IT Trenches:

antivirus


July 25, 2008  12:41 PM

2000 users – new mailboxes – one weekend – DONE!



Posted by: Troy Tate
administration, antivirus, CA, certificate authority, CIO, DataCenter, DataManagement, design, digital signatures, email, Exchange, Exchange 2007, internet, Microsoft, Microsoft Windows, Networking, Outlook Web Access, OWA, Powershell, tools, troubleshooting

Well, we did it! We implemented new mailboxes on Microsoft Exchange 2007 for over 2000 users in one weekend. Of course it took lots of planning, testing and blood, sweat, tears during the process, but we are now on one e-mail platform where there were at least 5 before. We had more domains than we...

July 8, 2008  5:12 PM

Browser warnings – Danger Will Robinson! – or did it just cry “Wolf!”?



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, Development, Firefox, forensics, Google, honeynet, honeypot, IT education, malware, Metrics, online identity, Policy, policy enforcement, reporting, Security, web, website, WWW

I sometimes browse the internet using Firefox. I say sometimes because Internet Explorer is the standard browser at my company and Firefox is not supported by IT. Well, since I work in IT, sometimes you have to test things on behalf of users and also to see how certain sites are different depending...


July 2, 2008  2:33 PM

Did you see this? – The Great SPAM diet results are in



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, email, malware, Metrics, Monitoring, online identity, Performance, reporting, research, Security, spam

See my previous post on The Great SPAM Diet. The results are now in and darkReading has the...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 18, 2008  5:26 PM

Did you see this? – Infosecurity Magazine RSS feed



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, CA, Data security, DataCenter, digital signatures, forensics, honeypot, IT education, malware, Metrics, Monitoring, Networking, Policy, policy enforcement, reporting, research, RSS, Security, SSL, tools, web, website, WWW

Infosecurity Magazine has a very good RSS feed to keep yourself up to date on events/issues and technologies. Check it out!


May 31, 2008  2:28 AM

Did you see this? – Noticebored – Infosec Awareness Education



Posted by: Troy Tate
anti-virus, antivirus, awareness, blogging, botnet, Data security, forensics, honeynet, honeypot, humor, IT education, malware, Metrics, Monitoring, online identity, Policy, policy enforcement, research, Security, wiki

Noticebored is a great resource for information security awareness. The blogs are timely and cover a great spectrum of topics with regards to this important...


May 23, 2008  7:58 PM

Did you see this? – Security Primer for the non-technical



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, IT education, malware, Monitoring, online identity, Policy, policy enforcement, Security, tools

This is a shout-out to fellow blogger Martin McKeay. His Security Primer for the non-technical is a blog worth sharing with friends, family and co-workers. Hence, I am sharing this with you...


May 21, 2008  1:18 PM

Cutting IT corners is not cutting IT



Posted by: Troy Tate
administration, anti-virus, antivirus, CIO, Data security, DataCenter, DataManagement, malware, Mobile, Network Admission Control, Performance, Policy, policy enforcement, reporting, Security, tools

How often does this happen to you? A user is going to travel to another company location and they want to checkout a laptop for the journey. However, they tell you the morning of the travel rather than in advance. So you do not have time to check out the device and ensure that it is really in good...


May 16, 2008  6:40 PM

Did you see this? – Fear or doubt? New rootkit from researcher’s labs



Posted by: Troy Tate
anti-virus, antivirus, forensics, honeypot, malware, Monitoring, research, Security, tools

Do you fear or doubt these types of announcements? There are so many possibilities and weaknesses in systems and services. According to: SoftPedia...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 13, 2008  4:06 PM

To be done: an acquisition/merger checklist



Posted by: Troy Tate
anti-virus, antivirus, CIO, DataCenter, DataManagement, email, howto, LAN, malware, Metrics, Microsoft Windows, Monitoring, Networking, reporting, research, Security, tools, WAN

An acquisition or merger is not a frequent event for my organization. However, it seems like in the past year or so we have worked on a number of these activities. So, it seems like it may be time to create a formalized checklist for the IT department items that need to be addressed during an...


May 9, 2008  6:20 PM

Did you see this? – a live honeynet



Posted by: Troy Tate
anti-virus, antivirus, botnet, CIO, Data security, DataManagement, forensics, honeynet, honeypot, howto, malware, Monitoring, research, Sandbox, Security, SQL Server

I just came across the Shadowserver Foundation. According to their mission:

The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: