Prevent expensive incidents and outages before they strike.

The key to trouble-free computing is an intelligently crafted, well managed defensive security strategy. No off-the-shelf product or service can provide this, nor can just any vendor. It takes a partner committed to understanding your environment and developing the right plan to safeguard your sensitive systems, networks, and customer records.


Scott Brown is a professional software developer and computer security expert. He has extensive industry and field experience in system administration, application development, and security management.

Read More


Scott works with individuals and businesses in the Los Angeles area and online to protect their vital data, fortify their security posture, and realize the maximum potential of their technology investments.

Read More


You don't have to go it alone in today's hazardous computing environment or become an IT expert yourself just to keep your business running smoothly. Let's discuss your idea, project, or problem.

Read More

TrueCrypt 7.1 Released

Sparse remarks in the changelog for today’s updated release of the TrueCrypt free open-source disk encryption tool, version 7.1, the first new release in nearly a year. Primarily it looks like they have added support for Mac OS X 10.7 Lion. I venture the usual assessment that this update may safely be viewed as optional for users already running at least TrueCrypt 7.0, the most recent major release, absent those experiencing any specific issues. …

SSH Scans by Region

Network Attackers: Where In The World 3

Two previous rounds of analysis using IP geolocation with Whois (Part 1 and Part 2) revealed that 40% to 45% of network intrusion attempts arriving at my public-facing SSH port could be traced back to Chinese hackers, and 20% to 25% to attackers in Russia and Eastern Europe. The tally is now in from a third round of observations, boasting a significantly longer integration period (more than four months versus about six to seven weeks in the earlier rounds) and yielding plenty of interesting and even unexpected results. …

TrueCrypt 6.3 Released

The latest maintenance release of disk encryption tool TrueCrypt made general availability today, adding most notably updated operating system support, including support for Windows 7 and Mac OS X 10.6. The release notes don’t indicate anything terrifically critical, so this release may be viewed as optional for users already running at least TrueCrypt 6.1a, the last “highly recommended” maintenance update. That being said, I’ll be immediately updating all installations. …

TrueCrypt Traveler Disk Setup

Applications of TrueCrypt, Part 1: Encrypted CDs

I previously discussed the merits of disk encryption as a countermeasure against the physical theft of portable computers and the leakage of private and confidential records that could ensue. But Full Disk Encryption is just scratching the surface of what can be done; the concept can and should be extended to all types of storage media, including portable media. I am currently using TrueCrypt‘s encrypted file-container volume capabilities to create encrypted CD-R’s and USB memory sticks both as part of my own regular secure backup and data vaulting operations and in the implementation of secure backup and data portability solutions for my customers. …