IT Trenches:

December, 2009

1

December 22, 2009  12:31 AM

Thank you ITKE Community!



Posted by: Troy Tate
blogging

I want to thank the ITKE Community for nominating me and selecting me as the winner of the flatscreen contest. It is an honor to be recognized in this...

December 18, 2009  8:33 PM

Broadcast traffic told me the network was contaminated



Posted by: Troy Tate
broadcast, network analysis, packet capture, protocol analysis, troubleshooting

If you don't know what's broadcasting on your network, you don't know your network! I recently discovered a rogue network cross-connection on a network. The cross connect was from an unmanaged internet connection to a private LAN. The way I discovered this was using Wireshark and listening for all...


December 18, 2009  7:58 PM

Search engine for telnet, ftp, ssh and http brings hackers closer to your doorstep



Posted by: Troy Tate
ftp, http, information security, infosec, malware, network, network protection, reconnaisance, scanning, search, search engine, ssh, telnet, web

Google is obviously a great tool for everyone including hackers. If you have never heard of Google Hacking, then I highly recommend you take a look at what might be exposed and found through a Google search. This

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 18, 2009  7:28 PM

Using PsExec to fight malware



Posted by: Troy Tate
antivirus, malicious software, malware, Microsoft, Microsoft Sysinternals, psexec, remote administration, Sysinternals

The excellent Sysinternals Windows tools have been around for many years (since 1996!). Microsoft now has these tools available and they are all FREE! They are also available in a "live" way such that you do...


December 15, 2009  9:38 PM

Use NMap to quickly scan a large subnet for MAC or IP addresses – even firewalled systems!



Posted by: Troy Tate
ARP, arp scan, education, network scan, network tool, nmap, ping, tool, utility

One of my favorite tools to manage a population of network hosts is the excellent tool NMap. It can easily and quickly be used to scan a large subnet for live hosts. I recently scanned a /16 or 65,535 hosts subnet in about 30 minutes with NMap detecting...


December 4, 2009  1:22 PM

Generating and tracking passwords: Put javascript to work for you



Posted by: Troy Tate
complex password, information security, Password, password security, password tool, strong password, tool, utility

I recently came across this interesting website that uses javascript and SHA-1 hashes to generate passwords. The thing to remember about this tool is that the generated passwords are just numbers and letters. There are no...


December 3, 2009  7:02 PM

CERT ALERT:H1N1 Malware Campaign Circulating



Posted by: Troy Tate
alert, botnet, bulletin, CERT, cert alert, education, government, information security, information security awareness, malicious software, malware, us-cert, user education, warning

The US-CERT released an alert yesterday about a currently circulating malware threat with the H1N1 virus as the subject matter.

...


December 2, 2009  9:33 PM

10 Tips: Holiday greeting cards, holiday shopping and computer security awareness



Posted by: Troy Tate
antispyware, antivirus, hoaxes, information security, internet security, phishing, Security, security awareness, shopping

It is that time of year again when folks send electronic holiday greeting cards to one another. Some of the greetings may also be games that bear holiday messages. It is also a time when malicious software spreads using these same types of messages and software. You should also...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: