Wednesday, May 16, 2018 is now

We have moved the content formerly hosted on, to This will allow me to be more focused on the topic of Information Security.

Thanks for your continued interest and support.

Monday, October 30, 2017

Finding Malware in a Memory Image

The following slides were take from a presentation I made at the Jamaica Computer Society's 2017 Conference, on October 19, 2017.

Malware Can Run, But Can't Hide... in a Memory Image

This talks is intended to show how memory forensics can be used during incident response to detect the presence of running zero-day malware.

Direct Link:

Wednesday, August 30, 2017

Network Scans using built-in Windows Commands

There are several tools currently available today, for performing active reconnaissance on a network. However most persons don't realize that Windows comes with the built-in tools to discover computers and open ports on a network.

Here are three (3) commands that may be useful in your next security assessment.