Write for ShortInfosec

You have an idea for an article about information security?

Submit articles to shortinfosec _at_ gmail dot com.

Please include author name, brief bio and a link to your blog/site

The general policy of gust articles are:

  1. We accept submissions for articles by other bloggers, as long as they are connected to the topics of information security or information technology.
  2. The author receives full reference, in the about the author section (at the end of the article). In the same section you can provide one link to the author's personal blog or site.
  3. The link provided for reference cannot be used to link to third party site or commercial company.
  4. If the guest author wishes to provide a link to a third party company, that is a chargeable feature. Please contact us to discuss pricing.
  5. Every submission will be reviewed prior to publication, and any offending elements to this policy will be edited out.
  6. We reserve the right to add images and modify the paragraph structure to approach the style of the blog more closely

Downloads

Welcome to the downloads page. Here you can browse and download all template documents and blueprints published by Shortinfosec

Compiled tools (win32 exe)


Policies and Procedures Templates (PDF)

Tutorial Samples

Contact Us

Author: Bozidar Spirovski


test

Content and Privacy Policy

Content Policy

  • All tutorials, solutions and opinions stated on the blog should be credited only to the author, and do not reflect the position nor are in relation to the author's employer.
  • All examples and scenarios, unless referring to publicly available information are of fictional nature and have no intention to be related real situations in any company.
  • All personal information and names presented on this site, unless referring to publicly available information are of fictional nature and cannot to be related real persons.
  • All tutorials, solutions and opinions are of an informative purpose and should be used as a guideline only. Specific implementation level solutions must be prepared per individual case.
  • Any sponsored articles will be clearly marked with the name of the sponsor. When writing sponsored articles, we reserve the full right to publish objective opinions and/or reviews, including identification of poor performance or negative issues encountered during the writing of the article.

Privacy Policy
This site does not collect any information from a visitors' computer other then the following:
    • 1st 3 octets of the IP address
    • Name of ISP to whom the IP class is assigned to
    • Operating System Version
    • Browser Type and Version
    • Screen Resolution
    • Referral Information
    • Entry page
    • Exit page
    • Visit time

  • This site does not collect personal information and does not require user registration.
  • Any personal or contact information submitted by the visitor to the site's owner via the contact e-mail address will be used only in mutual communication and for a periodic newsletter with opt-out option.
  • Personal or contact information will not be sold, transferred or used for commercial promotion.
  • The comments are publicly accessible - Any personal or contact information submitted by the visitor on the a comments page is not protected by the owner of this site.

Information Security Posts

These are our Information Security Posts Published on Shortinfosec

Corporate Security Process

Business Continuity and Disaster Recovery

Web Services Security

Network security

System Security
Security in Software Solutions

Physical Security

Forensics and Information Investigations

Designed by Posicionamiento Web