IT Trenches:

January, 2009

1

January 29, 2009  9:13 PM

Nifty tools for tracking down that “interesting” network traffic

Troy Tate Profile: Troy Tate

My previous posting was meant to help you determine the source of potentially dangerous...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

January 26, 2009  7:14 PM

Do you manage a firewall and want to find the source of malicious network activity? – Check out the Internet Malicious Activity Map

Troy Tate Profile: Troy Tate

For those of you who manage your own network, you have to consider the strength of the firewall at your network perimiter, the knowledge and skills of those who manage it. You also have to provide technology that can help protect your mobile users. Part of building that secure environment is...


January 21, 2009  5:10 PM

Microsoft guidelines for Turning off Windows AutoRun do NOT work properly!

Troy Tate Profile: Troy Tate

One of the information security lists I subscribe to is the US-CERT Technical Cyber Security Alerts. US-CERT is the United States Computer Emergency Readiness Team. If you have information security responsibilities, I highly recommend that you...


January 21, 2009  4:36 PM

Security news – Videos from Hack In The Box 2008 Malaysia available for download

Troy Tate Profile: Troy Tate


January 19, 2009  8:13 PM

Skype users – does anyone use this on ITKE? – or is it overhyped?

Troy Tate Profile: Troy Tate

Recently I posted a question about using Skype in a corporate environment. Based on the lack of any feedback, it really makes me wonder if Skype is an overhyped solution for corporate environments. I also posted the same questions to another professional mailing list I subscribe to and received...


January 9, 2009  4:38 PM

PROTOCOL analysis vs protocol analysis (with a small p)

Troy Tate Profile: Troy Tate

Recently we had an issue at a site where outbound messages larger than 1MB were backing up in the outbound message queue. The messages were tagged with a 421 4.4.2 Connection dropped error. This was a puzzling issue since the smart relay host was on the local LAN, and in fact, on...


January 6, 2009  4:45 PM

Swiss-army knife for public network testing

Troy Tate Profile: Troy Tate

Sometimes it is necessary to test connectivity outside of your private company network. There are several resources I use. I will share a couple of those with you in this posting. One of my favorite and most frequently used sites is

  Bookmark and Share     1 Comment     RSS Feed     Email a friend


January 6, 2009  4:23 PM

Is this program good or bad for my computer?

Troy Tate Profile: Troy Tate

Have you ever wondered if an application or running process is good or bad? Google searches do a good job of helping you determine if a process is legitimate or not. I just came across another resource in the fight against malicious software. It is a search engine for files, CLSID's, and...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: