The images published in the Symantec article on this topic used “raw” images that were exactly what analysts looking at the data would see. These are the slightly stylized versions that Ive hung in shows.  A lot of thanks goes to the people at NetSec at the time, a Tufte lecture, and the support of everyone who really loved these just for how they looked. (Update: I’ve added two more beyond what were in the Symantec article)

Would you like to buy prints of any of the images you see below? I have some for sale HERE

Network traffic of me browsing the web and twittering, visualized by a tool I wrote myself.

Testing a tool to visualize network traffic I was writing. HTML/Web traffic here exclusively.

Destination Port Frequency on the Internet for a period of time

Destination Port Frequency on the Internet for a period of time

Protocol Analysis plot of 10,000 spam emails

Protocol Analysis plot of 10,000 spam emails

Plot of security data used to test a massive security correlation tool.

Plot of security data used to test a massive security correlation tool.

Security logs of an unused website

Security logs of an unused website