Matt Lesko


Matt Lesko is the systems administrator for Advanced DataTools in Annandale, Virginia.

Performing Forensic Analyses, Part 2
Analyzing a compromised hard disk is a time- and resource-intensive operation. Two tools--Sleuth Kit and Autopsy--can help you with this arduous task.
Performing Forensic Analyses, Part 1
This first installment of a two-part series looks at how to create a bootable CD-ROM and use it to duplicate the hard disk of machine that’s been involved in a security incident.
Building and Using an Incident Response Toolkit, Part 2
In this second installment of a two-part article, you’ll learn how to use an incident response toolkit to quickly collect data from a compromised machine’s file system.
Building and Using an Incident Response Toolkit, Part 1
Quickly and appropriately responding to a computer security incident is vital. Learn how to build a toolkit that lets you quickly collect data from the compromised machine.
Verifying the Download
Follow these steps to verify the WinPT and GnuPG download.
WinPT and GnuPG
WinPT provides a user-friendly GUI front end for the Windows port of GnuPG, a great security tool.
All About GnuPG
Here's a brief history of GNU Privacy Guard and it's capabilities.
Nessus Security Scanner
Nessus Security Scanner is traditionally a UNIX vulnerability scanner, but a new client called NessusWX brings this powerful program's functionality to Windows. Here's how to set it up.

Join the Conversation

Get answers to questions, share tips, and engage with the IT professional community at myITforum. Are you a data center professional? Join AFCOM for the best data center insights.

Sponsored Introduction Continue on to (or wait seconds) ×