Just some of what we offer...
Thimbleweed Consulting works hard to stay on the leading edge of technology while at the same time supporting critical legacy systems. Thimbleweed believes that organizations should approach their technological issues with an open mind. We want to build a long term partnership with you, our customer, and ensure that you get a system that will work for you without overwhelming you. You've got ideas and experience that shouldn't have to change.

Below is just a short list of some of the services that we offer. From websites to Enterprise Resource Planning, from computer hardware to databases, from start to finish, we strive to offer you a one-stop shop to fulfill your technology needs.

  • Enterprise Resource Planning (ERP), setup, configuration, management and more.
  • Website design and integration. From the local pizza shop to national ESPN affiliate sites we design sites tailored to your size, budget and needs.
  • Database design: Track athletes, pencils in your Office Supplies cabinet or anything else. We will design a database system that won't force you to change to fit the software.
  • Technology and Infrastructure upgrades. Move from paper and pencils to digital devices and services of all kinds to speed up your productivity. 
    Let us leverage our knowledge, understanding, and skills to help meet your needs.

Thimbleweed Consulting provides two different forms of pricing.

  • Project Pricing: After discussing your project we will provide you with a flat fee estimate. If we underestimate, you do not pay a cent more. (Note: Major project changes can result in a new quote being presented for approval)
  • By the hour: We will perform services for you at a flat hourly rate, $50/hour in most cases. We bill in 15 minute increments for most work, onsite work will be billed in 30 minute increments. On Site services outside of Central New York will be quoted.
Category: Uncategorised

Welcome everyone to Thimbleweed Consulting's Security Division, known from here on as TWCSec. 

TWCSec was started in 2011 as one of the future divisions of its parent company Thimbleweed Consulting. Thimbleweed Consulting's two founders, Harry Cooper and Matt Neimeyer, determined that one thing they wanted to bring to their customers and the general computing and programming community was better and easier to use tools and services.

TWCSec's specialities lie, in SCADA and automated networks, Intelligence and Counter Intelligence, Systems Vulnerability, Education, and Forensics. 

TWCSec also has branched out its offerings to include computing hardware and software resources for education institutions. Our aim is to bring to market a beginner's forensic kit for around $500, versus the standard unit's price in today's market of $10,000-$12,000.


Category: Uncategorised

The first project to be tackled by TWCSec is the All-In-USB forensic USB key. The All-In-USB key is an outgrowth of the frustration that Harry found when trying to find good and sound forensic tools during his Master's program at Utica College. The key grew from a small idea of a package of open source tools to an educational tool that will teach its users, while at the same time retaining all the features a Forensic examiner would want for capture and analysis work.

All-In-USB provides currently the following items:

1) An on-load memory imager/capture tool

2) A light weight PHP webserver serving up a graphical interface to many command line tools.

3) Tool management, Saved Tool jobs, quick grep, Boot Loader manager, and more!!!

4) A boot loader interface (non-geeks we will be putting out a "configure tool" to setup your USB drive for this feature). Boot a machine into your favorite forensic environment and image a drive quickly.

5) A portable VM app. Load a favorite ISO or VM to parse your forensic evidence.

6) A live capture PHP application to run your favorite collection of tools.

7) A directory of key open source forensic tools that no examiner would want to be without.

8) A set of Unix/Linux tools that every examiner misses on Windows, usable IN WINDOWS!

These are just a few of the items we are releasing in our v.1 release. We are working on the v.2 release already as well as an anticipated Timeline of the growth of this new tool. We expect that release to be done in the next 3-4 weeks. In v.2 we hope to be announcing the inclusion of a new and exciting set of Mac forensic tools so that this key can be used across various OSes.

I do want to include one last piece of information, licensing. We are trying to include as many tools as possible in the releases as we move forward, but unfortunately it is an EXTREMELY tedious process trying to verify each tools licensing, so please be patient with us as we work to ensure the open source aspect of this tool. Finally, for those tools that we can not validate, we will make a list of "recommended non-loaded tools" available, so that you can gather the tools together. If we also have a "config" entry for that tool, we will post that as well.


Category: Uncategorised

Security Consulting

Three Principal Tiers

  • Security Consulting
  • Security Testing
  • Incident Response

TWC Security offers services to our clients to cover all your bases when it comes to Cyber Security. We will work with you and your team to make informed decisions about your systems, your network, your exposure, and any other aspect of your cyber exposure you feel is needed, whether it be identity theft, cloud and mobile computing, or even some good ole fashion social media.

TWC Security believes you must form a trusting relationship with any company you work with and believes our work ethic will prove that to you each and every day. In addition, we ensure each customer that our recommendations are going to cover only the services and offering that we feel you need. We will never be one to tell you a service is needed to just make a few extra dollars, we understand you want to use your money and resources wisely and efficiently.

Security Consulting:

Use our team's knowledge to know what is at the forefront or cutting edge. We can work with your team directly to respond to each threat or we can serve as an information conduit for your team, you get to choose the level of integration you desire.

The bottom line is that we tailor our services to your needs, we want to be a partner to you not a 300 pound gorilla chasing you down.

Security Testing:

Vulnerability and Penetration Testing
Compliance and IT Security
SCADA/Industrial Control Systems
Encryption and Cryptography

Incident Response:

Whether you have already been breached or want to be prepared in case of a breach, we can offer your team the guidance to first purge your systems, secondly, repair your systems, and finally harden your systems. No one plans on getting hacked, but isn't it better to be prepared and have a plan in place to resolve the situation quickly and efficiently?

Category: Uncategorised

Page 2 of 3

TWCSec Login

Please note that the account you create on our store is not a website account.

Login Form