This is a leitmotif. You can only get away from it by scrolling down.
I make no claim at all to be a cartoonist (let alone a real artist). However, some people seem to like my cheesy little (mostly IT-related) cartoons, photos, and cheap sarcasm, so I figured I might start putting them together in the same place. That doesn’t mean you won’t find them elsewhere, though. You don’t escape that easily.
If you like I can has cheezburger or Gary Larson, or XKCD, or secmeme, you’ll be totally underwhelmed by this. On the other hand, if it raises the faintest suggestion of a wry smile, you might also like Parodies Regained, which stays firmly in my comfort zone (i.e. is almost entirely textual content).
I tweet everything I publish via @davidharleyblog, if you really can’t get enough. Be warned, a lot of the other stuff is Very Serious.
David Harley BA ex-CITP ex-FBCS ex-CISSP
Small Blue-Green World
ESET Senior Research Fellow
(See? Nothing to indicate any artistic merit.)
[Licensed under Creative Commons Attribution-NonCommercial 3.0 License. See the About page.]
Quite right too. All dogs should be in bed by 7.15.
David Harley is an IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing, and management of email abuse.
Harley has worked in IT since the mid-1980s, working initially at the Royal Free Hospital in London. From 1989 to 2001 he worked for the Imperial Cancer Research Fund (now Cancer Research UK), where he eventually moved into full-time security. In 2001 he rejoined the National Health Service where he ran the Threat Assessment Centre. Since leaving the NHS in 2006 to work as an independent consultant, he has worked closely with the security company ESET where since 2011 he holds the position of Senior Research Fellow. In 2009 he was elected to the Board of Directors of the Anti-Malware Testing Standards Organization (AMTSO), but stood down in February 2012, when Righard Zwienenberg, president of AMTSO, joined ESET, so that there wouldn’t be more than one Board member representing the same AMTSO member entity.
- Anonymous; et al. (2001). Maximum Security Third Edition. SAMS. Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
- Harley, David, Robert Slade and Urs E. Gattiker (2001). Viruses Revealed. McGraw-Hill Companies. Co-Author.
- Anonymous; et al. (2002). Maximum Security Fourth Edition. SAMS. ISBN 0-672-32459-8. Revised Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
- Bosworth, Seymour, Kabay M.E.; et al. (2002). Computer Security Handbook. John Wiley. Co-wrote Chapter 49, “Medical Records Security” with Paul Brusil.
- Paulus, S., Pohlmann N., Reimer, H.; et al. (2004). ISSE 2004: Securing Electronic Business Processes. Vieweg. Massmailers: New Threats Need Novel Anti-Virus Measures.
- Bidgoli, Hossein; et al. (2006). Handbook of Information Security. Wiley. Volume 3, “E-Mail Threats and Vulnerabilities.”
- Schiller, Craig A.,, Binkley, Jim; et al. (2007). Botnets: the Killer Web App. Syngress. Co-wrote Chapter 5, “Botnet Detection: Tools and Techniques” with Jim Binkley.
- Harley, David; et al. (2007). AVIEN Malware Defense Guide for the Enterprise. Syngress. ISBN 978-1-59749-164-8. (Editor, technical editor, several chapters.)
- Baccas, Paul; et al. (2008). OS X Exploits and Defense. Syngress. Chapter 3: “Malicious Macs: Malware and the Mac.” Chapter 4: “Malware Detection and the Mac.”
- Bidgoli, Hossein; et al. (2008). The Handbook of Computer Networks. Wiley. Volume 3, “E-Mail Threats and Vulnerabilities.”
- Eddy Willems (in process). Cyberdanger (already published in Dutch and German). Translation, review, editing, contributing some content.
Most of his writing since joining ESET is available here:
Most of his writing for other magazines, web sites etc. is available from or via the Geek Peninsula blog, as are most of the above writing.
Among his other security-related (sometimes) blogs are:
- Anti-Malware Testing Articles related to the testing of anti-malware/security products.
- Chain Mail Check Hoax & scam resource
- Dataholics: the IT addiction IT-related, but not necessarily security. Letting my hair down a bit.
- Mac Virus Articles on Apple- and Android-related security issues.
- Small Blue-Green World Basically, me with my business/consultancy hat on.
- The Geek Peninsula Where most of my conference papers are kept, plus info on my books and so forth.
…it doesn’t mean there are no witches.
Facebook is suggesting that I allow James Patterson to teach me writing. (Well, I suppose he has sold a lot more books than I have.) Apparently I can learn every part of his book writing process.
I wonder if that includes finding a co-author to do the actual writing?
I suppose I shouldn’t be snide about this: it’s obviously working posthumously for Robert Ludlum and Tom Clancy. Thank heavens it never occurred to Barbara Cartland.
According to ZoneAlarm, not always the most ethically irreproachable vendor, every 10 seconds someone is hit by ransomware. He must be getting really fed up with it.
Even the fake conference crowd are trying to drag me back into testing (again). Yes, ‘Making sense of comparative anti-malware testing’ sounds like a perfect fit for the World Gene Convention. Not. I’d have been more impressed if they’d picked up on my long-gone and rather peripheral connection with the Human Genome Project.
At least the repeated invitations to a dodgy forensics conference have some theoretical relevance to what I do now.
But seems that the Gene Genie has just picked up an article I wrote of Elsevier in 2009. Or, more probably, just the abstract.
F minus for effort. F double minus for ‘would you please respond to our earlier spam?’
Suggestions for an edition of Sesame Street presented by the letter K: