IT Trenches:

August, 2009


August 28, 2009  4:57 PM

Performance monitoring dashboard – designing and instrumentation

Posted by: Troy Tate
application management, application performance, network design, network diagnosis, network management, network performance, pathping, ping

One of my biggest challenges as a network manager is when users cry "the network is slow". Some of you may have tools available to you where you can instantly dig in and see what the user might be seeing. There are some vendors out there with application and network monitoring tools.

August 28, 2009  4:21 PM

BlackHat USA technical presentations available online – not just for hackers

Posted by: Troy Tate
antivirus, blackhat, bootkit, Database, Development, education, hacker, information security, infosec, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information security...

August 24, 2009  8:33 PM

Red alert – automated SHIELDS Up – malware becomes smarter!

Posted by: Troy Tate
bot, command and control, information security, malware, malware research, threat, vulnerability

If you haven't recently kept up to date on the malware front, a recent article at DarkReading may come as a surprise to you. ALERT: Malware has become intelligent!

August 19, 2009  6:21 PM

Can a botnet make me sexy?

Posted by: Troy Tate
antivirus, autoupdate, botnet, command, command and control, configuration manager, control, infection, mcafee, Microsoft, parasite, systems center

Ponder this question. Are there botnets that are sexy and make you more attractive? I got this idea from the Animal Planet (Discovery) show: Monsters Inside Me: Can a...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

August 18, 2009  2:25 PM

FTP – is it old or is it still useful? Do you need “glamorous” file transfers?

Posted by: Troy Tate
file transfer, file transfer protocol, ftp, technology, technology update

We use FTP to provide a file transfer mechanism between users, customers & suppliers. I regularly get asked if FTP is the best and easiest mechanism for this purpose. My answer is: "it works". The command line client is also available in most operating systems and there are a lot of GUI clients...

August 14, 2009  12:48 PM

Bootkit – rootkit – malware bypasses disk encryption!

Posted by: Troy Tate
antivirus, blackhat, bootkit, hacker, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the...

August 12, 2009  4:01 PM

Improve IT service levels at little or no cost – Microsoft’s Spotlight on Costs

Posted by: Troy Tate
best practices, cost reduction, cost savings, infrastructure management, Service Level Agreement, sla, technology services

Microsoft has released a video & whitepaper series on optimizing an organization's core infrastructure. This series reviews 31 best practices that can improve IT service levels at little or no...

August 12, 2009  3:33 PM

Interested in Microsoft Certifications? – Microsoft Certification 101

Posted by: Troy Tate
certification, job skills, mcp, mcse, Microsoft, Microsoft Certification, Microsoft TechEd, TechEd 2009, technical certification

Check out this interview during TechEd 2009 with David Elfassy. You will find out answers to many of your burning questions like:

  • How much does certification really...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: