Author's posts
Areas Digital Forensic Investigators Find Evidence
[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …
Another Thawte Notary 10 Points
Today I took a train for 1 hour to a little place called Tsutsujigaoka. This is in Tokyo, but it is probably a part of Tokyo that I would not normally go to. When I got there I was met by a nice German guy who works for a bank. We went to a coffee …
Don’t Choke on Food in the South
Two hillbillies walk into a restaurant. While having a bite to eat, they talk about their moonshine operation. Suddenly, a woman at a nearby table, who is eating a sandwich, begins to cough, and after a minute or so, it becomes apparent that she is in real distress. One of the hillbillies looks at her …
Thawte Notary 10 Points
Today I took the train for about an hour and stopped at Kawasaki to meet a Japanese guy who worked at IBM. We filled out the necessary forms right there in the train station and then I had to fight rush hour traffic for an hour to get back home. That was my first time …
Thawte Notary
I have recently embarked on a new venture and it is to obtain a Thawte web of trust notary status. In order to obtain this status I have to accumulate 100 points by meeting with different people face to face and filling out paperwork that verifies we met face to face and showing my identification …
Billy Bob Gets Deflowered
In a small town in Tennessee, Big Bubba decides it’s time for his son, 14 year old Billy Bob, to learn the facts of life. He takes him to the local house of ill repute, which is fronted by a beauty parlor. Bubba introduces Billy Bob to the madam, and explains that it’s time for …
Internet Protocol Security (IPsec)
Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …
Pretty Good Privacy
Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …
Digital Signature Properties
Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …
Two Plastic Bags
A little old lady was walking down the street dragging two large plastic garbage bags behind her. One of the bags was ripped and every once in a while a $20 fell out onto the sidewalk. Noticing this, a policeman stopped her, and said, “Ma’am, there are $20 bills falling out of that bag. Oh …
Bass Pro Shop
A woman goes into Bass Pro Shop to buy a rod and reel for her grandson’s birthday. She doesn’t know which one to get; so she grabs one and goes over to the counter. A Bass Pro Shop associate is standing there wearing dark glasses. She says, ‘Excuse me, sir. Can you tell me anything …
When Daddy Calls
‘Hello?’ ‘Hi honey. This is Daddy. Is Mommy near the phone?’ ‘No Daddy. She’s upstairs in the bedroom with Uncle Paul.’ After a brief pause, Daddy says, ‘But honey, you haven’t got an Uncle Paul.’ ‘Oh yes I do, and he’s upstairs in the room with Mommy, right now.’ Brief Pause. ‘Uh, okay then, this …
Public-key Directory
Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …
Public-key Cryptography
Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …
How to Stop Him from Snoring
A couple has a dog that snores. Annoyed because she can’t sleep, the wife goes to the vet to see if he can help. The vet tells the woman to tie a ribbon around the dog’s testicles, and he will stop snoring. “Yeah right!” she says. A few minutes after going to bed, the dog …
How the Fight Started
One year, a husband decided to buy his mother-in-law a cemetery plot as a Christmas gift. The next year, he didn’t buy her a gift. When his wife asked him why, he replied, “Well, she still hasn’t used the gift I bought her last year!” And that’s how the fight started… ————————– My wife walked …
R.A.P.E.D
Dear Employees, Due to the current financial situation caused by the slowdown of the economy, Management has decided to implement a scheme to put workers of 40 years of age and above on early retirement…This scheme will be known as RAPE (Retire Aged People Early). Persons selected to be RAPED can apply to management to …
Data Encryption Standard and 3DES
Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …
Link and End-to-End Encryption Techniques
Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …
Aids or Alzheimer’s
The phone rings and the lady of the house answers, ‘Hello, Mrs. Sanders, please. ”Speaking. ‘Mrs. Sanders, this is Doctor James at Saint Agnes Laboratory. When your husband’s doctor sent his biopsy to the lab last week, a biopsy from another Mr. Sanders arrived as well. We are now uncertain which one belongs to your …
She Will Make it Greater
“Whatever you give a woman, she will make greater. If you give her sperm, she’ll give you a baby. If you give her a house, she’ll give you a home. If you give her groceries, she’ll give you a meal. If you give her a smile, she’ll give you her heart. She multiplies and enlarges …