Matt Lesko

Matt
Lesko

Matt Lesko is the systems administrator for Advanced DataTools in Annandale, Virginia.

Articles
Performing Forensic Analyses, Part 2
Analyzing a compromised hard disk is a time- and resource-intensive operation. Two tools--Sleuth Kit and Autopsy--can help you with this arduous task.
Performing Forensic Analyses, Part 1
This first installment of a two-part series looks at how to create a bootable CD-ROM and use it to duplicate the hard disk of machine that’s been involved in a security incident.
Building and Using an Incident Response Toolkit, Part 2
In this second installment of a two-part article, you’ll learn how to use an incident response toolkit to quickly collect data from a compromised machine’s file system.
Building and Using an Incident Response Toolkit, Part 1
Quickly and appropriately responding to a computer security incident is vital. Learn how to build a toolkit that lets you quickly collect data from the compromised machine.
Verifying the Download
Follow these steps to verify the WinPT and GnuPG download.
WinPT and GnuPG
WinPT provides a user-friendly GUI front end for the Windows port of GnuPG, a great security tool.
All About GnuPG
Here's a brief history of GNU Privacy Guard and it's capabilities.
Nessus Security Scanner
Nessus Security Scanner is traditionally a UNIX vulnerability scanner, but a new client called NessusWX brings this powerful program's functionality to Windows. Here's how to set it up.

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×