jess LAND
       www.jessland.net
        Sponsored by:       
One eSecurity
www.one-esecurity.com
JISK Knowledgebase >>    About    News    Essentials    Architecture    FWs    IDS/IPS    Honeypots    Malware    Forensics   
  +  JSS Home    Projects    JSS Community    Events    News    Docs    About    Contact .

JISK > Updates > Archive Updates Section Map

JISK Updates History


 19/01/07
New section created about MS Exchange Recovery: Forensics > Areas > MS Exchange 
 16/01/07
New section created about Forensics Seizure: Forensics > Areas > Seizure 
 15/01/07
New section created about Firewalls 
 15/01/07
New sections created about Anti-Debugging and Virtual Machine Detection: Malware > Analysis > Reverse Engineering > AntiRE > AntiDebugging y VM Detection 
 12/01/07
New section created about Wireless Forensics: Forensics > Areas > Wireless 
 11/01/07
New section created about Security Architecture: Essentials > Areas > Security Architecture 
 10/01/07
New section created about Windows Packers: Malware > Analysis > Reverse Engineering > Windows > Packers 
 04/01/07
New section created about NIDS / NIPS Evasion: IDS / IPS > Network > Evasion 
 02/01/07
New section created about Windows Kernel Rootkits, JISK > Malware > Rootkits > Types > Kernel > Windows, initially with just some references to Windows Vista. 
 02/01/07
New section created about Windows Kernel Rootkits, JISK > Malware > Rootkits > Types > Kernel > Windows, initially with just some references to Windows Vista. 
 28/12/06
Updated Wiping, Deletion & Recovery references in the Forensics > Areas > Disks and Filesystems section 
 27/12/06
Updated the Forensics > Publications and Newsletters and Conferences sections 
 24/12/06
New section created about File Formats Reverse Engineering: Malware > Analysis > Reverse Engineering > File Formats 
 20/12/06
New section created about Security Governance & Compliance: Essentials > Areas > Governance and Compliance 
 11/12/06
New section created about Computer Security Incident Response Teams: Forensics > Areas > Incident Response > CSIRT 
 01/12/06
Forensics > Software > Windows - Added Office & PDF Metadata Removal Tools
New section created: Forensics > Areas > Documents 
 29/11/06
We have created a couple of new Malware sections, Reverse Engineering Linux & OS X. Still just placeholders, except for a reference about OS X binary protection, but we'll grow them little by little.
We've also added Worminator a tool for generating IDS/IPS signatures for SMTP based worms in the NIDS & Malware Static Analysis sections. 
 28/11/06
We have included the HoneySnap and Honeyclient in the Honeypot Tools section. 
 27/11/06
We've added the new Universal Pattern Searcher tool to the Malware Static Analysis Section 
 26/11/06
Today I just found something REALLY important while browsing the CITFS's RSS Feeds. It's an article called No profile for Online Predetors and deals with the Protection of Children on the Internet. Due to the importance of this subject, we've decided to create a new section under JISK > Essentials, called Protecting Children on the Internet and place a copy of it under the name Recommendations to keep your children safe on the Internet 
 25/11/06
We have included references to some Malware Analysis / Reverse Engineering Books, including some Java ones. 
 23/11/06
We have included some references to good Interrogation Techniques Books in our Forensics Books section 
 22/11/06
We've just created a new Forensics section, Online Tools and to start with we have included a couple of references to Digital Timestamping Services.
We have also included some Digital Timestamping and Metadata Analysis tools in the Windows and Linux Forensics Tools Sections. 
 19/11/06
You certainly are familiar with system level and kernel level rootkits but maybe you want to peep into the next generation: Database, Virtual or Hardware rootkits. We've included a couple of references in the JISK just to get you started (we'll add more informaiton when we have a little time). 
 17/11/06
We are now rebuilding our Forensics Tools Section. If you have any comments or recommendations about useful software which is not listed, let us know
 16/11/06
We've included in the USB Drives Forensics section a nice tip from Jim Murray to mount USB Drives read-only on Windows
 07/11/06
We have just added ext2/3, NTFS & FAT Field Notes to the Filesystems Forensics section. 

Copyright © 2000-2008 Jessland - Jess Garcia's Website - All rights reserved.