IT Trenches:

January, 2010

1

January 29, 2010  1:27 PM

Weekend fun for Geeks, Techies, Nerds – Techland!



Posted by: Troy Tate
fun, gadgets, geek, jokes, nerd, news, technology, videos

Time magazine, one of the busiest marketing engines on the planet (if you don't believe me.... what about all of those Time-Life infomercials for music and...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

January 27, 2010  6:26 PM

Identify malware infection using Internet Explorer history



Posted by: Troy Tate
antimalware, antivirus, Internet Explorer, internet explorer history, malicious software, toolkit, troubleshooting

A user on my network recently reported their computer was displaying virus detection warnings. Investigation showed that the virus detection warnings were bogus and looked something like the screen below. [caption id="attachment_352" align="alignnone" width="350" caption="Bogus Anti-Virus...


January 26, 2010  1:28 PM

Nmap 5.20 released – 150+ improvements



Posted by: Troy Tate
fingerprinting, information security, information security administration, network administration, network scanning, network toolkit, nmap, os fingerprinting, os identification, penetration testing, Security

In July 2009, Fyodor released Nmap 5.0 with over 600 changes.This was the first major release since 1997. On January 20, 2010, Nmap 5.20 was released with an additional


January 25, 2010  6:12 PM

Check this out – 4 Steps for Trimming Patch Management Time



Posted by: Troy Tate
application development, application patches, application testing, maintenance, patch management, patch testing, sla, system maintenance

Hopefully you have heard of and are testing and/or applying the recent Microsoft out-of-cycle patch for the Internet Explorer vulnerability that was exploited and the cause of


January 22, 2010  7:34 PM

Sure you can use my security context – exploit me!



Posted by: Troy Tate
exploit, group policy, information security, least user authority, lua, Microsoft, principle of least privilege, security bulletin, vulnerability

I recently blogged about the fact that the initial reports of the Google Aurora attack focused on Internet Explorer version 6. Some...


January 21, 2010  9:57 PM

Google Aurora attack focused on IE6 – does anybody do autoupdates anymore?



Posted by: Troy Tate
attack, Aurora, fixes, Internet Explorer, malicious software, malware, Microsoft, patch, patch management, threat, update, vulnerability

Maybe you have heard about the recent


January 21, 2010  7:23 PM

How small is your netbook? How about a PC on a stick?



Posted by: Troy Tate
information security, machine emulation, portable application, remote access, remote user, secure computing, Security, USB, virtual machine

I know that there are ways to run ISO's from a USB memory stick using the QEMU processor emulator open source software. It's pretty cool if you haven't tried it. Now, according to


January 15, 2010  7:33 PM

Recipe for malware infection – 10 steps



Posted by: Troy Tate
antivirus, attack, firewall, information security, information security awareness, malware, patching, security awareness, social engineering, updates, zero day

For certain malware infection follow these steps: 1. Do not apply operating system patches. 2. Do not apply application patches. 3. Do open emails from unknown sources. 4. Do open attachments on emails from unknown sources. 5. Do open unexpected attachments appearing to be from known...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: