Todd Manning and I have a new whitepaper available over at BreakingPoint on simulating Distributed Denial-of-Service (DDoS) attacks using the BreakingPoint product. You can read more about the paper in my BreakingPoint blog post, or just grab the paper here. If you’re a BreakingPoint customer, you’ll want the bundled version which comes with test cases and other supporting materials.
Archive for February, 2009
When a book is so well-received by your peers as The IDA Pro Book has been, even if reverse engineering isn’t a huge part of what you do every day, you pretty much have to give it a read. The creator of IDA Pro, Ilfak Guilfanov, even recommends it himself for a number of reasons, calling it “the most thorough and accurate IDA Pro book.” Even though I don’t do a whole lot of reversing, I do use IDA on occasion, so I thought it in my best interests to read this book. Authored by Chris Eagle, a co-author of one of my favorite security books, Gray Hat Hacking, I had fairly high expectations. I was not disappointed.