Frasier, who participated in our recent visualization forensic challenge has released his visualization tool WoLF Viz at http://code.google.com/p/wolf-viz/. WoLF Viz works by parsing arbitrary text log […]
Early bird registration to our 2012 Honeynet Project Security Workshop ends today. The workshop will be held at the Facebook offices in the SF Bay Area. […]
The Honeynet Project is happy to announce the release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android […]
In 2011, the Honeynet Project had once again the opportunity to participate in the Google Summer of Code program. In the last few weeks, we wrapped […]
Folks, Google has just announced the accepted projects on the GSoc website. We had an excellent line up of students and proposals this year and were […]
Folks, challenge 7 – forensic analysis of a compromised server – put up by Hugo Gonzalez from the Mexico Chapter and Guillaume Arcas from the French […]
Folks, we had a great day at the first-ever public Honeynet Project Security Workshop yesterday with many excellent presentations by our members from around the globe. […]
Carl Pulley, a loyal follower of our Forensic Challenges, has written up an analysis on how could one determine the Apache version that generated the logs. […]