<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>InfoSec on System Overlord</title><link>https://systemoverlord.com/tags/infosec.html</link><description>Recent content in InfoSec on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 16 Apr 2014 04:55:14 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/infosec/index.xml" rel="self" type="application/rss+xml"/><item><title>A Brief History of the Internet (Security-Wise)</title><link>https://systemoverlord.com/2014/04/16/a-brief-history-of-the-internet-security-wise/</link><pubDate>Wed, 16 Apr 2014 04:55:14 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/04/16/a-brief-history-of-the-internet-security-wise/</guid><description>&lt;p&gt;I originally posted this to the &lt;a href="http://dc404.org/"&gt;DC404 Mailing List&lt;/a&gt;, but got some positive feedback, so I thought I&amp;rsquo;d post it here as well. The broad strokes should be correct, but there might be some inaccuracies here — if you&amp;rsquo;re aware of one, please let me know and I&amp;rsquo;ll correct it.&lt;/p&gt;
&lt;p&gt;There was a thread ongoing about Heartbleed, and it turned into a question of why security on the Internet is so complicated, and couldn&amp;rsquo;t it be any simpler? Well, the truth be told, security on the Internet is a house of cards.&lt;/p&gt;</description></item><item><title>LD_PRELOAD for Binary Analysis</title><link>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</link><pubDate>Mon, 13 Jan 2014 02:18:16 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</guid><description>&lt;p&gt;During the BreakIn CTF, there were a few challenges that depended on the return value of of libc functions like &lt;code&gt;time()&lt;/code&gt; or &lt;code&gt;rand()&lt;/code&gt;, and had differing behavior depending on those return values. In order to more easily reverse those binaries, it can be nice to control the return values of those functions. In other cases, you have binaries that may call functions like &lt;code&gt;unlink()&lt;/code&gt;, &lt;code&gt;system()&lt;/code&gt;, etc., where you prefer not to have those functions really called. (Though you are running these untrusted binaries in a VM, right?)&lt;/p&gt;</description></item><item><title>KSU Cyber Security Awareness Day 2011</title><link>https://systemoverlord.com/2011/10/26/ksu-cyber-security-awareness-day-2011/</link><pubDate>Wed, 26 Oct 2011 22:25:19 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2011/10/26/ksu-cyber-security-awareness-day-2011/</guid><description>&lt;p&gt;
	Today was the KSU Cyber Security Awareness Day, presented by KSU's Information Technology Services (a sister department to the department I work in), and it was a resounding success!  There were several presentations that had standing-room only attendance, and for good reason.&lt;/p&gt;
&lt;p&gt;
	My personal favorites:&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Mike Rothman from Securosis&lt;/strong&gt; on finding happiness in information security.  Mike's presentation was as much about being happy in your job and in your life as it was about cyber security, but he asked a number of very pointed questions.  Questions about pay/salary, job satisfaction, and life priorities.  I found the questions unsettling, not because of the actual question, but because I realized that I'd been subconsciously thinking those same things for quite a while now.  The take away from his presentation can probably be summed up as "Is what you're doing today getting you where you want to go?"&lt;/p&gt;</description></item></channel></rss>