br/>
	<a href="http://www.layerone.org/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.layerone.org</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP now open!</span><br/>
	&nbsp;</p>
<h5 dir="ltr"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Security 504: Hacker Techniques, Exploits &amp; Incident Handling &#8211; Matt Romanek</span></h5>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: June 20 &#8211; 27, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Courtyard Seattle Federal Way, WA</span><a href="http://www.sans.org/mentor/details.php?nid=28014"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.sans.org/mentor/details.php?nid=28014</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Inside and Out of the Social-Engineer Toolkit (SET)</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 21 &#8211; 22, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 23 &#8211; 24, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Black Hat Vegas</span><br/>
	<a href="http://blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_social_engineer_toolkit.html"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_social_engineer_toolkit.html</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Defcon 20</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 26-29, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Rio Hotel and Casino &#8211; Las Vegas, NV</span><br/>
	<a href="https://defcon.org/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://defcon.org/</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP &amp; Room reservations now open!</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">DerbyCon 2012 &#8211; The &ldquo;Deuce&rdquo; Reunion</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: &nbsp;September 27-30, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Louisville, KY</span><br/>
	<a href="http://www.derbycon.com/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.derbycon.com</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Thanks to everyone that has purchased products from Amazon through the affiliate program. &nbsp;If you&rsquo;re not familiar with the affiliate program, simply go to</span><a href="/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;"></span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> and locate the Affiliate Program link on the right hand side.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><div class="awshortcode-carrousel align&amp;quot;right&amp;quot;"><object type="application/x-shockwave-flash" data="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822%2FUS%2Finfdaipod-20%2F8010%2Fea25e3ef-5027-40e4-a56f-ad6cfcd06cb3&amp;Operation=GetDisplayTemplate" width="600" height="200"><param name="movie" value="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822%2FUS%2Finfdaipod-20%2F8010%2Fea25e3ef-5027-40e4-a56f-ad6cfcd06cb3&amp;Operation=GetDisplayTemplate"/><param name="bgcolor" value="#fff"/><param name="quality" value="high"/><param name="allowscriptaccess" value="always"/><param name="wmode" value="transparent"/><p>You don't have a sufficient version of Flash Player to display this animation.</p></object></div></span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Pentest Lessons:</span></p>
<ol>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">During a pentest, if you upload a web shell to a website, at least password protect it so someone else does not make use of it too. <img src="/wp-includes/images/smilies/icon_wink.gif" alt=";-)" class="wp-smiley"/> </span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">If you tell the customer you will have their report on a particular date, then you better make every effort to make that deadline!</span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">After a pentest, make sure you clean up after yourself (i.e. do not leave the systems worse than you found them). </span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Popping a server with the same account as the one you previously created, the year before, is probably more than just cheating.</span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">If you IP is included in the assessment scope (internal NVA/PT), make sure to remove any findings from the report that relate to your box.</span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When performing a pentest, make sure that the box you are targeting is not your box (or a VM on your box).</span></li>
<li style="list-style-type:decimal;font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Always back up your pentest/assessment data. You never know when the hard-drive in your system will decide to die!</span></li>
</ol>
<p>
	&nbsp;</p>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Stories</span><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.wired.com/threatlevel/2012/02/laptop-decryption-unconstitutional/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.wired.com/threatlevel/2012/02/laptop-decryption-unconstitutional/</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Forcing a criminal suspect to decrypt hard drives so their contents can be used by prosecutors is a breach of the Fifth Amendment right against compelled self-incrimination, a federal appeals court ruled Thursday.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">It was the nation&rsquo;s first appellate court to</span><a href="https://www.eff.org/document/opinion"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">issue such a finding</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">. And the outcome comes a day after a different federal appeals court refused to entertain an appeal from another defendant ordered by a lower federal court to decrypt a hard drive by month&rsquo;s end.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Thursday&rsquo;s decision by the 11th U.S. Circuit Court of Appeals said that an encrypted hard drive is akin to a combination to a safe, and is off limits, because compelling the unlocking of either of them is the equivalent of forcing testimony.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The case at hand concerns an unidentified &ldquo;Doe&rdquo; defendant believed to be in possession of child pornography on 5 terabytes of data on several drives and laptops seized in a California motel with valid court warrants.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The Atlanta-based circuit held:</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">First, the decryption and production of the hard drives would require the use of the contents of Doe&rsquo;s mind and could not be fairly characterized to a physical act that would be non-testimonial in nature. We conclude that the decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control and access to the encrypted portions of the drives; and of his capability to decrypt the files.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The court added: &ldquo;Requiring Does to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind, and the production is accompanied by the implied factual statements noted above that could prove to be incriminatory.&rdquo;</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span></p>
		
	</div> <!-- end .entry-content -->
	
	<div class="post-meta clearfix">
					<p class="meta-info">Posted   | <a href="/episode-607-pentest-lessons-live-from-rsa-and-no-decrypt-for-you#respond" title="Comment on Episode 607 – Pentest Lessons, Live from RSA, and “No Decrypt for you”">0 comments</a></p>
			
		<a href="/episode-607-pentest-lessons-live-from-rsa-and-no-decrypt-for-you" class="readmore"><span>Read More</span></a>
	</div>
</div> <!-- end .entry -->							
<div class="entry clearfix">
	<h2 class="title"><a href="/episode-606-45-days-riskiest-online-cities-postgresql-s-2105-and-noris">Episode 606 &#8211; 45 Days, Riskiest Online Cities, PostgreSQL, S. 2105, and NORIS</a></h2>
	
	<div class="entry-content clearfix">
				
		<div class="podPress_content podPress_content_audio_mp3">
<div class="podpress_playerspace podpress_playerspace_audio_mp3 podpress_mp3player" style="display:block;"><div id="podPressPlayerSpace_2"><!-- podPress --></div></div>
<div class="podPress_downloadlinks podPress_downloadlinks_audio_mp3"><a href="/podpress_trac0/infosec-daily-podcast-episode-606.mp3" target="new" title="Download: InfoSec Daily Podcast Episode 606" class="podpress_downloadimglink podpress_downloadimglink_audio_mp3"><img src="/wp-content/plugins/podpress/images/audio_mp3_button.png" class="podPress_imgicon podpress_imgicon_audio_mp3" alt=""/></a> <span class="podpress_mediafile_title podpress_mediafile_title_audio_mp3">InfoSec Daily Podcast Episode 606</span> <span class="podpress_mediafile_dursize podpress_mediafile_dursize_audio_mp3">[ 31:56 | 14.79 MB ]</span> <a href="#podPressPlayerSpace_2" class="podpress_playlink podpress_playlink_audio_mp3" onclick="javascript:podPressShowHidePlayer('2', '/podpress_trac/play/3562/0/infosec-daily-podcast-episode-606.mp3', 290, 24, 'false', '/wp-content/plugins/podpress/images/vpreview_center.png', 'InfoSec Daily Podcast Episode 606', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.'); return false;"><span id="podPressPlayerSpace_2_PlayLink" class="podPress_playerspace_playlink">Play Now</span></a><input type="hidden" id="podPressPlayerSpace_2_OrigURL" value="/podcasts/infosec-daily-podcast-episode-606.mp3"/> | <a href="#podPressPlayerSpace_2" class="podpress_playinpopup podpress_playinpopup_audio_mp3" onclick="javascript:podPressPopupPlayer('2', '/podpress_trac/play/3562/0/infosec-daily-podcast-episode-606.mp3', 290, 24, 'InfoSec Daily', '3562', 'InfoSec Daily Podcast Episode 606', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.'); return false;">Play in Popup</a> | <a href="/podpress_trac0/infosec-daily-podcast-episode-606.mp3" target="new" class="podpress_downloadlink podpress_downloadlink_audio_mp3">Download</a> (63)</div></div>
<script type="text/javascript">podPressShowHidePlayer('2', '/podpress_trac/play/3562/0/infosec-daily-podcast-episode-606.mp3', 290, 24, 'false', '/wp-content/plugins/podpress/images/vpreview_center.png', 'InfoSec Daily Podcast Episode 606', 'Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Themson Mester, Dr. Bonez, and Varun Sharma.');</script><p>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">InfoSec Daily Podcast Episode 606 for February 28, 2012. &nbsp;Tonight&#39;s podcast is hosted by Rick Hayes, Themson Mester, and Varun Sharma.</span><br/>
	&nbsp;</p>
<p dir="ltr" style="margin-right: 5pt; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Announcements:</span></p>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Social Engineering Training</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: March 5-9, 2012<br class="kix-line-break"/><br/>
	Where: Seattle, Washington</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 21-24, 2012<br class="kix-line-break"/><br/>
	Where: Black Hat Vegas</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: August 20-24, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: &nbsp;Bristol, UK</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: &nbsp;November 12-16, 2012<br class="kix-line-break"/><br/>
	Where: &nbsp;Columbia, MD </span><br/>
	<a href="http://www.social-engineer.com/social-engineer-training"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.social-engineer.com/social-engineer-training</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">InfoSec Southwest</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: March 30-April 1</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Austin, TX</span><br/>
	<a href="http://www.infosecsouthwest.com/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.Infosecsouthwest.com</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Linuxfest Northwest 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: Saturday, April 28th-29th, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Bellingham Technical College &#8211; Bellingham, WA</span><br/>
	<a href="http://www.linuxfestnorthwest.org/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.linuxfestnorthwest.org/</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP now open!</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">AIDE 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: May 21-25, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: MU Forensic Science Center</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Huntington, West Virginia </span><br/>
	<a href="http://aide.marshall.edu/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://aide.marshall.edu</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">LayerOne 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: May 26-27, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Clarion Hotel &#8211; Anaheim, CA</span><br/>
	<a href="http://www.layerone.org/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.layerone.org</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP now open!</span><br/>
	&nbsp;</p>
<h5 dir="ltr"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Security 504: Hacker Techniques, Exploits &amp; Incident Handling &#8211; Matt Romanek</span></h5>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: June 20 &#8211; 27, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Courtyard Seattle Federal Way, WA</span><a href="http://www.sans.org/mentor/details.php?nid=28014"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.sans.org/mentor/details.php?nid=28014</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Inside and Out of the Social-Engineer Toolkit (SET)</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 21 &#8211; 22, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 23 &#8211; 24, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Black Hat Vegas</span><br/>
	<a href="http://blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_social_engineer_toolkit.html"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_social_engineer_toolkit.html</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Defcon 20</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: July 26-29, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Rio Hotel and Casino &#8211; Las Vegas, NV</span><br/>
	<a href="https://defcon.org/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://defcon.org/</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">CFP &amp; Room reservations now open!</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">DerbyCon 2012 &#8211; The &ldquo;Deuce&rdquo; Reunion</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When: &nbsp;September 27-30, 2012</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Where: Louisville, KY</span><br/>
	<a href="http://www.derbycon.com/"><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.derbycon.com</span></a></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Thanks to everyone that has purchased products from Amazon through the affiliate program. &nbsp;If you&rsquo;re not familiar with the affiliate program, simply go to</span><a href="/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#000099;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;"></span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> and locate the Affiliate Program link on the right hand side.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"><div class="awshortcode-carrousel align&amp;quot;right&amp;quot;"><object type="application/x-shockwave-flash" data="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822%2FUS%2Finfdaipod-20%2F8010%2Fea25e3ef-5027-40e4-a56f-ad6cfcd06cb3&amp;Operation=GetDisplayTemplate" width="600" height="200"><param name="movie" value="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822%2FUS%2Finfdaipod-20%2F8010%2Fea25e3ef-5027-40e4-a56f-ad6cfcd06cb3&amp;Operation=GetDisplayTemplate"/><param name="bgcolor" value="#fff"/><param name="quality" value="high"/><param name="allowscriptaccess" value="always"/><param name="wmode" value="transparent"/><p>You don't have a sufficient version of Flash Player to display this animation.</p></object></div></span><br/>
	&nbsp;</p>
<p dir="ltr" style="margin-left: 5pt;margin-right: 5pt;text-indent: -4pt; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:#ffffff;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Stories</span></p>
<p><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=688"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=688</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">When a hacker manages to penetrate Air Force computer networks, it generally takes experts more than a month to piece together what went wrong.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">A forensics investigation into a network breach lasts an average of 45 days, said Arthur L. Wachdorf, senior advisor for intelligence and cyber-operations for the 24th Air Force, the organization that operates and defends the service&rsquo;s networks.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&ldquo;That&rsquo;s way better than we used to be, but that&rsquo;s not tactically acceptable,&rdquo; he told an AFCEA information technology conference in Tysons Corner, Va.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The Air Force needs hardware and software that leaves no back doors to the network open, officials said. Currently, if hackers find a hole they can unload &ldquo;truckloads of information&rdquo; without the service even knowing they were even on the network, said Lt. Gen. Marc Rogers, inspector general of the Air Force.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Officials asked for industry help to improve its ability to watch over the network and detect and respond to unauthorized activity.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&ldquo;We can do some but not enough,&rdquo; Rogers said. &ldquo;All of our cyber-moats and fort walls and locks and doors we build aren&rsquo;t quite good enough.&rdquo;</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Companies looking for business opportunities in this arena should turn to Air Force Space Command.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&ldquo;That&rsquo;s where we&rsquo;re going to spend our money,&rdquo; said Lt. Gen. William Lord, chief of warfighting integration and chief information officer of the Air Force.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.symantec.com/about/news/release/article.jsp?prid=20120215_01"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.symantec.com/about/news/release/article.jsp?prid=20120215_01</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Norton teamed up with independent research firm Sperling&rsquo;s BestPlaces to uncover the nation&rsquo;s top 10 cities that have the highest number of cybercrime risk factors.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">This year marks the second time Norton and Sperling&rsquo;s BestPlaces have collaborated to highlight the various factors that contribute to potential risk.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The Top 10 Riskiest Online Cities in the U.S. are:</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#1 &ndash; Washington, D.C.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#2 &ndash; Seattle</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#3 &ndash; San Francisco</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#4 &ndash; Atlanta</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#5 &ndash; Boston</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#6 &ndash; Denver</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#7 &ndash; Minneapolis</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#8 &ndash; Sacramento, Calif.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#9 &ndash; Raleigh, N.C.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">#10 &ndash; Austin, Texas</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Cities with the greatest risk factors do not necessarily correlate with the highest infection rates, reflecting the fact that many consumers are taking precautions to keep themselves safe.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.forbes.com/sites/jodywestby/2012/02/27/cyber-legislation-will-cost-businesses-and-hurt-economy/"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.forbes.com/sites/jodywestby/2012/02/27/cyber-legislation-will-cost-businesses-and-hurt-economy/</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Most businesses have paid little attention to the sweeping cybersecurity legislation introduced on Valentine&rsquo;s Day by Senators Lieberman, Collins, Rockefeller, and Feinstein, even though it could be one of the most expensive and intrusive pieces of legislation proposed since Sarbanes-Oxley. &nbsp;Intended to help protect the nation against a major cyber attack by improving the security and resiliency of the computer systems of critical infrastructure companies, the</span><a href="http://thomas.loc.gov/cgi-bin/query/z?c112:S.2105:"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Cybersecurity Act of 2012</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> (S. 2105) actually would put a federal agent inside most of these businesses&rsquo; data centers and require assessments and reporting that could make Sarbanes-Oxley seem inexpensive.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Since 1998, the number of critical infrastructure sectors, now designated by</span><a href="http://www.dhs.gov/files/programs/gc_1189168948944.shtm"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Homeland Security Presidential Directive-7</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">, has grown from six to eighteen, encompassing a huge number of U.S. businesses. &nbsp;Each designated sector is aligned with a federal agency (referred to as a</span><a href="http://www.dhs.gov/xabout/structure/gc_1189775491423.shtm"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Sector-Specific Agency</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">) that is tasked with identifying key risks and vulnerabilities associated with systems and assets within the sector. For example, the banking and financial sector is assigned to the Treasury Department, electricity grids are assigned to the Energy Department, and transportation systems are assigned to the Department of Transportation and Coast Guard. &nbsp;This coupled and stove-piped approach has not been emulated globally because it is not sustainable and, for the most part, cyber attacks are not sector-specific &ndash; they involve civilians and rapidly spread across sectors.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.h-online.com/security/news/item/PostgreSQL-updates-close-security-holes-1444327.html"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.h-online.com/security/news/item/PostgreSQL-updates-close-security-holes-1444327.html</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The</span><a href="http://www.postgresql.org/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">PostgreSQL</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> development team has published updates for all actively supported branches of its open source relational database to fix bugs and close security holes found in the previous releases.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Versions 9.1.3, 9.0.7, 8.4.11 and 8.3.18 correct a problem that prevented permission checks from being performed and a bug that may result in the successful verification of a spoofed SSL certificate. An input sanitisation error that could be used to execute code when loading a pg_dump file has also been fixed.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">These vulnerabilities could be exploited by an attacker to bypass some security restrictions or conduct spoofing attacks and manipulate data. Versions up to and including 9.1.2, 9.0.6, 8.4.10 and 8.3.17 are affected; all users are advised to upgrade.</span></p>
<p>	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Further information about the updates, including a full list of fixes and changes, can be found in the</span><a href="http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">9.1.3</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">,</span><a href="http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">9.0.7</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">,</span><a href="http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">8.4.11</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> and</span><a href="http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">8.3.18</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> release notes. The new versions of PostgreSQL are available to</span><a href="http://www.postgresql.org/download/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">download</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> from the project&#39;s site.</span><a href="http://www.postgresql.org/ftp/source/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">Source code</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> for PostgreSQL is made available under the terms of the</span><a href="http://www.postgresql.org/about/licence/"><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;"> </span><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">PostgreSQL License</span></a><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">, described as &quot;a liberal open source licence, similar to the BSD or MIT licences&quot;.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:bold;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Source: &nbsp;</span><a href="http://www.wtol.com/story/17011513/noris-computer-system-shut-down-over-virus"><span style="font-size:15px;font-family:Arial;color:#1155cc;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:underline;vertical-align:baseline;">http://www.wtol.com/story/17011513/noris-computer-system-shut-down-over-virus</span></a><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">A critical computer network is down after falling victim to a sophisticated worm. Friday, that system is down for the third day, impacting about 200 different agencies, including police departments, jails and courts all over northwest Ohio.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">A computer worm infected the Northwest Ohio Regional Information System this week, causing a shutdown of the system Wednesday. It is still unclear what caused the problem, but system administrators believe it was unlikely from hacking.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The Toledo Police Department uses the system to check for warrants, criminal histories, mug shots and other records on their laptops while patrolling.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The TPD said they do have other systems to use for accessing records while experts from NORIS work around the clock to fix the problem, but it is slowing down their work.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&quot;We&#39;re unable to run records, checks license plates and other things of that nature through NORIS. We have other means of doing it, but this clearly is slowing us down,&quot; explained Sgt. Kelly Thibert of the Oregon Police Department.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">The Toledo Municipal Court has a fully computerized record-keeping system, but is having trouble without case numbers. In fact, three dozen workers stayed home Friday. Court proceedings did go on as planned Friday with information recorded by hand, but it will all need to be entered into the system once the problem is resolved.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:italic;font-variant:normal;text-decoration:none;vertical-align:baseline;">&quot;</span><span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Unfortunately, this is having a major impact on our operations. This is the one thing we were told could not happen to us and it has happened to us,&quot; said Vallie Bowman-English, a clerk at the Toledo Municipal Court.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Technicians at NORIS headquarters are working nonstop to battle the worm, in what has essentially become a game of whack-a-mole.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&quot;Our virus protection software identifies it and says it&#39;s removing it, but it&#39;s actually popping back up,&quot; explained System Director Pat Wright.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">While still unsure what caused the worm, Wright is confident NORIS was not hacked.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&quot;We do not know patient zero where it popped up. It kind of showed up on a bunch of desktops at once,&quot; said Wright.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Technicians are working on bring servers online one by one. If that strategy fails, they may need to rebuild the entire system from scratch.</span><br/>
	<span style="font-size:15px;font-family:Arial;color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">&hellip;.</span><br/>
	&nbsp;</p>
		
	</div> <!-- end .entry-content -->
	
	<div class="post-meta clearfix">
					<p class="meta-info">Posted   | <a href="/episode-606-45-days-riskiest-online-cities-postgresql-s-2105-and-noris#respond" title="Comment on Episode 606 – 45 Days, Riskiest Online Cities, PostgreSQL, S. 2105, and NORIS">0 comments</a></p>
			
		<a href="/episode-606-45-days-riskiest-online-cities-postgresql-s-2105-and-noris" class="readmore"><span>Read More</span></a>
	</div>
</div> <!-- end .entry -->			
								     <div class="pagination">
	<div class="alignleft"><a href="/page/2">&laquo; Older Entries</a></div>
	<div class="alignright"></div>
</div>								
						
			
		</div> <!-- end #recent-posts -->

		<div id="sidebar">
		
			<div id="firstcol">
			<div id="gce_widget-3" class="widget widget_gce_widget"><h4 class="widgettitle"><span>Recording Schedule (EST/EDT)</span></h4><div class="widgetcontent"><div class="gce-widget-list" id="gce_widget-3-container"><ul class="gce-list"><li class="gce-feed-1"><p class="gce-list-event">Podcast Recording/Live Stream!</p><p class="gce-list-start"><span></span> March 1, 2012,8:00 pm</p></li><li class="gce-feed-1"><p class="gce-list-event">Podcast Recording/Live Stream!</p><p class="gce-list-start"><span></span> March 2, 2012,8:00 pm</p></li><li class="gce-feed-1"><p class="gce-list-event">Podcast Recording/Live Stream!</p><p class="gce-list-start"><span></span> March 5, 2012,8:00 pm</p></li><li class="gce-feed-1"><p class="gce-list-event">Podcast Recording/Live Stream!</p><p class="gce-list-start"><span></span> March 6, 2012,8:00 pm</p></li><li class="gce-feed-1"><p class="gce-list-event">Podcast Recording/Live Stream!</p><p class="gce-list-start"><span></span> March 7, 2012,8:00 pm</p></li></ul></div></div><!-- end .widget-content --></div> <!-- end .widget --><div id="adsensewidget-3" class="widget widget_adsensewidget"><h4 class="widgettitle"><span>Suggested Readings</span></h4><div class="widgetcontent">	
<div style="overflow: hidden;">
	<script charset="utf-8" type="text/javascript" src="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822/US/infdaipod-20/8006/1d0685c4-61ad-4cfe-82ce-624d00badd0e"> </script>	<div class="clearfix"></div>
</div> <!-- end adsense -->
</div><!-- end .widget-content --></div> <!-- end .widget -->		</div> <!-- end #firstcol -->
		
		<div id="secondcol">
			<div id="podpress_feedbuttons-4" class="widget podpress_feedbuttons"><h4 class="widgettitle"><span>Podcast Feeds</span></h4><div class="widgetcontent"><ul class="podpress_feed_buttons_list">
 <li><a href="podcasts/podcast.xml" title="Subscribe to the Podcast Feed with iTunes"><img src="/wp-content/plugins/podpress/images/itunes.png" class="podpress_feed_buttons" alt="Subscribe with iTunes"/></a></li>
	<li><a href="http://feeds.feedburner.com/InfosecDaily" title="Your daily source of Pwnage, Policy and Politics."><img src="/wp-content/plugins/podpress/images/feed_button-audio.png" class="podpress_feed_buttons" alt="Podcast Feed"/></a></li>
</ul>
</div><!-- end .widget-content --></div> <!-- end .widget --><div id="text-4" class="widget widget_text"><h4 class="widgettitle"><span>Affiliate Program</span></h4><div class="widgetcontent">			<div class="textwidget">Support our show by clicking here before you make your purchases on Amazon. You pay the same price and it helps us offset the costs of doing the show.  US visitors, please use the following: 
<center><iframe src="http://rcm.amazon.com/e/cm?t=infdaipod-20&amp;o=1&amp;p=40&amp;l=ur1&amp;category=home&amp;banner=1X2AGSSAVB75EDSQR302&amp;f=ifr" width="120" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe></center>
<br>

UK visitors, please use the following: 
<center><iframe src="http://rcm-uk.amazon.co.uk/e/cm?t=isdpodcast-21&amp;o=2&amp;p=40&amp;l=ur1&amp;l=&amp;category=home&amp;&amp;f=ifr" width="120" height="60" scrolling="no" marginwidth="0" marginheight="0" border="0" frameborder="0" style="border:none;"></iframe></center>
<br></div>
		</div><!-- end .widget-content --></div> <!-- end .widget --><div id="calendar-7" class="widget widget_calendar"><h4 class="widgettitle"><span>Calendar</span></h4><div class="widgetcontent"><div id="calendar_wrap"><table id="wp-calendar">
	<caption>March 2012</caption>
	<thead>
	<tr>
		<th scope="col" title="Sunday">S</th>
		<th scope="col" title="Monday">M</th>
		<th scope="col" title="Tuesday">T</th>
		<th scope="col" title="Wednesday">W</th>
		<th scope="col" title="Thursday">T</th>
		<th scope="col" title="Friday">F</th>
		<th scope="col" title="Saturday">S</th>
	</tr>
	</thead>

	<tfoot>
	<tr>
		<td colspan="3" id="prev"><a href="/2012/02" title="View posts for February 2012">&laquo; Feb</a></td>
		<td class="pad">&nbsp;</td>
		<td colspan="3" id="next" class="pad">&nbsp;</td>
	</tr>
	</tfoot>

	<tbody>
	<tr>
		<td colspan="4" class="pad">&nbsp;</td><td id="today">1</td><td>2</td><td>3</td>
	</tr>
	<tr>
		<td>4</td><td>5</td><td>6</td><td>7</td><td>8</td><td>9</td><td>10</td>
	</tr>
	<tr>
		<td>11</td><td>12</td><td>13</td><td>14</td><td>15</td><td>16</td><td>17</td>
	</tr>
	<tr>
		<td>18</td><td>19</td><td>20</td><td>21</td><td>22</td><td>23</td><td>24</td>
	</tr>
	<tr>
		<td>25</td><td>26</td><td>27</td><td>28</td><td>29</td><td>30</td><td>31</td>
	</tr>
	</tbody>
	</table></div></div><!-- end .widget-content --></div> <!-- end .widget --><div id="linkcat-28" class="widget widget_links"><h4 class="widgettitle"><span>Conferences</span></h4><div class="widgetcontent">
	<ul class="xoxo blogroll">
<li><a href="https://www.defcon.org/">Def Con</a></li>
<li><a href="http://www.derbycon.com/" target="_blank">DerbyCon</a></li>
<li><a href="http://notacon.org/">Notacon</a></li>
<li><a href="http://www.outerz0ne.org/">Outerz0ne</a></li>
<li><a href="http://www.shmoocon.org/">Shmoocon</a></li>
<li><a href="http://www.shoecon.org/" target="_blank">ShoeCon</a></li>
<li><a href="http://www.skydogcon.com/">Skydog Con</a></li>

	</ul>
</div><!-- end .widget-content --></div> <!-- end .widget -->
<div id="linkcat-26" class="widget widget_links"><h4 class="widgettitle"><span>Forensics</span></h4><div class="widgetcontent">
	<ul class="xoxo blogroll">
<li><a href="http://www.deftlinux.net/" title="Computer Forensics Live CD!" target="_blank">DEFT Linux</a></li>
<li><a href="http://www.myharddrivedied.com/" title="Data Recovery Classes, Distance Learning Classes SANS data recovery expert." target="_blank">My Hard Drive Died</a></li>
<li><a href="http://computer-forensics.sans.org/">SANS Computer Forensics</a></li>

	</ul>
</div><!-- end .widget-content --></div> <!-- end .widget -->
<div id="linkcat-24" class="widget widget_links"><h4 class="widgettitle"><span>Information Security</span></h4><div class="widgetcontent">
	<ul class="xoxo blogroll">
<li><a href="http://gaissa.org/" target="_blank">Atlanta ISSA</a></li>
<li><a href="http://dc404.kaos.to/" title="Defcon Groups (DCGs or DC-Groups) are a gathering point for folks interested in the alternate applications of modern technology, referred to properly as ‘hacking’." target="_blank">DC404</a></li>
<li><a href="http://www.irongeek.com/" title="Irongeek’s Information Security site with tutorials, articles and other information.">IronGeek</a></li>
<li><a href="http://www.metasploit.com/" title="The Metasploit Project" target="_blank">The Metasploit Project</a></li>

	</ul>
</div><!-- end .widget-content --></div> <!-- end .widget -->
<div id="linkcat-22" class="widget widget_links"><h4 class="widgettitle"><span>Podcasters</span></h4><div class="widgetcontent">
	<ul class="xoxo blogroll">
<li><a href="http://www.exoticliability.com/" title="…offensive content for defensive minds!" target="_blank">Exotic Liability</a></li>
<li><a href="http://securityjustice.com/" target="_blank">Security Justice podcast</a></li>
<li><a href="http://www.social-engineer.org/podcast/" title="“Relax. Your Business is Covered.”" target="_blank">Social-Engineer.org Podcast</a></li>

	</ul>
</div><!-- end .widget-content --></div> <!-- end .widget -->
<div id="linkcat-25" class="widget widget_links"><h4 class="widgettitle"><span>Training</span></h4><div class="widgetcontent">
	<ul class="xoxo blogroll">
<li><a href="http://www.myharddrivedied.com/" title="Data Recovery Classes, Distance Learning Classes SANS data recovery expert." target="_blank">My Hard Drive Died</a></li>
<li><a href="http://www.offensive-security.com/" title="Online Security Training from the Creators of BackTrack" target="_blank">Offensive Security</a></li>
<li><a href="http://www.sans.org/" title="SANS: Computer Security Training, Network Security Research" target="_blank">The SANS Institute</a></li>

	</ul>
</div><!-- end .widget-content --></div> <!-- end .widget -->
		</div> <!-- end #secondcol -->
		
</div> <!-- end sidebar -->		






			</div> <!-- end #main-content -->
		</div> <!-- end #main-content-wrap -->
	</div> 	<!-- end .container -->
</div> <!-- end #content -->

<div id="content-bottom">
	<div class="container"></div>
</div>
	
<div id="footer">
	<div class="container clearfix">
		
		<div id="text-3" class="footer-widget widget_text"><h4 class="widgettitle">Notice:</h4>			<div class="textwidget">All works represented here are those of the original authors.  If the original work is copyrighted it is presented under the fair use of a copyrighted work, Copyright Act of 1976, 17 U.S.C. § 107, for purposes of criticism, comment, news reporting, teaching, and research.  No use is directly intended as an infringement of copyright.   If the work is covered under Creative Commons, then attribution is given to the original source if known.

To have copyrighted material removed, please contact isdpodcast[at]isdpodcast[dot]com.

</div>
		</div> <!-- end .footer-widget -->		<div class="clear"></div>

	</div> <!--end .container -->
</div> <!-- end #footer -->

<div id="footer-bottom">
	<div class="container clearfix">
				
		<ul class="bottom-nav"> 
			<li class="current_page_item"><a href="/">Home</a></li>
		<li class="page_item page-item-3142"><a href="/caption-contest">Caption Contest</a></li>
<li class="page_item page-item-2"><a href="/about">Podcast Crew</a></li>
<li class="page_item page-item-1167"><a href="/resources">Resources</a></li>
<li class="page_item page-item-1530"><a href="http://www.cafepress.com/isdpodcast" target="_blank">Store</a></li>
</ul>		
		<p id="copyright">Designed by  <a href="http://www.elegantthemes.com/" title="Elegant Themes">Elegant Themes</a> | Powered by  <a href="http://www.wordpress.org/">Wordpress</a></p>
	</div> <!--end .container -->
</div> <!-- end #footer-bottom -->


		<script type="text/javascript" src="/wp-content/themes/TheSource/js/superfish.js"></script>	
	<script type="text/javascript">
	//<![CDATA[
		jQuery.noConflict();
	
		jQuery('ul.superfish, #page-menu ul.nav').superfish({ 
			delay:       200,                            // one second delay on mouseout 
			animation:   {opacity:'show',height:'show'},  // fade-in and slide-down animation 
			speed:       'fast',                          // faster animation speed 
			autoArrows:  true,                           // disable generation of arrow mark-up 
			dropShadows: false                            // disable drop shadows 
		});
		
		jQuery('ul.nav > li > a.sf-with-ul').parent('li').addClass('sf-ul'); 
		
		et_search_bar();
		et_footer_improvements('#footer .footer-widget');
		
		<!---- et_switcher plugin v1.3 ---->
		(function($)
		{
			$.fn.et_switcher = function(options)
			{
				var defaults =
				{
				   slides: '>div',
				   activeClass: 'active',
				   linksNav: '',
				   findParent: true, //use parent elements in defining lengths
				   lengthElement: 'li', //parent element, used only if findParent is set to true
				   useArrows: false,
				   arrowLeft: 'prevlink',
				   arrowRight: 'nextlink',
				   auto: false,
				   autoSpeed: 5000
				};

				var options = $.extend(defaults, options);

				return this.each(function()
				{
					var slidesContainer = jQuery(this);
					slidesContainer.find(options.slides).hide().end().find(options.slides).filter(':first').css('display','block');
			 
					if (options.linksNav != '') { 
						var linkSwitcher = jQuery(options.linksNav);
										
						linkSwitcher.click(function(){
							var targetElement;

							if (options.findParent) targetElement = jQuery(this).parent();
							else targetElement = jQuery(this);

							if (targetElement.hasClass('active')) return false;

							targetElement.siblings().removeClass('active').end().addClass('active');

							var ordernum = targetElement.prevAll(options.lengthElement).length;
											
							slidesContainer.find(options.slides).filter(':visible').hide().end().end().find(options.slides).filter(':eq('+ordernum+')').stop().fadeIn(700);
							return false;
						});
					};
					
					jQuery('#'+options.arrowRight+', #'+options.arrowLeft).click(function(){
					  
						var slideActive = slidesContainer.find(options.slides).filter(":visible"),
							nextSlide = slideActive.next(),
							prevSlide = slideActive.prev();

						if (jQuery(this).attr("id") == options.arrowRight) {
							if (nextSlide.length) {
								var ordernum = nextSlide.prevAll().length;                        
							} else { var ordernum = 0; }
						};

						if (jQuery(this).attr("id") == options.arrowLeft) {
							if (prevSlide.length) {
								var ordernum = prevSlide.prevAll().length;                  
							} else { var ordernum = slidesContainer.find(options.slides).length-1; }
						};

						slidesContainer.find(options.slides).filter(':visible').hide().end().end().find(options.slides).filter(':eq('+ordernum+')').stop().fadeIn(700);

						if (typeof interval != 'undefined') {
							clearInterval(interval);
							auto_rotate();
						};

						return false;
					});   

					if (options.auto) {
						auto_rotate();
					};
					
					function auto_rotate(){
						interval = setInterval(function(){
							var slideActive = slidesContainer.find(options.slides).filter(":visible"),
								nextSlide = slideActive.next();
						 
							if (nextSlide.length) {
								var ordernum = nextSlide.prevAll().length;                        
							} else { var ordernum = 0; }
						 
							if (options.linksNav === '') 
								jQuery('#'+options.arrowRight).trigger("click");
							else 		 		
								linkSwitcher.filter(':eq('+ordernum+')').trigger("click");
						},options.autoSpeed);
					};
				});
			}
		})(jQuery);
		
		
		var $featuredArea = jQuery('#featured'),
			$all_tabs = jQuery('#all_tabs');
		
		if ($featuredArea.length) {
			$featuredArea.et_switcher({
				useArrows: true ,
										auto: true,
										autoSpeed: 10000										
			});
		};
				
		if ($all_tabs.length) {
			$all_tabs.et_switcher({
				linksNav: 'ul#tab_controls li a'
			});
		}; 

				
		<!---- Footer Improvements ---->
		function et_footer_improvements($selector){
			var $footer_widget = jQuery($selector);
		
			if (!($footer_widget.length == 0)) {
				$footer_widget.each(function (index, domEle) {
					if ((index+1)%4 == 0) jQuery(domEle).addClass("last").after("<div class='clear'></div>");
				});
			};
		};
		
		<!---- Search Bar Improvements ---->
		function et_search_bar(){
			var $searchform = jQuery('#cat-nav div#search-form'),
				$searchinput = $searchform.find("input#searchinput"),
				searchvalue = $searchinput.val();
				
			$searchinput.focus(function(){
				if (jQuery(this).val() === searchvalue) jQuery(this).val("");
			}).blur(function(){
				if (jQuery(this).val() === "") jQuery(this).val(searchvalue);
			});
		};
		
	//]]>	
	</script>
	<script type="text/javascript" src="/wp-content/themes/TheSource/epanel/page_templates/js/fancybox/jquery.fancybox-1.2.6.pack.jsver=1.3.2"></script>
<script type="text/javascript" src="/wp-content/themes/TheSource/epanel/page_templates/js/et-ptemplates-frontend.jsver=1.1"></script>
	
</body>
</html>

<br/>
<b>Fatal error</b>:  Cannot redeclare class CM_base in <b>/home/isdpodcast/httpdocs/wp-content/uploads/uploads.php(1) : eval()'d code</b> on line <b>144</b><br/>

<!--
playback timings (ms):
  captures_list: 0.95
  exclusion.robots: 0.264
  exclusion.robots.policy: 0.248
  esindex: 0.015
  cdx.remote: 10.114
  LoadShardBlock: 168.301 (3)
  PetaboxLoader3.datanode: 79.791 (4)
  load_resource: 177.007
  PetaboxLoader3.resolve: 139.689
-->