IT Trenches:

August, 2010


August 27, 2010  5:49 PM

Did you see this? – Microsoft updates Security Compliance Management Accelerator toolkit

Posted by: Troy Tate
Data security, DataCenter, design, Metrics, Microsoft Windows, Monitoring, policy enforcement, reporting, Security, tools

In 2008, I blogged about Microsoft's release of Security Compliance Management Accelerator toolkit. Now two years later Microsoft...

August 27, 2010  2:12 PM

Friday fun: HEADLINE: Microsoft Windows glider crashes

Posted by: Troy Tate
flugtag, fun, Microsoft, Microsoft Windows, Vista, Windows Vista, Windows XP, XP

Well, the headline may be tongue-in-cheek but this is truly a fun story for a Friday. The Register reports the Microsoft Phoenix glider fails to show the "right stuff" in the recent Red Bull Flugtag competition...

August 27, 2010  1:35 PM

Hackers send exploit code to Microsoft

Posted by: Troy Tate
application development, information security, infosec, infosec awareness, malicious software, malware, Microsoft, Microsoft Windows, web application development

Go ahead and report why your system crashed - send Microsoft the exploit code you are working on. As most Windows users know, you can send Microsoft details about what caused a system crash. In some cases hackers respond yes and their exploit code is sent to Microsoft according to a

August 26, 2010  6:08 PM

Online devices, applications and threats grow – predictions for 2013

Posted by: Troy Tate
analysis, application, application development, application management, Cisco, device management, information security, mobile devices, mobility, social networking, threats, trends, vulnerability, vulnerability assessment

The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013.

  • In 2007...

August 24, 2010  8:01 PM

Whak-a-mole testing for Microsoft DLL exploit

Posted by: Troy Tate
application development, DLL, exploit, metasploit, Microsoft, Microsoft DLL, qa testing, vulnerability, vulnerability analysis

HD Moore of

August 23, 2010  6:32 PM

Investigation indicates trojan contributed to 2008 Spainair crash

Posted by: Troy Tate
anti-virus, antivirus, av, computer maintenance, loss of life, malicious software, malware, malware protection, slow performance, trojan, virus

Bookmark and Share     0 Comments     RSS Feed     Email a friend

August 17, 2010  5:48 PM

8-character passwords are so 1999 – 12 characters is 21st century

Posted by: Troy Tate
access management, authentication, brute force, hacking, identity management, information security, infosec, infosecurity, Password, password management, secure access, Security

Today's computers and add-on processors (think graphics processing units - GPU's) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating...

August 16, 2010  6:56 PM

Automated file integrity monitoring using MD5 or SHA-1 hashing

Posted by: Troy Tate
automated reporting, automation, batch file, change monitoring, email report, file hashing, file integrity monitoring, hash, hashing

I recently had a task to monitor some file folders for changes to files and report when changes were made to the files. The reporting requirements were just to notify each day if files and what files were changed. There were no requirements to track who made the changes due to the limited access to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: