truesec.be truesec.be

truesec.be

TrueSec

An Independent Security Consultant. The next edition of BruCON is already at our doors! Like the previous edition, TrueSec is helping the conference crew by providing online and technical resources and we have again a free Read the Rest…. Tracking The “Patient Zero”. Here is a link to a guest blog post that I wrote for AlienVault about tracking the “patient zero”. The blog post is available here. Happy reading! Because information security is everyone's business. Offensive VS. Defensive Security. However...

http://www.truesec.be/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR TRUESEC.BE

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

November

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.3 out of 5 with 8 reviews
5 star
3
4 star
4
3 star
1
2 star
0
1 star
0

Hey there! Start your review of truesec.be

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

7.1 seconds

CONTACTS AT TRUESEC.BE

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
TrueSec | truesec.be Reviews
<META>
DESCRIPTION
An Independent Security Consultant. The next edition of BruCON is already at our doors! Like the previous edition, TrueSec is helping the conference crew by providing online and technical resources and we have again a free Read the Rest…. Tracking The “Patient Zero”. Here is a link to a guest blog post that I wrote for AlienVault about tracking the “patient zero”. The blog post is available here. Happy reading! Because information security is everyone's business. Offensive VS. Defensive Security. However...
<META>
KEYWORDS
1 services
2 incident handling
3 log management
4 pentesting
5 social engineering
6 vulnerability assessment
7 security audit
8 blog
9 documents
10 brucon 0x06 challenge
CONTENT
Page content here
KEYWORDS ON
PAGE
services,incident handling,log management,pentesting,social engineering,vulnerability assessment,security audit,blog,documents,brucon 0x06 challenge,areas of experience,and now,brucon 0x05 challenge,unity makes strength,isc 2 secureamsterdam workshop,tags
SERVER
Apache
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

TrueSec | truesec.be Reviews

https://truesec.be

An Independent Security Consultant. The next edition of BruCON is already at our doors! Like the previous edition, TrueSec is helping the conference crew by providing online and technical resources and we have again a free Read the Rest…. Tracking The “Patient Zero”. Here is a link to a guest blog post that I wrote for AlienVault about tracking the “patient zero”. The blog post is available here. Happy reading! Because information security is everyone's business. Offensive VS. Defensive Security. However...

INTERNAL PAGES

truesec.be truesec.be
1

TrueSec » (ISC)2 SecureAmsterdam Workshop

https://www.truesec.be/2013/04/03/isc2-secureamsterdam-workshop

An Independent Security Consultant. On April 3, 2013. Yesterday I attended the (ISC) event in Amsterdam about mobile devices security. I was invited as a speaker and talked about the mobile apps security. The whole day covered the classic topics around mobile devices. My slides are available on SlideShare:. Laquo; Offensive VS. Defensive Security. Next Post) Unity Makes Strength. Laquo; Previous Image.

2

TrueSec » BYOD

https://www.truesec.be/tag/byod

An Independent Security Consultant. Now browsing by tag. On April 3, 2013. Yesterday I attended the (ISC) event in Amsterdam about mobile devices security. I was invited as a speaker and talked about the mobile apps security. The whole day covered the classic topics around mobile devices. My slides are available on SlideShare:.

3

TrueSec » Security Audit

https://www.truesec.be/services/security-audit

An Independent Security Consultant. A security audit and a security assessment are not the same! Many people associate both but a security assessment is just one step into the security audit process. The security assessment is another name used to define a vulnerability assessment. A security audit can be defined as an extensive and formal overview of an organization’s security systems and processes (both must be reviewed! A security audit covers:. Looking for policy issues. Design controls and processes.

4

TrueSec » Documents

https://www.truesec.be/documents

An Independent Security Consultant. This website is owned and operated by TrueSec (the commercial name of Xavier Mertens Consulting SCS). You are free to browse the information available here without having to provide any personal details.

5

TrueSec » Introduction to Social Engineering

https://www.truesec.be/2014/04/04/introduction-to-social-engineering

An Independent Security Consultant. Introduction to Social Engineering. On April 4, 2014. Some very motivated IT Students from the Erasmus Hogeschool Brussels. Organized today (and tonight) an event around information security called EHackB2014. With online games, demos and workshops around security. I was contacted a few weeks ago by Bert Van Rillaer. The professor helping students to organize the event as a keynote speaker. Instead of speaking “. 8221; a human? Good job for a first shot!

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

blog.rootshell.be blog.rootshell.be

Security Archives - /dev/random

https://blog.rootshell.be/tag/security

If the enemy leaves a door open, you must rush in. – Sun Tzu. SANS ISC Diary] Data Classification For the Masses. August 19, 2016. SANS Internet Storm Center. Continue reading ». SANS ISC Diary] The Power of Web Shells. July 14, 2016. SANS Internet Storm Center. Continue reading ». RMLL Security Track 2016 Wrap-Up. July 4, 2016. I’m in the train from Paris where I attended the RMLL Security Track version 2016. The RMLL or “Rencontres Mondiales du Logiciel Libre” is an annual event a...June 30, 2016.

blog.rootshell.be blog.rootshell.be

Introduction to Nmap Scripting - /dev/random

https://blog.rootshell.be/2009/02/02/introduction-to-nmap-scripting

If the enemy leaves a door open, you must rush in. – Sun Tzu. Introduction to Nmap Scripting. February 2, 2009. All people working with networks know the wonderful tool called Nmap. Basically, Nmap is a network scanner. It allows you to detect hosts on a network and services running on them. Just type “nmap hostname ip ” to perform a simple port scan. But Nmap can do much more! O (OS detection – fingerprinting). For a detailed list of options, check out the online documentation. The NSE (“. Basically, a ...

blog.rootshell.be blog.rootshell.be

SSL Archives - /dev/random

https://blog.rootshell.be/tag/ssl

If the enemy leaves a door open, you must rush in. – Sun Tzu. Tracking SSL Issues with the SSL Labs API. May 18, 2015. The SSL and TLS protocols have been on the front of the stage for months. Besides many vulnerabilities disclosed in the OpenSSL library, the deployment of SSL and TLS is not always easy. They are weak cyphers (like RC4), weak signatures, certificates issues (self-signed, expiration or fake ones). Other useful features are mis-understood. Continue reading ». Heartbleed Impact in Belgium?

blog.rootshell.be blog.rootshell.be

PGP Public Key - /dev/random

https://blog.rootshell.be/pgp-public-key

If the enemy leaves a door open, you must rush in. – Sun Tzu. If you want to exchange information in a safe way with me, feel free to use my PGP public key. BEGIN PGP PUBLIC KEY BLOCK- - - Version: GnuPG v1.2.2 (OpenBSD) mQGiBEEo3RURBACTRC7vtG0sCSy/75bkMAPEeUw0Wa15rPWEBEm1iyDwTZ0c6Hd/ Oyzre8ZZNnyXkAcACP6kH2NX FonnCHZEhbZJINJzLqlHzPjynRm7rtyW6rL Fiw BGF29n J O8FNUk6PQCLMk6 DSzeKE7NJqdEf K9u6EO1xiqR1pfm3fwzwCg6io/ ZUMmxkpkUJv5cILPEaIoBCkD/08jJfMWBrruxsTvgHalVW7GoUvc87cjId3WxLQ3 JIcjcRHZi4n4CqQTQCNS...Check...

blog.rootshell.be blog.rootshell.be

Security Archives - /dev/random

https://blog.rootshell.be/category/security

If the enemy leaves a door open, you must rush in. – Sun Tzu. SANS ISC Diary] Data Classification For the Masses. August 19, 2016. SANS Internet Storm Center. Continue reading ». SANS ISC Diary] Analyze of a Linux botnet client source code. July 27, 2016. SANS Internet Storm Center. Continue reading ». SANS ISC Diary] Name All the Things! July 15, 2016. SANS Internet Storm Center. I published the following diary on isc.sans.org: “Name All the Things! 8220; With our more and more complex environments and ...

blog.rootshell.be blog.rootshell.be

Tracking SSL Issues with the SSL Labs API - /dev/random

https://blog.rootshell.be/2015/05/18/tracking-ssl-issues-with-the-ssl-labs-api

If the enemy leaves a door open, you must rush in. – Sun Tzu. Tracking SSL Issues with the SSL Labs API. May 18, 2015. The SSL and TLS protocols have been on the front of the stage for months. Besides many vulnerabilities disclosed in the OpenSSL. Library, the deployment of SSL and TLS is not always easy. They are weak cyphers (like RC4), weak signatures, certificates issues (self-signed, expiration or fake ones). Other useful features are mis-understood and not often not configured like PFS. The grade (...

