IT Trenches:

January, 2010

1

January 29, 2010  1:27 PM

Weekend fun for Geeks, Techies, Nerds – Techland!

Troy Tate Profile: Troy Tate

Time magazine, one of the busiest marketing engines on the planet (if you don't believe me.... what about all of those Time-Life infomercials for music and...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

January 27, 2010  6:26 PM

Identify malware infection using Internet Explorer history

Troy Tate Profile: Troy Tate

A user on my network recently reported their computer was displaying virus detection warnings. Investigation showed that the virus detection warnings were bogus and looked something like the screen below. [caption id="attachment_352" align="alignnone" width="350" caption="Bogus Anti-Virus...


January 26, 2010  1:28 PM

Nmap 5.20 released – 150+ improvements

Troy Tate Profile: Troy Tate

In July 2009, Fyodor released Nmap 5.0 with over 600 changes.This was the first major release since 1997. On January 20, 2010, Nmap 5.20 was released with an additional

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 25, 2010  6:12 PM

Check this out – 4 Steps for Trimming Patch Management Time

Troy Tate Profile: Troy Tate

Hopefully you have heard of and are testing and/or applying the recent Microsoft out-of-cycle patch for the Internet Explorer vulnerability that was exploited and the cause of

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 22, 2010  7:34 PM

Sure you can use my security context – exploit me!

Troy Tate Profile: Troy Tate

I recently blogged about the fact that the initial reports of the Google Aurora attack focused on Internet Explorer version 6. Some...


January 21, 2010  9:57 PM

Google Aurora attack focused on IE6 – does anybody do autoupdates anymore?

Troy Tate Profile: Troy Tate

Maybe you have heard about the recent

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 21, 2010  7:23 PM

How small is your netbook? How about a PC on a stick?

Troy Tate Profile: Troy Tate

I know that there are ways to run ISO's from a USB memory stick using the QEMU processor emulator open source software. It's pretty cool if you haven't tried it. Now, according to

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 15, 2010  7:33 PM

Recipe for malware infection – 10 steps

Troy Tate Profile: Troy Tate

For certain malware infection follow these steps: 1. Do not apply operating system patches. 2. Do not apply application patches. 3. Do open emails from unknown sources. 4. Do open attachments on emails from unknown sources. 5. Do open unexpected attachments appearing to be from known...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: