SanDisk SD-ROM Bedienungsanleitung Seite 7

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 7
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 6
U3 USB Stick (In-)Security
Q2/2007 by Martin Suess, martin.suess@csnc.ch
7
About the Author
Martin Suess completed
his studies for BS in
Computer Sciences in
December 2004 with his
diploma thesis in the fields
of ZigBee networks in
Singapore. During his
studies he concentrated
on IT security, as well as
on network and Internet
technologies. After his
study, he worked on Bluetooth- and embedded-
projects at the University for Applied Sciences
in Rapperswil. At the same time he coached
student projects as well as tutorials in
"Algorithms and Datastructures in Java". He
joined Compass Security AG as a full time
security analyst in January 2006.
http://www.csnc.ch/
About Compass Security
The Job of a security specialist is like searching
in the fog. The more opaque the environment
the harder it is to find traces and establish
methods and tactics. A good compass can help
to determine the direction and choose a path
that will securely lead to the destination.
Compass Security Network Computing AG is
an incorporated company based in Rapperswil
(Lake of Zurich) Switzerland that specialises in
security assessments and forensic
investigations. We carry out penetration tests
and security reviews for our clients, enabling
them to assess the security of their IT systems
against hacking attacks, as well as advising on
suitable measures to improve their defences.
Compass Security has considerable experience
in national and international projects. Close
collaboration with the technical universities of
Lucerne and Rapperswil enable Compass to
carry out applied research so that our security
specialists are always up-to-date.
Credits
Thanks to all Compass Security members who
helped me writing this paper through reviews
and coming up with new ideas.
References
[1] U3 Developers Homepage
http://www.u3.com/
http://www.u3.com/uninstall/
[2] SanDisk, USB Stick Manufacturer
http://www.sandisk.com/
[3] Social Engineering, the USB way
http://www.darkreading.com/
document.asp?doc_id=95556&WT.svl=
column1_1
[4] Hak.5 - Wiki
http://www.hak5.org/wiki/
[5] Pod Slurping
http://www.sharp-ideas.net/
pod_slurping.php
[6] Hacking U3 Smart USB Drives
http://www.cse.msstate.edu/~rwm8/
hackingU3/
[7] Deactivate USB Sticks through GPO
http://www.gruppenrichtlinien.de/
HowTo/usb_sticks_deaktivieren.htm
[8] Microsoft TweakUI Autoplay Registry
http://www.microsoft.com/mspress/
books/sampchap/6232a.aspx#140
[9] Microsoft Autostart Registry Key(s)
http://www.microsoft.com/technet/prodt
echnol/windows2000serv/reskit/regentr
y/58886.mspx?mfr=true
[10] GFi Endpoint Security
http://www.gfi.com/
[11] Safeend Auditor and Safend Protector
http://www.safend.com/
[12] DriveLock
http://www.drivelock.com/
[13] NCC Group - Awareness Campaign
http://www.nccgroup.com/services/
pen-testing/network-security-
awareness-campaign.aspx
Seitenansicht 6
1 2 3 4 5 6 7

Kommentare zu diesen Handbüchern

Keine Kommentare