IT Trenches:

malware


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...

August 18, 2008  7:24 PM

Did you see this? – Online tools/tutorials – RingOfSaturn



Posted by: Troy Tate
administration, awareness, DataCenter, DataManagement, design, diagnostics, howto, internet, IT education, LAN, malware, Metrics, Monitoring, network analysis, Networking, online identity, packet capture, Performance, reporting, research, risk, Security, Storage, tools, troubleshooting, VoIP, WAN, web, website, wireshark, WWW

Ok, I admit it. I'm a network tool junkie. I constantly look for neat tools to perform tasks in the easiest manner possible and give me reliable information. This website from RingofSaturn.com is definitely one of the cooler online...


August 14, 2008  2:58 AM

Managing risk & vulnerability



Posted by: Troy Tate
administration, antivirus, awareness, CIO, Data security, DataCenter, DataManagement, design, forensics, honeypot, IT education, malware, Monitoring, Policy, policy enforcement, risk, Security, vulnerability

Jotting some quick thoughts here after answering a user post. Thought I would place the same information here for all to see. This list is by no means complete and your thoughts are always welcome. Some ways to measure risk include: How valuable is the asset? How much of a threat...


July 8, 2008  5:12 PM

Browser warnings – Danger Will Robinson! – or did it just cry “Wolf!”?



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, Development, Firefox, forensics, Google, honeynet, honeypot, IT education, malware, Metrics, online identity, Policy, policy enforcement, reporting, Security, web, website, WWW

I sometimes browse the internet using Firefox. I say sometimes because Internet Explorer is the standard browser at my company and Firefox is not supported by IT. Well, since I work in IT, sometimes you have to test things on behalf of users and also to see how certain sites are different depending...


July 2, 2008  2:33 PM

Did you see this? – The Great SPAM diet results are in



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, email, malware, Metrics, Monitoring, online identity, Performance, reporting, research, Security, spam

See my previous post on The Great SPAM Diet. The results are now in and darkReading has the...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 18, 2008  5:26 PM

Did you see this? – Infosecurity Magazine RSS feed



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, CA, Data security, DataCenter, digital signatures, forensics, honeypot, IT education, malware, Metrics, Monitoring, Networking, Policy, policy enforcement, reporting, research, RSS, Security, SSL, tools, web, website, WWW

Infosecurity Magazine has a very good RSS feed to keep yourself up to date on events/issues and technologies. Check it out!


May 31, 2008  2:28 AM

Did you see this? – Noticebored – Infosec Awareness Education



Posted by: Troy Tate
anti-virus, antivirus, awareness, blogging, botnet, Data security, forensics, honeynet, honeypot, humor, IT education, malware, Metrics, Monitoring, online identity, Policy, policy enforcement, research, Security, wiki

Noticebored is a great resource for information security awareness. The blogs are timely and cover a great spectrum of topics with regards to this important...


May 23, 2008  7:58 PM

Did you see this? – Security Primer for the non-technical



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, IT education, malware, Monitoring, online identity, Policy, policy enforcement, Security, tools

This is a shout-out to fellow blogger Martin McKeay. His Security Primer for the non-technical is a blog worth sharing with friends, family and co-workers. Hence, I am sharing this with you...


May 21, 2008  1:18 PM

Cutting IT corners is not cutting IT



Posted by: Troy Tate
administration, anti-virus, antivirus, CIO, Data security, DataCenter, DataManagement, malware, Mobile, Network Admission Control, Performance, Policy, policy enforcement, reporting, Security, tools

How often does this happen to you? A user is going to travel to another company location and they want to checkout a laptop for the journey. However, they tell you the morning of the travel rather than in advance. So you do not have time to check out the device and ensure that it is really in good...


May 16, 2008  6:40 PM

Did you see this? – Fear or doubt? New rootkit from researcher’s labs



Posted by: Troy Tate
anti-virus, antivirus, forensics, honeypot, malware, Monitoring, research, Security, tools

Do you fear or doubt these types of announcements? There are so many possibilities and weaknesses in systems and services. According to: SoftPedia...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: