About BryanHalfpap

Bryan Halfpap is a software programmer, technology analyst and writer and a driving force behind the security reporting at CTOvision.com He is a frequent speaker at events and conferences including Defcon. You can find him on twitter: @crypt0s

Choosing Your First Programming Language

Many new programmers struggle when it comes to selecting their first language to learn.  Which is easiest, the most professionally useful, the most newbie-friendly?  Lets find out by showing you a range of options, their strengths and weaknesses, and some information about the most common programming languages in demand today.  At the end, we’ll make […]

5 DC-Area Meetups for Security Pros and Noobs

5 DC-Area Meetups for Hackers, Security Pros, and Enthusiasts: Name: Charmsec Site: http://charmsec.org/ Format: “Happy-Hour” talks When: Last Thursday of the month @ 7:00pm Where: Baltimore Why: A smattering of MD’s Finest.  It’s a bit of a trek for most DC residents but it’s a rewarding social experience for those who attend.  The security community […]

5 Webapps to Add to Your Security Tool Arsenal

When you’re mobile, away from the office, or just caught off-guard without your tools and security setup, you need a way to analyze, assess, and interpret emerging threats on-the-fly.  That’s why these 5 free web applications are absolute must-haves for your Favorites Folder.   Site: http://urlquery.net/index.php Purpose: Visits URLs so you don’t have to. About: […]

John McAfee’s D-Central – A Breakdown

Disclaimer: Information on D-Central is extremely limited.  This article and the assumptions and conclusions it draws is based off of information gathered from John McAfee’s interview at the C2SV Technology Conference and Music Festival. At the C2SV Technology Conference and Music Festival this year, John McAfee (formerly of McAfee Antivirus) talked about a new device […]

The Problem With PEAP

In previous posts (The Wireless Attack Toolkit and What’s Trending For Hackers) I highlighted some common wireless security attacks. If you believe your corporate network has some additional security on top of it, well, this post is aimed directly at you. Modern wireless security protocols have evolved a great deal since their inception with WEP […]

The Wireless Attack Toolkit

Wireless security is all about implementation.  The vendors implementation of the stack, the implementation of the security protocol standards in your OS that you have deployed to your users, the ways that the radios work, and the settings you’ve chosen for your network.  Unfortunately, wireless security is generally weak (unless we’re talking about a properly-deployed […]