Dave

Author's posts

Areas Digital Forensic Investigators Find Evidence

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …

Continue reading

Challenges Forensic Investigators Face

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five technology-related challenges that digital forensics investigators are faced with. Also included within this document are solutions to resolve each of the challenges. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Another Thawte Notary 10 Points

Today I took a train for 1 hour to a little place called Tsutsujigaoka. This is in Tokyo, but it is probably a part of Tokyo that I would not normally go to. When I got there I was met by a nice German guy who works for a bank. We went to a coffee …

Continue reading

Don’t Choke on Food in the South

Two hillbillies walk into a restaurant. While having a bite to eat, they talk about their moonshine operation. Suddenly, a woman at a nearby table, who is eating a sandwich, begins to cough, and after a minute or so, it becomes apparent that she is in real distress. One of the hillbillies looks at her …

Continue reading

Thawte Notary 10 Points

Today I took the train for about an hour and stopped at Kawasaki to meet a Japanese guy who worked at IBM. We filled out the necessary forms right there in the train station and then I had to fight rush hour traffic for an hour to get back home. That was my first time …

Continue reading

Thawte Notary

I have recently embarked on a new venture and it is to obtain a Thawte web of trust notary status. In order to obtain this status I have to accumulate 100 points by meeting with different people face to face and filling out paperwork that verifies we met face to face and showing my identification …

Continue reading

Billy Bob Gets Deflowered

In a small town in Tennessee, Big Bubba decides it’s time for his son, 14 year old Billy Bob, to learn the facts of life. He takes him to the local house of ill repute, which is fronted by a beauty parlor. Bubba introduces Billy Bob to the madam, and explains that it’s time for …

Continue reading

Internet Protocol Security (IPsec)

Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …

Continue reading

Pretty Good Privacy

Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …

Continue reading

I Was Drugged

Digital Signature Properties

Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Two Plastic Bags

A little old lady was walking down the street dragging two large plastic garbage bags behind her. One of the bags was ripped and every once in a while a $20 fell out onto the sidewalk. Noticing this, a policeman stopped her, and said, “Ma’am, there are $20 bills falling out of that bag. Oh …

Continue reading

Bass Pro Shop

A woman goes into Bass Pro Shop to buy a rod and reel for her grandson’s birthday. She doesn’t know which one to get; so she grabs one and goes over to the counter. A Bass Pro Shop associate is standing there wearing dark glasses. She says, ‘Excuse me, sir. Can you tell me anything …

Continue reading

Wife 1.0

Dear Tech Support: Last year I upgraded from Girlfriend 7.0 to Wife 1.0. I soon noticed that the new program began unexpected child processing that took up a lot of space and valuable resources. In addition, Wife 1.0 installed itself into all other programs and now monitors all other system activity, such as Poker Night …

Continue reading

When Daddy Calls

‘Hello?’ ‘Hi honey. This is Daddy. Is Mommy near the phone?’ ‘No Daddy. She’s upstairs in the bedroom with Uncle Paul.’ After a brief pause, Daddy says, ‘But honey, you haven’t got an Uncle Paul.’ ‘Oh yes I do, and he’s upstairs in the room with Mommy, right now.’ Brief Pause. ‘Uh, okay then, this …

Continue reading

Public-key Directory

a laptop computer sitting on a stage in front of a building

Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …

Continue reading

Public-key Cryptography

Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …

Continue reading

How to Stop Him from Snoring

A couple has a dog that snores. Annoyed because she can’t sleep, the wife goes to the vet to see if he can help. The vet tells the woman to tie a ribbon around the dog’s testicles, and he will stop snoring. “Yeah right!” she says. A few minutes after going to bed, the dog …

Continue reading

How the Fight Started

One year, a husband decided to buy his mother-in-law a cemetery plot as a Christmas gift. The next year, he didn’t buy her a gift. When his wife asked him why, he replied, “Well, she still hasn’t used the gift I bought her last year!” And that’s how the fight started… ————————– My wife walked …

Continue reading

Women Should Take Their Own Messages

I Like Hores

R.A.P.E.D

Dear Employees, Due to the current financial situation caused by the slowdown of the economy, Management has decided to implement a scheme to put workers of 40 years of age and above on early retirement…This scheme will be known as RAPE (Retire Aged People Early). Persons selected to be RAPED can apply to management to …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Aids or Alzheimer’s

The phone rings and the lady of the house answers, ‘Hello, Mrs. Sanders, please. ”Speaking. ‘Mrs. Sanders, this is Doctor James at Saint Agnes Laboratory. When your husband’s doctor sent his biopsy to the lab last week, a biopsy from another Mr. Sanders arrived as well. We are now uncertain which one belongs to your …

Continue reading

She Will Make it Greater

“Whatever you give a woman, she will make greater. If you give her sperm, she’ll give you a baby. If you give her a house, she’ll give you a home. If you give her groceries, she’ll give you a meal. If you give her a smile, she’ll give you her heart. She multiplies and enlarges …

Continue reading

Shibuya Crossing

Went to Shibuya crossing in Tokyo, Japan today. Here are some of the photos of the experience. You can see Tower records, Disney store, and the most busy intersection in the world.

It’s Just a Catfish

This would be ‘all the catfish you can eat.’ Each year, a few people were drowning or disappearing mysteriously in Huadu, China’s Furong Reservoir. It was not until recently, when the son of a government official went swimming, in the reservoir and was drowned, that the secret was revealed. It is a 3 meter long …

Continue reading

Encryption Techniques

[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …

Continue reading

Definition Distinction Between Guts and Balls

We’ve all heard about people “having guts” or “having balls”. But do you really know the difference between them? In an effort to keep you informed, the definition for each is listed below… Guts – is arriving home late after a night out with the guys, being met by your wife with a broom, and …

Continue reading