Category: Research

  • New open source medical image repository debuts

    A team of medical researchers from four European institutions has created the Image Data Resource, a repository “that is capable of storing and integrating data from multiple laboratories, whilst also significantly enhancing the potential for sharing and reusing imaging data.” The repository “offers potential to identify new therapies and targets, and broadens the scope of research […]

  • Relationship between epistemology and other perspectives

  • Machine Learning videos

  • Cyber Defence Exercise Locked Shields 2012 After Action Report

      In March 2012 the NATO Cooperative Cyber Defence Centre of Excellence,  organised, in cooperation with its partners, a technical Blue-Red Team exercise called Locked Shields 2012. The After Action Report has been published Download Report here

  • Polymorphic malware

    In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence.[1]

  • Metamorphic Malware

    Metamorphic code is code that when run outputs a logical equivalent version of its own code under some interpretation. This is similar to a quine, except that the quines source code are exactly equivalent to their own output. Metamorphic code also usually output machine code and not its own source code.

  • How to Spoof (change) your MAC address in Mac OS X

    A MAC address is a unique identifier assigned to your network card, and some networks implement MAC address filtering as a method of security. Spoofing a MAC address can be desired for multiple reasons, and it is very easy to spoof your MAC address in Mac OS X 10.4, 10.5, 10.6, and 10.7. For the […]

  • Western Kentucky University’s Cyber Defence Lab running Windows

    Look close they are running MS Windows in Cyberdefence lab .. Guess how much they really care of defence 🙂  http://www.wku.edu/cdl/News/2008/02192008.html    

  • World Weird Web

    A nice flash presentation.   http://www.fkie.fraunhofer.de/en/research-areas/cyber-defense/world-weird-web-flash.html

  • Orion Incident Response Live CD

    Orion version 0.4 (Squirrel Edition) is officially released. Orion is a Live CD based on Ubuntu (currently 11.04) that provides acquisition, analysis, collaboration, tracking and reporting tools for professional intrusion response teams. http://sourceforge.net/projects/orionlivecd/