2014.brucon.org 2014.brucon.org

BruCON 2014

http://2014.brucon.org/index.php/One_packer_to_rule_them_all:_Empirical_identification,_comparison_and_circumvention_of_current_Antivirus_detection_techniques

BruCON spring training will be held on 22-24 April 2015 at the Novotel Ghent. BruCON trainings will be on 5-7 October, the conference on 8-9 October 2015. Stay in touch BruCON mail list: subscribe form. We promise to keep the spam level low :-). You can see the videos of 2014 online on our YouTube channel. 3 reasons to book your BruCON training now! August 19, 2014 19:54). Facebook Capture The Flag event @ BruCON 2014 - registration open. August 05, 2014 07:37). May 08, 2014 12:10). April 07, 2014 17:59).

blog.rootshell.be blog.rootshell.be

Deobfuscating Malicious VBA Macro with a Few Lines of Python - /dev/random

https://blog.rootshell.be/2015/05/08/deobfuscating-malicious-vba-macro-with-a-few-lines-of-python

If the enemy leaves a door open, you must rush in. – Sun Tzu. Deobfuscating Malicious VBA Macro with a Few Lines of Python. May 8, 2015. Just a quick post about a problem that security analysts are facing daily… For a while, malicious Office documents are delivered with OLE objects containing VBA macros. Bad guys are always using obfuscation techniques to make the analysis more difficult and (try to) bypass basic filters. This makes the analysis not impossible but boring and time consuming. May 18, 2015.

2014.brucon.org 2014.brucon.org

BruCON 2014

http://2014.brucon.org/index.php/BruCON_2014:General_disclaimer

BruCON spring training will be held on 22-24 April 2015 at the Novotel Ghent. BruCON trainings will be on 5-7 October, the conference on 8-9 October 2015. Stay in touch BruCON mail list: subscribe form. We promise to keep the spam level low :-). You can see the videos of 2014 online on our YouTube channel. 3 reasons to book your BruCON training now! August 19, 2014 19:54). Facebook Capture The Flag event @ BruCON 2014 - registration open. August 05, 2014 07:37). May 08, 2014 12:10). April 07, 2014 17:59).

blog.rootshell.be blog.rootshell.be

What Are You Sharing with Dropbox? - /dev/random

https://blog.rootshell.be/2012/05/19/what-are-you-sharing-with-dropbox

If the enemy leaves a door open, you must rush in. – Sun Tzu. What Are You Sharing with Dropbox? May 19, 2012. Is a well-known online service which allows you to share files between computers. If, in the past few months, new outsiders came on the same market, Dropbox remains the number one. If files are synchronized between Dropbox software clients, they also provide features to share files with third-party who don’t have a Dropbox account. How? By creating “. Dropbox - Get Link. Search across multiple T...

UPGRADE TO PREMIUM TO VIEW 29 MORE

TOTAL LINKS TO THIS WEBSITE

39

SOCIAL ENGAGEMENT



OTHER SITES

trueseats.com trueseats.com

True Seats - TrueSeats.com

Welcome to True Seats, a social media ticketing experience currently in development. Change the way you buy, sell, trade tickets to major sporting and entertainment events.

trueseb.deviantart.com trueseb.deviantart.com

TrueSeb (Seb) - DeviantArt

Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')" class="mi". Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')". Join DeviantArt for FREE. Forgot Password or Username? Deviant for 7 Years. This deviant's full pageview. Last Visit: 14 weeks ago. This is the place where you can personalize your profile! Added to...

trueseb.skyrock.com trueseb.skyrock.com

Blog de TrueSeb - Alter Ego - Skyrock.com

Mot de passe :. J'ai oublié mon mot de passe. Le grand manitou a crée les animaux du monde de Tallac. En leur donnant des formes différentes. Et si on prends les ours par exemple. Certains sont énormes et se régale en mangeant des fruits et du miel. Alors que d'autres sont des bêtes féroces qui dissimulent les troupeaux. Si Booba appartient au 2ème groupe celui des bêtes féroces. Il continuera à attaquer les troupeaux jusqu'à la fin de ces jours c'est certain. Mise à jour :. Abonne-toi à mon blog! Posté ...

truesebi.biz truesebi.biz

TrueSebi | more or less helpful posts of what some call a creative mind.

