PCI/DSS Section 6

The PCI Data Security Standard has some interesting requirements regarding secure coding of applications, particularly web applications. What are your responsibilities? How can your organization satisfy the requirements for training your programmers? Read on!

Read More...

Keeping Cool

What’s the story with all of this talk of freezing memory chips and then extracting RAM after power off? Read on for more information!

Read More...

Magstripe Magic!

Have you ever wondered what exactly is on those magnetic stripes? This article includes some useful information on how the stripes are encoded, examples of how they can be read and, if you’re willing to make the effort, enough information to reconstruct a do-it-yourself card reader!

Read More...

Driving a Hitachi 4x20 LCD

Trying to drive a Hitachi based LCD for the first time through a PIC or similar processor? Look no further!

Read More...

The Dangers of Source Routing

Source routing has been around for a very long time. Even so, many network engineers fail to understand the potential dangers in allowing source routed packets to pass through internal routers.

Read More...

Networking Basics

Are you missing some of the basic fundamentals of how computers and networks work? This is true for many people who are transitioning into IT from other roles, especially in the audit disciplines.

Read More...

Poor Passwords - The Real Risk!

Think your password policy is good enough? Find out about the vulnerability that almost everybody has but almost nobody fixes!

Read More...

About This Blog

Enclave Forensics personnel have been looked to by industry professionals for security advice and solutions for more than ten years.  This blog is intended to give you a window into our research and current projects, especially those portions that we make freely available for the community.  If you have any thoughts or topics that you’d like to see us discuss, please feel free to contact us.