IT Trenches:

September, 2009

1

September 30, 2009  1:36 PM

I resemble that award winning case study – wait, it IS me!

Troy Tate Profile: Troy Tate

Have you ever wondered if vendor case studies are actually solutions to real life issues or if they are stories about compensated organizations using a particular vendor solution? Well, I am here to tell you that I know of at least one case study that is about an organization addressing real-life...

September 30, 2009  1:06 PM

Where do TCP resets come from?

Troy Tate Profile: Troy Tate

I recently came across an excellent article on the topic of TCP resets. TCP is a connection-oriented protocol as opposed to the connectionless nature of UDP. So, if there are TCP resets on your network, this is not a bad thing and is just inherent in the protocol. Without TCP resets, a host could...


September 30, 2009  12:33 PM

Heard in passing – IT Trenches support at its finest

Troy Tate Profile: Troy Tate

Okay - if you support networks and have to explain why the network is slow or application performance is not what the users expect, why not use some of the following responses? These statements may or may not have been used in real life. What responses have you given to users when there really...


September 25, 2009  3:15 PM

Performance monitoring dashboard – fping and URL ping

Troy Tate Profile: Troy Tate

In part one of this series, I discussed ping and pathping. These tools are good for some interactive realtime testing. However, what do you do when you...


September 16, 2009  7:00 PM

Monitoring Windows Server CPU performance

Troy Tate Profile: Troy Tate

I didn't realize how much I really didn't know about CPU performance monitoring until I read this Microsoft Technet blog on Interpreting CPU...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 16, 2009  6:41 PM

Google search results serve up malware – I’ve had the crime of my life

Troy Tate Profile: Troy Tate

Well, that may not be news to you. However, there is a recent trend in malware propagation that uses Google as the portal to deliver payloads to visitors. Unsuspecting users go to Google and search for topics such as Patrick Swayze's death or the controversy about Serena Williams cursing at the...


September 16, 2009  6:31 PM

Would you click if it showed on the NY Times website? – Really would you?

Troy Tate Profile: Troy Tate

Yesterday Fierce CIO reported that New York Times falls victim to rogue ad. This is a trend that seems to be happening more frequently. Rogue...


September 14, 2009  1:49 PM

Microsoft does not patch vulnerability for supported version of Windows

Troy Tate Profile: Troy Tate

Last week was the September issue of Microsoft "patch Tuesday". The September 2009 Microsoft Security Bulletin lists a number of vulnerabilities. Microsoft held the

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: