Chris Nowell
Information Security
Englýsh   Franšais   Espa˝ol   Deutsch   Russian   Japanese   Chinese
About Chris Tools and Downloads Presentations, Instructions, and Booklets Links Contact Support
About Chris
I have 18 years of IT experience, speak French and English and hold the following designations:
  • MBA - Indiana University's Kelley School of Business
  • BSc. in Computer Science - University of Lethbridge in Alberta, Canada
  • CISSP® - Certified Information Systems Security Professional
  • CISA® - Certified Information Systems Auditor (scored 87% on the exam)
  • ITIL® Foundations (scored 95% on the exam)
  • TCSP - Trend Micro™ Certified Security Professional
    (5 certifications: TMCM, IMSS, EPS/Threat Analysis, ServerProtect, OfficeScan)

Tools
The Rogue Wireless Access Point Site Survey Triangulator provides an alternative to walk-about tools and expensive installed infrastructure-based tools.

Windows security analysis is repetative and time consuming. The Windows Security Tool does the work for you.

Unix, Solaris, AIX, and Linux security analysis is repetative and time consuming. The Unix Security Tool does the work for you.

This NIST Special Publication 800-63 password policy compliance checker spreadsheet helps to determine if password policies comply with the Electronic Authentication Guideline. Feel free to use it to test your own systems. If you like it, please donate to the development fund.

This little 84KB program from 2002 called Text Cleaner, is presently in use on over 15,470 computers and is still receiving accolades for its user interface and ease of use.

Information
This site contains booklets and PowerPoint presentations to teach non-IT personnel about:
  • IT Foundations
  • Wired network security
  • Wireless network security
  • Spyware and virus removal
Please click here to view these presentations

New
Active Directory Date Converter

Unix Timestamp Date Converter

Unix Security Analyzer

Windows Security Analyzer

NIST SP 800-63 password policy compliance checker

Sponsors
News: ThreatPost
Threatpost | The first stop for security news

House Takes First Steps on Federal Data Breach Law

GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems

Venafi to Launch Certificate Transparency Log

Analysis of Flash Zero Day Shows Layers of Obfuscation

News: SecurityFocus
News: Change in Focus

News: Twitter attacker had proper credentials

News: PhotoDNA scans images for child abuse

News: Conficker data highlights infected networks

Brief: Google offers bounty on browser bugs

News: CBC
CBC | Technology News

Fossils mistaken for lizards turn out to be oldest snakes ever found

Ontario to ban acquisition and sale of killer whales

Private space taxis expected to save NASA millions

Facebook says hackers can't take credit for huge outage

News: CNN
Facebook, Instagram goes down; Twitter freaks out

Laser-transformed metal so slick that water bounces off

Asteroid's moon seen during Earth flyby

See how technology is revolutionizing modern policing

Gaming to death: What turns a hobby into a health hazard?

Statistics

© 2006, 2007, 2008 Christopher A. Nowell, BSc, CISSP, CISA, TCSP

Mesothelioma Survival