Dave Aitel
Encyclopedia
Dave Aitel is a computer security
professional. He joined the NSA
as a research scientist aged 18 where he worked for six years before being employed as a consultant at @stake
for three years. In 2002 he founded a software security company, Immunity, where he is now the CTO
.
Aitel co-authored several books:
He is also well known for writing several security tools:
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...
professional. He joined the NSA
National Security Agency
The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...
as a research scientist aged 18 where he worked for six years before being employed as a consultant at @stake
@stake
ATstake, Inc. was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures and Ted Julian...
for three years. In 2002 he founded a software security company, Immunity, where he is now the CTO
Chief technical officer
A chief technology officer is an executive-level position in a company or other entity whose occupant is focused on scientific and technological issues within an organization....
.
Aitel co-authored several books:
- The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks. ISBN 978-0849308888
- The Shellcoder's Handbook. ISBN 978-0764544682
- Beginning Python. ISBN 978-0764596544
He is also well known for writing several security tools:
- SPIKE, a block-based fuzzerFuzz testingFuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes or failing built-in code assertions...
- SPIKE Proxy, a man-in-the-middle web application assessment tool
- Unmask, a tool to do statistical analysisStatisticsStatistics is the study of the collection, organization, analysis, and interpretation of data. It deals with all aspects of this, including the planning of data collection in terms of the design of surveys and experiments....
on text to determine authorship