Christian Seifert

March 9, 2012

Release of WoLF Viz

Frasier, who participated in our recent visualization forensic challenge has released his visualization tool WoLF Viz at http://code.google.com/p/wolf-viz/. WoLF Viz works by parsing arbitrary text log […]
March 5, 2012

Last chance for early bird registration

Early bird registration to our 2012 Honeynet Project Security Workshop ends today. The workshop will be held at the Facebook offices in the SF Bay Area. […]
January 24, 2012

2012 Honeynet Project Security Workshop @ Facebook, Inc. – SF Bay Area, CA, USA – March 19th/20th 2012

The Honeynet Project will hold its 2nd public security workshop at Facebook, Inc. in the San Francisco Bay Area. The workshop is going to be a […]
November 1, 2011

Android Reverse Engineering (A.R.E.) Virtual Machine available for download now!

The Honeynet Project is happy to announce the release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android […]
October 13, 2011

Google Summer of Code 2011- Wrap up

In 2011, the Honeynet Project had once again the opportunity to participate in the Google Summer of Code program. In the last few weeks, we wrapped […]
April 25, 2011

Google SoC 2011 – Accepted Projects Announced

Folks, Google has just announced the accepted projects on the GSoc website. We had an excellent line up of students and proposals this year and were […]
March 26, 2011

Forensic Challange 7 – Only 5 days left!

Folks, challenge 7 – forensic analysis of a compromised server – put up by Hugo Gonzalez from the Mexico Chapter and Guillaume Arcas from the French […]
March 22, 2011

First-Ever Public Honeynet Project Security Workshop – Slides Online

Folks, we had a great day at the first-ever public Honeynet Project Security Workshop yesterday with many excellent presentations by our members from around the globe. […]
January 22, 2011

Forensic Challenge 2010/5 – Log Mysteries – What Apache version was used?

Carl Pulley, a loyal follower of our Forensic Challenges, has written up an analysis on how could one determine the Apache version that generated the logs. […]