IT Trenches:

antivirus


August 14, 2009  12:48 PM

Bootkit – rootkit – malware bypasses disk encryption!



Posted by: Troy Tate
antivirus, blackhat, bootkit, hacker, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the...

June 24, 2009  6:24 PM

Did you see this? – SYSTEM CLEANING: GETTING RID OF MALWARE FROM INFECTED PCS



Posted by: Troy Tate
anti-virus, antivirus, av, availability, bot, botnet, information security, integrity, malicious software, malware, registry, Security, trojan

I don't know about you but I do get frustrated when a white paper is advertised and it has little or no meat to it. Most times it seems like the whitepapers offered by vendors today are light marketing fluff with little substance to help IT folks do their job better. I came across a...


April 2, 2009  8:53 PM

5 Things we learned from the Conficker non-event



Posted by: Troy Tate
anti-virus, antivirus, Conficker, endpoint, endpoint protection, information security, lessons learned, malware, Microsoft, network, patches, patching, predicting future, Security

1. The media can take a story about Information Technology and say nothing of substance. What did the 60 Minutes story do for the IT industry? It made Symantec look like they could not effectively...


March 31, 2009  3:32 PM

Simple Conficker Scanner tool released – find the infected machines



Posted by: Troy Tate
anti-virus, antivirus, Conficker, detection, diagnostic tools, honeynet, ms08-067, patches, scanning, vulnerability, vulnerability scanning

A Simple Conficker Scanner (SCS) tool has been released by members of the Honeynet Project. This tool can be run under linux or Windows. It runs a...


February 11, 2009  8:08 PM

Tracking down that user/computer that locks AD accounts



Posted by: Troy Tate
account management, Active Directory, AD, administration, analysis, anti-virus, antivirus, Data security, diagnostics, howto, information security, malicious activity, malware, Microsoft, Microsoft Windows, network security, Password, password management, policy enforcement, reporting, risk, risks, scanning, search, Security, security notification, tools, troubleshooting, Windows

With an environment spanning 18+ sites and more than 3000 computers around the globe, you could understand how challenging it would be to track down what device/user might be locking user accounts. There are tools out there that you can pay for that can help do this. However, Microsoft has some...


January 21, 2009  5:10 PM

Microsoft guidelines for Turning off Windows AutoRun do NOT work properly!



Posted by: Troy Tate
anti-virus, antivirus, CERT, digital picture frame, information security, risks, Security, security notification, trojan, Windows

One of the information security lists I subscribe to is the US-CERT Technical Cyber Security Alerts. US-CERT is the United States Computer Emergency Readiness Team. If you have information security responsibilities, I highly recommend that you...


December 3, 2008  3:50 PM

Holiday greeting cards, holiday shopping and computer security awareness



Posted by: Troy Tate
administration, anti-virus, antivirus, awareness, Browsers, data loss, Data security, education, Firefox, Firewalls, homeland security, IT education, malware, Microsoft, Microsoft Windows, online identity, phishing, risk, Security, spam, SSL, vulnerability


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


August 18, 2008  7:11 PM

Did you see this? – Boot CD tutorial



Posted by: Troy Tate
administration, antivirus, bootcd, DataCenter, DataManagement, diagnostics, forensics, howto, Microsoft, Microsoft Windows, Mobile, Monitoring, packet capture, Performance, recovery, research, risk, Security, tools, troubleshooting

How often have you needed to recover a Windows system or use some type of boot disk? It's not easy to create a bootdisk in the current versions of Windows (XP or Vista). There's still a need for this capability. One source of how-to information can be found on the


August 14, 2008  2:58 AM

Managing risk & vulnerability



Posted by: Troy Tate
administration, antivirus, awareness, CIO, Data security, DataCenter, DataManagement, design, forensics, honeypot, IT education, malware, Monitoring, Policy, policy enforcement, risk, Security, vulnerability

Jotting some quick thoughts here after answering a user post. Thought I would place the same information here for all to see. This list is by no means complete and your thoughts are always welcome. Some ways to measure risk include: How valuable is the asset? How much of a threat...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: