November 18, 2008  1:15 PM

Did you see this? – Microsoft Exchange Online – Evaluating Software-plus-Services



Posted by: Troy Tate
administration, CIO, DataCenter, design, Development, email, Exchange, Exchange 2007, howto, Microsoft, Microsoft Windows, tools


November 17, 2008  7:44 PM

Surviving Cisco Telephony – SRST



Posted by: Troy Tate
administration, Cisco, DataCenter, design, diagnostics, IP telephony, PSTN, risk, unified communications, VoIP, vulnerability

As you may have seen in some of my previous posts the company I work for has implemented VOIP/IP telephony at some of our locations. VOIP - IPT - QOS - COS on and on - Oh...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 11, 2008  3:51 PM

Did you see this? – MS08-067 and the Security Development Lifecycle



Posted by: Troy Tate
administration, analysis, awareness, blog, Data security, debugging, design, Development, malware, Microsoft, Microsoft Windows, patching, risk, Security, server, vulnerability

As you probably already know, Microsoft issued an urgent out of cycle security patch recently for a Vulnerability in Server service could allow remote code execution. Look here for additional


October 27, 2008  8:52 PM

Did you see this? – (Wire)Sharkfest 2008 videos – including Vint Cerf – now available



Posted by: Troy Tate
analysis, education, forensics, Google, howto, internet, IT education, LAN, Linux, man-in-the-middle, Metrics, Microsoft Windows, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, performance monitoring, reporting, research, Security, toolkit, tools, troubleshooting, WAN, web, wireshark

Checkout the Sharkfest 2008 videos at LoveMyTool.com. If you use Wireshark or want to learn network troubleshooting, this is one of the best resources you can have in your toolkit. The videos will give you a better...


October 10, 2008  7:58 PM

Counterfeit Metrics – Type II Reverse Engineering



Posted by: Troy Tate
analysis, awareness, botnet, Data security, dhs, IT education, malware, Metrics, Monitoring, performance monitoring, reporting, research, risk, Security, vulnerability

If you are into metrics, you might find this article rather interesting. For Good Measure: Type II Reverse Engineering A couple of the security metrics I find interesting:

Counterfeit hosts...


October 9, 2008  3:56 PM

Virtual Enterprise VOIP panel discussion



Posted by: Troy Tate
administration, Cisco, DataCenter, design, education, howto, IP telephony, IT education, LAN, Monitoring, Networking, PSTN, risk, unified communications, VoIP, WAN

As you may have already read, I will not be attending the Enterprise VOIP event at CampIT Conferences in Chicago on 10/14. Well, I thought...


October 9, 2008  3:00 PM

Alternatives to e-mail attachments – SharePoint is risky!



Posted by: Troy Tate
administration, Data security, DataManagement, design, email, Exchange, Firewalls, intellectual property, Networking, Policy, policy enforcement, risk, Security, SharePoint, Storage, vulnerability, website

I'm looking for some help on this topic and have posted a question to the ITKE community. Hopefully someone out there has had some experience with this service for your...


October 8, 2008  2:00 PM

Enterprise VOIP at CampIT Conference – Chicago 10/14/08



Posted by: Troy Tate
administration, awareness, DataCenter, design, education, howto, IP telephony, IT education, Networking, tools, unified communications, VoIP

Update: I will not be a panel member at the CampIT Conference on Enterprise VOIP being held in Chicago (Rosemont) on Tuesday, October 14. However, please try to attend this event if you are in the area and support the CampIT conferences group. Per the


October 3, 2008  7:59 PM

Did you see this? – Open Source Tools University



Posted by: Troy Tate
administration, analysis, anti-virus, blog, blogging, Data security, debugging, design, diagnostics, Firewalls, forensics, howto, internet, IT education, LAN, Metrics, Monitoring, network analysis, Networking, packet capture, Performance, performance monitoring, podcast, reporting, research, Sandbox, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

If you are like me, you like those little goodie tools like nmap and wireshark that do something that is actually pretty complex but do it well and have a great following. I just came across this website that I am going to have to take some time to go through and find all of the nuggets it offers....


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: