IT Trenches:

Networking


September 30, 2008  1:34 PM

Did you see this? – Laura Chappell’s Troubleshooting & Security Summit



Posted by: Troy Tate
awareness, Data security, DataManagement, education, forensics, honeypot, howto, LAN, malware, Metrics, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, performance monitoring, reporting, research, risk, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

Maybe you already know Laura Chappell (The Viral Bitgirl), if not then this is your chance to meet her and gain loads of knowledge in 2 days. On November 4-5, 2008 - Las Colinas, TX...

September 19, 2008  1:16 PM

Crunching numbers – is this any way to manage a network?



Posted by: Troy Tate
administration, DataManagement, facility, facility management, howto, Metrics, Monitoring, network analysis, Performance, performance monitoring, reporting, toolkit, tools, WAN

I just got done catching up crunching wide area network usage statistics for the last 6 months. Wow... what a job! I should be doing it at the end of each month but I got behind due to other major activities like


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


September 3, 2008  7:28 PM

Did you see (listen to) this? – Podcast on preventing spam



Posted by: Troy Tate
administration, anti-virus, awareness, Data security, DataManagement, email, Exchange, howto, internet, IT education, Metrics, Performance, podcast, Policy, reporting, risk, Security, spam, tools

An audio podcast on how SPAM is generated along with an examination on the frameworks and technologies that help manage and reduce SPAM. This may be a great tutorial for you and/or your users. CERTStation Media -...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


August 22, 2008  3:46 PM

Trolls on ITKE – I think not!



Posted by: Troy Tate
administration, awareness, blog, CIO, design, intellectual property, internet, IT education, Networking, online identity, reporting, risk, Security, web, website, WWW

Here's an interesting blog entry I came across this week. I have great respect for John Postel mentioned in the article. He...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


August 18, 2008  7:24 PM

Did you see this? – Online tools/tutorials – RingOfSaturn



Posted by: Troy Tate
administration, awareness, DataCenter, DataManagement, design, diagnostics, howto, internet, IT education, LAN, malware, Metrics, Monitoring, network analysis, Networking, online identity, packet capture, Performance, reporting, research, risk, Security, Storage, tools, troubleshooting, VoIP, WAN, web, website, wireshark, WWW

Ok, I admit it. I'm a network tool junkie. I constantly look for neat tools to perform tasks in the easiest manner possible and give me reliable information. This website from RingofSaturn.com is definitely one of the cooler online...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: