Archive for the ‘Malware Hunter’ Category

Install Ubuntu Linux on external USB hard drive (How-To)

If you are a beginning or intermediate Linux enthusiast, this ‘How-To’ provides an in-depth, step-by-step guide on how to install Ubuntu Linux 10.04 (Lucid Linux) on an external USB hard drive. You can purchase one of these drives for less than $50 US. Having a full and bootable Ubuntu distro on one of these drives provides greater flexibility than installing it on a dedicated workstation.

I am a huge fan of Ubuntu Linux. Ever since the release 06.06 (‘Dapper Drake’) on August 10, 2006, Ubuntu is my distro of choice. I always carry a bootable USB stick containing the latest distro loaded with tools. It is really incredible how handy this is in my day-to-day IR and forensic work. I also a big fan of those small portable external USB drives sold by Western Digital, Seagate, Toshiba, etc.

It is quite easy to install Ubuntu Linux on an external USB drive. I have about half a dozen of these drives with Ubuntu installed – dedicated to specific purposes. One of these drives is used as my development and test environment for my soon to be released (and free) McAfee Command Line Scanner Project (MCLSP). I will have more to say about this in future posts; suffice it to say this project provides a bootable version of Ubuntu Linux that runs the ‘McAfee Windows Command Line Scanner’ on Linux! This is one very cool tool.

Download the ‘How-To’ and give Ubuntu Linux a test drive. One word of caution for those of you who wondering if the install instructions will work on a USB thumb drive. The answer is yes, it will work. I suggest, however, that you don’t do it. I have tested it and discovered running a full blown version of Ubuntu from a thumb drive is agonizingly slow. Remember, ‘installing’ a Linux distro on a thumb drive is different than creating a ‘ramdisk’ version. I will have more to say about this later.


Secure and un-clutter your life (How-To)

If you are like me, you have little tolerance for unsolicited telemarketing calls  and junk mail credit card and insurance solicitations. Another concern we share as security professionals is identity theft. About a year ago, I did a lot of research into these topics and developed a systematic approach to end the intrusive calls, remove 95% of the junk mail in my residential mailbox, and lock down my credit.

I wrote a ‘How-To’ to walk you through the simple steps of taking back ownership of your phones, mailbox and credit. The document is posted on the ‘How-To’ page. These simple steps really work. The only calls I get are from organizations that congress (foolishly) exempted from the ‘Do-Not-Call’ laws, such as political campaigns and non-profits. I get zero credit card and insurance solicitations. I also have security freezes on my credit from all three bureaus making it nearly impossible for an extension of credit in my name without my knowing about it.

Download this ‘How-To’ and send it to your friends and relatives.


My little corner of the Internet

I am a digital security consultant currently working for Foundstone, a division of McAfee. Long on my ‘To-Do’ list is an entry to create a blog. On the last day of 2010 – I can check this item as complete. I now have a blog.

The focus of my blog is emergency incident response (IR)  and digital forensics. This is my world. What I love to do. In fact, I spend most of my life on the road assisting organizations deal with emergency security incidents.

Here I will post items of interest I learn along the way. I also have a passion for creating useful (and free)  IR and forensic tools. I will post these also as I complete the proper documentation.

I am committed to fighting Internet evil, even if it has to be done one computer at a time.

Tonight I will raise my champagne glass and honor all you ‘White Hats’  who fight the good fight and never give up.



You are currently browsing the archives for the Malware Hunter category.