Sunday, February 04, 2007

Writing a book?

I did something the other day that I haven't had the opportunity to do in a while: visited a bookstore to browse for a new addition to my library.

As some of you may know, I'm past the point of needing a purely technical book. Most of my interests involve more than just learning a new tool. I was hoping to find a good book on "complex attack heuristics", but that is not a field that lends itself to a single book. Since most books are about "how" and not "why", I think I'm out of luck.

So, unless any of you know of a good book on risk-based analysis of audit trails, logfile correlation, or event scoring algorithms which maintain representations of known attack scenarios, I will probably start researching to write my own.

For this, I'll need as many post-intrusion analysis reports and logfiles as I can find. Reply if you have any good sources.

Friday, February 02, 2007

Something completely different

So, my wife let me get a nice Christmas present for myself this year:  Alienware m9700 laptop.  This thing is sweet, with dual video cards, 17” screen, and the works.  My only problem is that I can’t get a Linux distribution to work on it, except Fedora FC6.  Fedora, and Redhat in general, are bloated.  I’d like something lean to run on it that can customize itself to my system, like Gentoo.


Well, I started with FC6 just to get my feet wet.  FC6 went on, I downloaded, compiled, installed the drivers for my rtl8185 wireless card, and tried to get this beast to join my wireless network.  Wpa_supplicant will not work, so I had to downgrade to WEP on my network to get it online. 


Today, and for the near future, I intend to try for Gentoo again.  Gentoo is good in that it allows itself to be completely customized to this system, right down to custom compilation of software.  Unfortunately, getting it to boot and work on this laptop won’t be easy.


Wish me luck…