Uncategorised
Article Count: 5Downloads
Article Count: 0Downloadable content, software and other information provided free of charge and in some cases under the GNU/GPL License agreement. Please note that some of the content herein may accompany source code within it's respective language for modification, or fine-tuning.
Please note that if changes are made to code and redistributed you MUST resubmit the information to Network Defense Solutions, Inc. to re-port the changes and provide credit to the contributing author.
Warning: Undefined property: Joomla\Component\Content\Site\View\Categories\HtmlView::$level in /home/networkdefensesolutions/public_html/plugins/system/helixultimate/overrides/com_content/categories/default_items.php on line 56
Information Leakage
Article Count: 1Various methods information may be leaked out of your network without proper knowledge, and how to limit the information that is leaked.
Forensics
Article Count: 9A collection of papers and how-to guides to assist with computer forensics on Windows, Linux, Unix, MacOS / OSX, iOS and Android operating systems. These papers may include free open-source tools, custom written applications by Network Defense Solutions, Inc. as well as professional tools such as FTK, EnCase as well as Autopsy / Sleuth Kit.
Products
Article Count: 3Here you will find information regarding any products and services we produce to help keep your systems and web locations safe. Network Defense Solutions, Inc. is launching a new product line that will enable small business owners to protect their assets and information from breaches, and manage an investigation. You can choose any of the products below for more information.
Malware Analysis & Phishing Analysis
Article Count: 47Services
Article Count: 2Off-Site / On-Site Data Backup
Article Count: 3Server & Web Security
Article Count: 9End-Point Services
Article Count: 3Does your company need to get a handle on Phishing, Malware, ransomware or backups for recovery? Are you struggling with security and how to protect your environment? Here you will find a set of services we provide to not only protect your end-points but also your data and the information you need to protect. From malware to backups, security policies, repairs, upgrades and more!
Virtualization Services
Article Count: 2On-Site Data Backup & Virtualization
Article Count: 1Training & Education
Article Count: 1SOC Consulting
Article Count: 7Looking for services and resources to help you build or, add value to your SOC? We have over 25 years of experience with responding to incidents, providing training for L1 and, L2 Analyst roles, building tooling for Incident Response, Malware & Phishing Analysis, Criticality Matrix Development, SOP (Standard Operating Procedures) development, forensic acquisition with both open-source tools and, professional tools as well as insight into logging and, monitoring. With hands-on training and, industry related best practices we can help you achieve a well rounded SOC to help keep your business, assets and data protected. Find out how!
Incident Response
Article Count: 4System Hardening
Article Count: 0Linux / OSX / MacOS Hardening
Article Count: 4Methods and white papers showing you how to secure your *NIX installation, servers or desktop.