Project

project

This is a leitmotif. You can only get away from it by scrolling down.

I make no claim at all to be a cartoonist (let alone a real artist). However, some people seem to like my cheesy little (mostly IT-related) cartoons, photos, and cheap sarcasm, so I figured I might start putting them together in the same place. That doesn’t mean you won’t find them elsewhere, though. You don’t escape that easily.

If you like I can has cheezburger or Gary Larson, or XKCD, or secmeme, you’ll be totally underwhelmed by this. On the other hand, if it raises the faintest suggestion of a wry smile, you might also like Parodies Regained, which stays firmly in my comfort zone (i.e. is almost entirely textual content).

I tweet everything I publish via @davidharleyblog, if you really can’t get enough. Be warned, a lot of the other stuff is Very Serious.

David Harley BA ex-CITP ex-FBCS ex-CISSP
Small Blue-Green World
ESET Senior Research Fellow
(See? Nothing to indicate any artistic merit.)

[Licensed under Creative Commons Attribution-NonCommercial 3.0 License. See the About page.]

Advertisements

About David Harley

David Harley is an IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing, and management of email abuse.

Harley has worked in IT since the mid-1980s, working initially at the Royal Free Hospital in London. From 1989 to 2001 he worked for the Imperial Cancer Research Fund (now Cancer Research UK), where he eventually moved into full-time security. In 2001 he rejoined the National Health Service where he ran the Threat Assessment Centre. Since leaving the NHS in 2006 to work as an independent consultant, he has worked closely with the security company ESET where since 2011 he holds the position of Senior Research Fellow.  In 2009 he was elected to the Board of Directors of the Anti-Malware Testing Standards Organization (AMTSO), but stood down in February 2012, when Righard Zwienenberg, president of AMTSO, joined ESET, so that there wouldn’t be more than one Board member representing the same AMTSO member entity.

Bibliography

  • Anonymous; et al. (2001). Maximum Security Third Edition. SAMS. Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
  • Harley, David, Robert Slade and Urs E. Gattiker (2001). Viruses Revealed. McGraw-Hill Companies.  Co-Author.
  • Anonymous; et al. (2002). Maximum Security Fourth Edition. SAMS. ISBN 0-672-32459-8. Revised Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
  • Bosworth, Seymour, Kabay M.E.; et al. (2002). Computer Security Handbook. John Wiley. Co-wrote Chapter 49, “Medical Records Security” with Paul Brusil.
  • Paulus, S., Pohlmann N., Reimer, H.; et al. (2004). ISSE 2004: Securing Electronic Business Processes. Vieweg. Massmailers: New Threats Need Novel Anti-Virus Measures.
  • Bidgoli, Hossein; et al. (2006). Handbook of Information Security. Wiley. Volume 3, “E-Mail Threats and Vulnerabilities.”
  • Schiller, Craig A.,, Binkley, Jim; et al. (2007). Botnets: the Killer Web App. Syngress. Co-wrote Chapter 5, “Botnet Detection: Tools and Techniques” with Jim Binkley.
  • Harley, David; et al. (2007). AVIEN Malware Defense Guide for the Enterprise. Syngress. ISBN 978-1-59749-164-8. (Editor, technical editor, several chapters.)
  • Baccas, Paul; et al. (2008). OS X Exploits and Defense. Syngress. Chapter 3: “Malicious Macs: Malware and the Mac.” Chapter 4: “Malware Detection and the Mac.”
  • Bidgoli, Hossein; et al. (2008). The Handbook of Computer Networks. Wiley. Volume 3, “E-Mail Threats and Vulnerabilities.”
  • Eddy Willems (in process). Cyberdanger (already published in Dutch and German). Translation, review, editing, contributing some content.

Most of his writing since joining ESET is available here:

Most of his writing for other magazines, web sites etc. is available from or via the Geek Peninsula blog, as are most of the above writing.

Among his other security-related (sometimes) blogs are:

Ghost Writers in the Sky

Facebook is suggesting that I allow James Patterson to teach me writing. (Well, I suppose he has sold a lot more books than I have.) Apparently I can learn every part of his book writing process.

I wonder if that includes finding a co-author to do the actual writing?

I suppose I shouldn’t be snide about this: it’s obviously working posthumously for Robert Ludlum and Tom Clancy. Thank heavens it never occurred to Barbara Cartland.

David Harley

The Fake Conference Season Opens

Even the fake conference crowd are trying to drag me back into testing (again). Yes, ‘Making sense of comparative anti-malware testing’ sounds like a perfect fit for the World Gene Convention. Not. I’d have been more impressed if they’d picked up on my long-gone and rather peripheral connection with the Human Genome Project.

At least the repeated invitations to a dodgy forensics conference have some theoretical relevance to what I do now.

But seems that the Gene Genie has just picked up an article I wrote of Elsevier in 2009. Or, more probably, just the abstract.

F minus for effort. F double minus for ‘would you please respond to our earlier spam?’

David Harley