Mar 13

Assurance is not for Arminians

puritans

I have been reading through Thomas Brooks, Heaven on Earth and the book has been focusing a lot on the doctrine of assurance and thought I would share some tid bits.

Nov 16

My Results – Right Brain/Left Brain Quiz

Right Brain/ Left Brain Quiz The higher of these two numbers below indicates which side of your brain has dominance in your life. Realising your right brain/left brain tendancy will help you interact with and to understand others. Left Brain … Continue reading

Aug 27

Am I Evil?

“And GOD saw that the wickedness of man was great in the earth, and that every imagination of the thoughts of his heart was only evil continually.” Genesis 6:5 (KJV)   Before I became a Christian I was a big … Continue reading

Dec 27

2013 Security Reading List

During the second week of December I realized that our group had not used their 2012 training budget. Realizing that there was not enough time to get a formal security class under way before the end of the year, I … Continue reading

Dec 18

Whole Disk Encryption Principles

All of the components associated with managing the Whole Disk Encryption (WDE) infrastructure should be classified as a High Value Asset (HVA). The backend assets contain the components involved for protecting the encryption and decryption keys that are used to … Continue reading

Dec 15

A Security Perspective on the Conneticut Shootings

Given the horrible tragedy that took place yesterday in our nation, I have been given a lot of thought to how to mitigate these shooting incidents. Given the fact that my career has been centered around protecting company resources and … Continue reading

Oct 30

UNIX Core Event Logging

There are a minimum set of events that should be logged on UNIX-like operating systems. Typically you would need to define requirements for your specific needs and add and modify them per requirements that you define.

Oct 20

Keys to Data Loss Prevention (DLP) Success

Being a Information Security geek for sometime I have had a significant exposure to DLP over the years and being exposed to two major vendor distributions along with processes and procedures I have found some high-level principles that should be … Continue reading

Oct 13

Backtrack 5 & Scapy Python Dependecies

Have not blogged on any security-related topics in a while so I thought it was time. Scapy is a Python-driven program for generating TCP/IP packets on the fly and programtically. If you fire up Scapy on a fresh Backtrack 5 … Continue reading