Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC (www.principlelogic.com). I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (securityonwheels.com).
Blog/Website URL:www.principlelogic.com
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:16,955 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:



TCP Listening Port last updated: 2009-05-19 15:51:35 GMT commented by: Kevin Beaver Port TCP TCP Listening Port Windows Server 2003

Windows XP maintaining performance levels last updated: 2009-05-19 15:49:37 GMT commented by: Kevin Beaver Microsoft Windows Microsoft Windows XP Windows Performance Windows Performance Management Windows XP Windows XP performance

restrict Internet Browsing last updated: 2009-05-19 15:48:36 GMT commented by: Kevin Beaver Block Internet Access Internet access Outlook

How to do a security assessment in a hospital environment? last updated: 2009-05-19 15:26:33 GMT answered by: Kevin Beaver Risk management Security accessment Security audits

how does channel length affect patch cord length? last updated: 2009-05-19 15:23:35 GMT commented by: Kevin Beaver 10/100 base Ethernet switch CAT 6 CAT 6a Ethernet switching Network Configuration Networking Patch cords

Blocking Internet Explorer last updated: 2009-05-12 16:38:42 GMT commented by: Kevin Beaver Blocking Internet Explorer Internet connectivity Internet Explorer

how to block internet last updated: 2009-05-11 15:55:26 GMT commented by: Kevin Beaver Domain management Internet connection Internet connectivity Internet Explorer Outlook

SAM file last updated: 2009-05-08 17:21:05 GMT commented by: Kevin Beaver SAM file

Defense in depth and unified threat management appliances last updated: 2009-05-08 17:19:11 GMT commented by: Kevin Beaver Defense in Depth Intrusion detection Midmarket security Single Point of Failure Unified Threat Management

“Test” Surname and IT tests last updated: 2009-05-08 17:16:49 GMT commented by: Kevin Beaver market research


Badges Earned:
Gold
Silver
Bronze
Blogger
Experience by Topic
Database
[ rank ]
DataCenter
[ rank ]
Development
[ rank ]
Microsoft Exchange
[ rank ]
Microsoft Windows
[ rank ]
Mobile
[ rank ]
Networking
[ rank ]
Security
[ rank ]
Storage
[ rank ]
Virtualization
[ rank ]
VoIP
[ rank ]
Windows Server
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: