Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC ( I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:17,140 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:

What organizations benefit most from server and desktop virtualizations? last updated: 2009-09-18 11:55:18 GMT commented by: Kevin Beaver Desktop virtualization Microsoft virtualization Server virtualization

What’s the benefit of having two physical processors on a single ESX host instead of one? last updated: 2009-09-18 11:54:23 GMT commented by: Kevin Beaver Processors VMware VMware ESX VMware vSphere

What criteria would you use in selecting a life-cycle model for the Project? last updated: 2009-09-18 11:44:03 GMT answered by: Kevin Beaver IT project management Life cycle management

how to take backup of win2003server in domain enviornment last updated: 2009-09-18 11:42:48 GMT commented by: Kevin Beaver Domain Microsoft Windows Server 2003 Network Backup Windows Backup

How to subnet networks to separate guest Internet access from server access. last updated: 2009-09-18 11:40:35 GMT answered by: Kevin Beaver Subnets

Can I get a wires driver that unblocks passwords of a recognized area? last updated: 2009-09-18 11:38:31 GMT answered by: Kevin Beaver Drivers Password

Password Protect Thumb Drive last updated: 2009-09-16 18:10:07 GMT commented by: Kevin Beaver Flash drive Password Thumb drive USB Flash drives

UNIX Security Assessment last updated: 2009-09-16 18:02:01 GMT answered by: Kevin Beaver Unix administration Unix security

Monitoring network end user operation with a cisco router last updated: 2009-09-16 17:59:16 GMT commented by: Kevin Beaver Cisco 1841 Cisco Routers Cisco switches Network monitoring

What’s after ITIL? last updated: 2009-09-16 17:55:07 GMT answered by: Kevin Beaver CIO ITIL SMB

Badges Earned:
Experience by Topic
[ rank ]
[ rank ]
[ rank ]
Microsoft Exchange
[ rank ]
Microsoft Windows
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
Windows Server
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: