Published Papers
The Official CHFI Study Guide
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal...
Published on: 2007-10-08
Topic: Digital Forensics
Requirements for Record Keeping and Document Destruction in a Digital World
In the day-to-day management of their organisation, company directors, accountants and management often overlook the importance of the documents used by the business. It is crucial to remember...
Published on: 2007-06-05
Topic: Document Management
Beyond Automated Tools and Frameworks: The Shellcode Injection Process
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...
Published on: 2007-03-31
Topic: Developer
Taking Control, Functions to DLL Injection
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the code exploitation process. In this article, we...
Published on: 2007-03-31
Topic: Developer
Understanding Conditionals in Shellcode
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. In this article, we...
Published on: 2007-03-31
Topic: Developer
Electronic Contracting, New Wine in Old Bottles
The rise of the Internet as a commercial tool has created a level of uncertainty surrounding the law of offer and acceptance. This paper discusses the implications associated with online...
Published on: 2006-04-23
Topic: Law
Extending Control, API Hooking
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...
Published on: 2006-03-05
Topic: Developer
Implementing an Information Security Management System (ISMS) Training process
One of the key controls within any ISMS is it the continued awareness and training of staff and other parties. The focus and topic of this paper consists of the development of an ISO-17799...
Published on: 2005-02-25
Topic: Information Security
Analysis of a Serial Based Digital Voice Recorder
This paper will explore issues with a serially accessed digital voice recorder and in particular the retrieval and analysis of the voice files contained on the device. The device, a "VoiceIt"...
Published on: 2005-02-25
Topic: Digital Forensics