Chris Nowell
Information Security
Englýsh   Franšais   Espa˝ol   Deutsch   Russian   Japanese   Chinese
About Chris Tools and Downloads Presentations, Instructions, and Booklets Links Contact Support
About Chris
I have 18 years of IT experience, speak French and English and hold the following designations:
  • MBA - Indiana University's Kelley School of Business
  • BSc. in Computer Science - University of Lethbridge in Alberta, Canada
  • CISSP® - Certified Information Systems Security Professional
  • CISA® - Certified Information Systems Auditor (scored 87% on the exam)
  • ITIL® Foundations (scored 95% on the exam)
  • TCSP - Trend Micro™ Certified Security Professional
    (5 certifications: TMCM, IMSS, EPS/Threat Analysis, ServerProtect, OfficeScan)

Tools
The Rogue Wireless Access Point Site Survey Triangulator provides an alternative to walk-about tools and expensive installed infrastructure-based tools.

Windows security analysis is repetative and time consuming. The Windows Security Tool does the work for you.

Unix, Solaris, AIX, and Linux security analysis is repetative and time consuming. The Unix Security Tool does the work for you.

This NIST Special Publication 800-63 password policy compliance checker spreadsheet helps to determine if password policies comply with the Electronic Authentication Guideline. Feel free to use it to test your own systems. If you like it, please donate to the development fund.

This little 84KB program from 2002 called Text Cleaner, is presently in use on over 15,470 computers and is still receiving accolades for its user interface and ease of use.

Information
This site contains booklets and PowerPoint presentations to teach non-IT personnel about:
  • IT Foundations
  • Wired network security
  • Wireless network security
  • Spyware and virus removal
Please click here to view these presentations

New
Active Directory Date Converter

Unix Timestamp Date Converter

Unix Security Analyzer

Windows Security Analyzer

NIST SP 800-63 password policy compliance checker

Sponsors
News: ThreatPost
Threatpost | The first stop for security news

Rombertik Malware Can Overwrite MBR if Audited

Google Updates Password Alert Extension, But Some Bypasses Still Work

Sally Beauty Investigating Second Data Breach

Google Patches Clickjacking Bug

News: SecurityFocus
News: Change in Focus

News: Twitter attacker had proper credentials

News: PhotoDNA scans images for child abuse

News: Conficker data highlights infected networks

Brief: Google offers bounty on browser bugs

News: CBC
CBC | Technology News

Urban Death Project: A case for composting your dead body

Will Tesla flip the electricity industry on its head?

Time-lapse video shows every last detail is retouched in high-fashion magazines

Whales have nerves like 'bungee cords,' researchers find

News: CNN
A desktop computer for developing countries

Mayweather-Pacquiao fight plagued by piracy on Periscope, Meerkat

10 fun ways to celebrate Screen-Free Week

Website claims to tell you how old you look

This robot could one day roam the Moon

Statistics

© 2006, 2007, 2008 Christopher A. Nowell, BSc, CISSP, CISA, TCSP

Mesothelioma Survival