More or less helpful posts of what some call a creative mind. Verzaubernd: Timestory The Illustrative Collages of Lorenzo Petrantoni. Dribbble – feeding your daily design needs. Quick Trick: Using an SSH enabled machine to quickly build a SOCKS proxy. CFlumen: The real f.lux for Android. On Downloading the State Library. Sterntaler von Kristina Ohlsson. 8220;Judging a book by its cover”…. Nein Dank der vielen Hauptcharaktere wird der Leser mit vielen kleinen Updates zu jeder Zeit des Buches über jeden Ge...

truesec-demo.com truesec-demo.com

Active 24 - Powerful hosting, surprisingly easy

Is hosted by Active 24. Please check later for content on the site. Active 24 is located in the following countries:.

truesec.be truesec.be

TrueSec

An Independent Security Consultant. The next edition of BruCON is already at our doors! Like the previous edition, TrueSec is helping the conference crew by providing online and technical resources and we have again a free Read the Rest…. Tracking The “Patient Zero”. Here is a link to a guest blog post that I wrote for AlienVault about tracking the “patient zero”. The blog post is available here. Happy reading! Because information security is everyone's business. Offensive VS. Defensive Security. However...

truesec.com truesec.com

TrueSec | Leading-edge consulting services and advanced

Kåre Rude Andersen. Mastering System Center 2012 Orchestrator R2. Get the right tools to implement a Dynamic Datacenter using System Center 2012 Orchestrator R2 (SCORCH) and get the confidence to freely work with all components in Orchestrator! Look under the hood! Learn to troubleshoot, identify, analyze and solve critical problems with Markus Lassfolk. Advanced System Center 2012 Operations Manager R2 (Nov 23, 2015). Security Newscast moved to August 28. Win Marcus and Hasains demo laptops at TechEd NA.

truesec.com.br truesec.com.br

TrueSec Soluções

Fones: 55 81 3048.6647 / 3033.6647 - Email: contato@truesec.com.br. Siga-nos nas redes sociais:. Segurança e serviços na nuvem. Soluções de backup e restore. Proteção e gerenciamento de endpoints. Prevenção à perda de dados. Consultoria em infraestrutura e segurança da informação. Segurança da informação da teoria a prática. Cloud Essentials da teoria à prática. Redes de computadores da teoria à prática. Análise de negócios e processos; Planejamento estratégico de sistemas. Soluções de backup e restore.

truesec.mobi truesec.mobi

Active 24 - Powerful hosting, surprisingly easy

Is hosted by Active 24. Please check later for content on the site. Active 24 is located in the following countries:.

truesec.se truesec.se

TrueSec

2015-08-04 - Djupdyk i Storage Spaces. 2015-07-03 - Marcus gör det igen - tilldelas titeln MVP Enterprise Security. 2015-07-02 - Vi rullar ut Micke och Windows 10 i Sverige. 2015-06-30 - Svenska sårbarhetsforskare analyserar phishing-attacker. 2015-06-26 - Andreas Hallberg föreläser på GOTO Copenhagen. 2015-05-11 - Teknisk projektledare till TrueSec. 2015-04-27 - Träffa oss på Best of Ignite i Stockholm. 2015-04-09 - Emil Kvarnhammar får nu berätta om säkerhetsfelet i OS X. 2014-11-17 - IT mot cancer.

trueseclabs.com trueseclabs.com

TrueSec Labs

Cyber Training Solutions to prevent Cybercrime. The CyberLab platform help government agencies, law enforcement and security focused corporations to prevent cybercrime. And cyberterrorism by training employees. In every technical aspect of defensive and offensive cyber security. With an innovative platform, cutting edge knowledge and tailor-made solutions CyberLab closes the gap in traditional Cyber security training. Web Application Hacking - OWASP Top 10. Understand APT:s and targeted attacks. Learn to...