Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Richard Bejtlich

Happy 22nd Birthday TaoSecurity Blog

Posted on January 8, 2025 by Richard Bejtlich

Happy birthday TaoSecurity Blog, born on this day in 2003!The best way to digest the key lessons from this site is to browse my four volume Best of TaoSecurity Blog book series, published in 2020. It’s available in print as seen here, or as a properly … Continue reading Happy 22nd Birthday TaoSecurity Blog→

Posted in Uncategorized

Happy 22nd Birthday TaoSecurity Blog

Posted on January 8, 2025 by Richard Bejtlich

Happy birthday TaoSecurity Blog, born on this day in 2003!The best way to digest the key lessons from this site is to browse my four volume Best of TaoSecurity Blog book series, published in 2020. It’s available in print as seen here, or as a properly … Continue reading Happy 22nd Birthday TaoSecurity Blog→

Posted in Uncategorized

What Are Normal Users Supposed to Do with IDS Alerts from Network Gear?

Posted on October 11, 2024 by Richard Bejtlich

Probably once a week, I see posts like this in the r/Ubiquiti subreddit. Ubiquiti makes network gear that includes an “IDS/IPS” feature. I own some older Ubiquiti gear so I am familiar with the product.When you enable this feature, you get alerts like … Continue reading What Are Normal Users Supposed to Do with IDS Alerts from Network Gear?→

Posted in nsm

My First Book Is 20 Years Old Today

Posted on July 15, 2024 by Richard Bejtlich

On this day in 2004, Addison-Wesley/Pearson published my first book, The Tao of Network Security Monitoring: Beyond Intrusion Detection.This post from 2017 explains the differences between my first four books and why I wrote Tao. Today, I’m always… Continue reading My First Book Is 20 Years Old Today→

Posted in TAO, writing

Retrieving Deleted Files on the Commodore C64 in 1987

Posted on May 29, 2024 by Richard Bejtlich

When I was a sophomore in high school, from 1987 to 1988, my friend Paul and I had Commodore C64 computers. There was a new graphical user interface called GEOS that had transformed the way we interacted with our computers. We used the C64 to play game… Continue reading Retrieving Deleted Files on the Commodore C64 in 1987→

Posted in commodore

My Last Email with W. Richard Stevens

Posted on June 25, 2023 by Richard Bejtlich

 In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens. About a year later I exchanged emails with Mr. Stevens. Here is the last exchange, as forwa… Continue reading My Last Email with W. Richard Stevens→

Posted in Uncategorized

Bejtlich Skills and Interest Radar from July 2005

Posted on June 25, 2023 by Richard Bejtlich

This is unusual. I found this “skills and interest radar” diagram I created in July 2005. It looks like my attempt to capture and prioritize technical interests. At the time I was about to start consulting on my own, IIRC.Copyright 2003-2020 Richard Be… Continue reading Bejtlich Skills and Interest Radar from July 2005→

Posted in Uncategorized

Key Network Questions

Posted on June 25, 2023 by Richard Bejtlich

 I wrote this on 7 December 2018 but never published it until today. The following are the “key network questions” which “would answer many key questions about [a] network, without having to access a third party log repository. This data is derive… Continue reading Key Network Questions→

Posted in nsm

Cybersecurity Is a Social, Policy, and Wicked Problem

Posted on June 25, 2023 by Richard Bejtlich

Cybersecurity is a social and policy problem, not a scientific or technical problem. Cybersecurity is also a wicked problem. In a landmark 1973 article, Dilemmas in a General Theory of Planning, urban planners Horst W. J. Rittel and Melvin M. Webber de… Continue reading Cybersecurity Is a Social, Policy, and Wicked Problem→

Posted in Uncategorized

Core Writing Word and Page Counts

Posted on June 25, 2023 by Richard Bejtlich

I want to make a note of the numbers of words and pages in my core security writings.The Tao of Network Security Monitoring / 236k words / 833 pagesExtrusion Detection / 113k words / 417 pagesThe Practice of Network Security Monitoring / 97k words / 38… Continue reading Core Writing Word and Page Counts→

Posted in Uncategorized

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • TH: Hacker steals personal data of 350,000 engineers April 26, 2026
  • KR: Data of 100,000 leaked from Lee & Lee Country golf club; N. Korean hacking suspected April 26, 2026
  • New Problem for NASA’s ‘Lunar Gateway’: Corrosion in Two Modules Caused by Supplier April 26, 2026
  • Own a Hisense TV? I’d change these expert settings to noticeably improve the picture quality April 26, 2026
  • How Teachers Fight Students’ Shortening Attention Spans Shorter Activities, Hands-On Projects, and Meditation April 26, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up