How To Perform a Bug Sweep

A brief guide to Technical Security Counter Measure (TSCM) operations for the professional information security specialist or the professional paranoid.

read more | digg story

Advertisements
Posted in Uncategorized. Leave a Comment »

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: