Chris Nowell
Information Security
Englýsh   Franšais   Espa˝ol   Deutsch   Russian   Japanese   Chinese
About Chris Tools and Downloads Presentations, Instructions, and Booklets Links Contact Support
About Chris
I have 18 years of IT experience, speak French and English and hold the following designations:
  • MBA - Indiana University's Kelley School of Business
  • BSc. in Computer Science - University of Lethbridge in Alberta, Canada
  • CISSP® - Certified Information Systems Security Professional
  • CISA® - Certified Information Systems Auditor (scored 87% on the exam)
  • ITIL® Foundations (scored 95% on the exam)
  • TCSP - Trend Micro™ Certified Security Professional
    (5 certifications: TMCM, IMSS, EPS/Threat Analysis, ServerProtect, OfficeScan)

Tools
The Rogue Wireless Access Point Site Survey Triangulator provides an alternative to walk-about tools and expensive installed infrastructure-based tools.

Windows security analysis is repetative and time consuming. The Windows Security Tool does the work for you.

Unix, Solaris, AIX, and Linux security analysis is repetative and time consuming. The Unix Security Tool does the work for you.

This NIST Special Publication 800-63 password policy compliance checker spreadsheet helps to determine if password policies comply with the Electronic Authentication Guideline. Feel free to use it to test your own systems. If you like it, please donate to the development fund.

This little 84KB program from 2002 called Text Cleaner, is presently in use on over 15,470 computers and is still receiving accolades for its user interface and ease of use.

Information
This site contains booklets and PowerPoint presentations to teach non-IT personnel about:
  • IT Foundations
  • Wired network security
  • Wireless network security
  • Spyware and virus removal
Please click here to view these presentations

New
Active Directory Date Converter

Unix Timestamp Date Converter

Unix Security Analyzer

Windows Security Analyzer

NIST SP 800-63 password policy compliance checker

Sponsors
News: ThreatPost
Threatpost | The first stop for security news

Unusual Re-Do of US Wassenaar Rules Applauded

Threatpost News Wrap, July 31, 2015

FBI Warns of Increase in DDoS Extortion Scams

Xen Patches VM Escape Flaw

News: SecurityFocus
News: Change in Focus

News: Twitter attacker had proper credentials

News: PhotoDNA scans images for child abuse

News: Conficker data highlights infected networks

Brief: Google offers bounty on browser bugs

News: CBC
CBC | Technology News

HitchBOT destroyed in Philadelphia, ending U.S. tour

Trophy hunting in Canada has issues, too

Backyard beekeeping getting a lot of buzz in L.A.

Blue moon: Striking photos from around the world

News: CNN
Number of women studying computer science drops 50% since '80s

How to take the perfect Instagram shot

How technology identified Jamestown settlers

Cell phones and risk of brain tumor

Google Street View takes on Mongolia

Statistics

© 2006, 2007, 2008 Christopher A. Nowell, BSc, CISSP, CISA, TCSP

Mesothelioma Survival