Matt Lesko

Matt
Lesko

Matt Lesko is the systems administrator for Advanced DataTools in Annandale, Virginia.

Articles
Performing Forensic Analyses, Part 2
Analyzing a compromised hard disk is a time- and resource-intensive operation. Two tools--Sleuth Kit and Autopsy--can help you with this arduous task.
Performing Forensic Analyses, Part 1
This first installment of a two-part series looks at how to create a bootable CD-ROM and use it to duplicate the hard disk of machine that’s been involved in a security incident.
Building and Using an Incident Response Toolkit, Part 2
In this second installment of a two-part article, you’ll learn how to use an incident response toolkit to quickly collect data from a compromised machine’s file system.
Building and Using an Incident Response Toolkit, Part 1
Quickly and appropriately responding to a computer security incident is vital. Learn how to build a toolkit that lets you quickly collect data from the compromised machine.
Verifying the Download
Follow these steps to verify the WinPT and GnuPG download.
WinPT and GnuPG
WinPT provides a user-friendly GUI front end for the Windows port of GnuPG, a great security tool.
All About GnuPG
Here's a brief history of GNU Privacy Guard and it's capabilities.
Nessus Security Scanner
Nessus Security Scanner is traditionally a UNIX vulnerability scanner, but a new client called NessusWX brings this powerful program's functionality to Windows. Here's how to set it up.
Microsoft Stack Master Class

Master-Level Microsoft Stack Class with John Savill
Online Class: Thursdays Oct. 12th-Dec. 21st
30 Hours of Training for $995!

Understand the complete Microsoft solution stack, how the products work together, and how to implement and maintain for a total datacenter and desktop solution. This course covers the latest technology updates including Windows Server 2016 and Windows 10 and will enable the new capabilities to be leveraged in your organization.

 

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×