Matt Lesko

Matt
Lesko

Matt Lesko is the systems administrator for Advanced DataTools in Annandale, Virginia.

Articles
Performing Forensic Analyses, Part 2
Analyzing a compromised hard disk is a time- and resource-intensive operation. Two tools--Sleuth Kit and Autopsy--can help you with this arduous task.
Performing Forensic Analyses, Part 1
This first installment of a two-part series looks at how to create a bootable CD-ROM and use it to duplicate the hard disk of machine that’s been involved in a security incident.
Building and Using an Incident Response Toolkit, Part 2
In this second installment of a two-part article, you’ll learn how to use an incident response toolkit to quickly collect data from a compromised machine’s file system.
Building and Using an Incident Response Toolkit, Part 1
Quickly and appropriately responding to a computer security incident is vital. Learn how to build a toolkit that lets you quickly collect data from the compromised machine.
Verifying the Download
Follow these steps to verify the WinPT and GnuPG download.
WinPT and GnuPG
WinPT provides a user-friendly GUI front end for the Windows port of GnuPG, a great security tool.
All About GnuPG
Here's a brief history of GNU Privacy Guard and it's capabilities.
Nessus Security Scanner
Nessus Security Scanner is traditionally a UNIX vulnerability scanner, but a new client called NessusWX brings this powerful program's functionality to Windows. Here's how to set it up.
Upcoming Conferences

Register now to get the best rates available!

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×