Floydman's security page

Welcome to my page, dear visitor! This is my humble place for storing my papers about my views and experience in the field of computer security. I have just improved a little bit the look of the page, including the new logo at the top. As you can see, I have a wicked sense of humor that you will find throughout my papers.

A little but about me: I started programming BASIC on a C-64 at age twelve, did some PASCAL at college. I (almost) have a Bachelor's Degree in Computer Sciences (missing 3 credits in statistics ~shivers~), where I learned many other programming languages that I rarely use nowadays. This is mostly because I have done about 6 years experience administering and doing support on various systems related to the PC platform (Dos, Novell, OS/2, various Windows flavors), where I didn't have much opportunities to do programming. Still, my years at university game me a wide knowledge in the various fields of computer science, which is a good thing for « understanding how things work under the hood », to paraphrase a common saying in the hacker community.

I started studying security in the beginning of 2000, when I was at home on a burnout (which means I had plenty of time on my hands to read books and articles). A couple of months later, I started writing my own articles and put up this website. I am still fairly new at the whole security game, altough it has been one of my favorite topics for a long time. Some of them have been presented in international conferences, some others have been published in magazines or other hacking/security websites. So, here are the few papers I've done so far, I hope you enjoy reading them.

Keep checking back from time to time, as my new projects will keep being posted here.

Disregard that last sentence, I am not updating this page anymore. For updates (LogAgent 4.0 and ComLog 1.05), new tools (LogIDS 1.0) and new articles, please go to http://securit.iquebec.com/.

Floydman

LogAgent 2.1, log file recollection tool (14/08/2002) (NEW)

ComLog.pl, a WIN32 command prompt logger (14/08/2002) (NEW)

Securing the Microsoft internal network (14/06/2002)

Sécuriser le réseau interne Microsoft (14/06/2002)

LogAgent 2.0 beta (14/06/2002)

Configuring ZoneAlarm securely (15/02/2002)HTML version

Autopsy of a successful intrusion (well, two actually) (30/08/2001) HTML version - Text file
Traduccion en Español : Autopsia de una intrusión con éxito (bueno, ahora dos) (Thanks to HIS)
(This paper was presented at the « Seguridad en Computo 2001 » conference in Mexico City)
(This paper was published in issue #2 of
Hacker's digest)

Invisible file extensions on Windows (21/08/2001),HTML version - Text file
(This paper was published in issue #2 of Hacker's digest)

Log Agent, log file recollection tool (25/09/2000) HTML version - Text file
(This paper was presented at the « Seguridad en Computo 2000 » conference in Mexico City)

Virus protection in a Microsoft Windows network, or How to stand a chance (31/05/2000) HTML version - Text file

A poor-man Tripwire-like system on Windows 9x/NT (UPDATED 14/08/2000) HTML version - Text file

Babel, DDoS of Biblical proportions (10/08/2000) HTML version - Text file
(This paper was presented at the « Seguridad en Computo 2001 » conference in Mexico City)

Computer snooping using InstallRite (19/09/2000) HTML version - Text file

Software deployment that makes sense (21/09/2000) HTML version - Text file

Share-aware: A new shareware model proposal (15/08/2000) HTML version - Text file



There are other whacky people like you and me who visited this page

There's someone in my head, but it's not me