IT Trenches:

patching

1

January 15, 2010  7:33 PM

Recipe for malware infection – 10 steps



Posted by: Troy Tate
antivirus, attack, firewall, information security, information security awareness, malware, patching, security awareness, social engineering, updates, zero day

For certain malware infection follow these steps: 1. Do not apply operating system patches. 2. Do not apply application patches. 3. Do open emails from unknown sources. 4. Do open attachments on emails from unknown sources. 5. Do open unexpected attachments appearing to be from known...

April 2, 2009  8:53 PM

5 Things we learned from the Conficker non-event



Posted by: Troy Tate
anti-virus, antivirus, Conficker, endpoint, endpoint protection, information security, lessons learned, malware, Microsoft, network, patches, patching, predicting future, Security

1. The media can take a story about Information Technology and say nothing of substance. What did the 60 Minutes story do for the IT industry? It made Symantec look like they could not effectively...


March 27, 2009  12:52 PM

The Conficker Analysis – are you ready for April 1?



Posted by: Troy Tate
asset management, Conficker, Microsoft patch, Microsoft updates, patch, patches, patching, updates, worm

There is a feeling in the infosec community that Conficker may change its behavior April 1 and wreak havoc. Headlines have included: ComputerWorld: Conficker's next move a mystery to...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 10, 2008  1:19 PM

The larger world of free technical support – Craigslist computer forum



Posted by: Troy Tate
anti-virus, awareness, documentation, education, howto, IT education, malware, Networking, online identity, patching, professional, risk, tools, troubleshooting, web, website

I recently came across the computer forums on Craigslist. I had heard of Craigslist previously but was not aware of the significant scope of what it offers besides classified ads. I'm not suggesting that folks leave ITKE to the Craigslist computer forums for support - far from that. I have been...


November 11, 2008  3:51 PM

Did you see this? – MS08-067 and the Security Development Lifecycle



Posted by: Troy Tate
administration, analysis, awareness, blog, Data security, debugging, design, Development, malware, Microsoft, Microsoft Windows, patching, risk, Security, server, vulnerability

As you probably already know, Microsoft issued an urgent out of cycle security patch recently for a Vulnerability in Server service could allow remote code execution. Look here for additional


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: