Use a CRU WiebeTech Mouse Jiggler to prevent a computer from going to sleep while you work or play. This plug-and-use device creates constant mouse activity, so your computer won't go idle and trigger a sleep mode or screen saver-eliminating the need to log in repeatedly. Computer forensic investigators use Mouse Jigglers to prevent password dialog boxes from appearing due to screensavers or sleep mode. With many computer hard drives now employing full-disk encryption, such modes can greatly increase the time and cost of a forensic investigation. When combined with a WiebeTech HotPlug, investigators can transport a running computer without shutting it down or worrying about logging in.IT professionals use the Mouse Jiggler to prevent password dialog boxes due to screensavers or sleep mode after an employee is terminated and they need to maintain access to their computer. If you're giving a presentation, or just watching a movie, and you don't want your screensaver constantly popping up, the Mouse Jiggler is the perfect device. Whether you're a forensic investigator, technician, or IT professional, the CRU WiebeTech Mouse Jiggler is a useful tool.
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. The key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?
ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.
Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today.
Continue reading “ModSecurity Handbook, Second Edition”
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor–VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer. Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective
Continue reading “Virtualization Security: Protecting Virtualized Environments”
A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts
About This BookA professional, step-by-step approach to forensic analysis complete with key strategies and techniquesAnalyze the most popular Android applications using free and open source toolsLearn forensically-sound core data extraction and recovery techniques
Continue reading “Learning Android Forensics”