IT Trenches:

Security


November 19, 2009  3:21 PM

Online Nmap video training – scan your network



Posted by: Troy Tate
blackhat, education, free training, hacker, host identification, network analysis, network testing, nmap, online training, penetration testing, scanning, training, training resources, vulnerability scanning, whitehat

Nmap has been around a long time. It has become an indispensable tool for identifying systems, services and vulnerabilities on a network. It has also been featured in movies like The Matrix...

November 19, 2009  1:59 PM

What technology would Shakespeare use?



Posted by: Troy Tate
forensics, investigation, playwright, robots, Shakespeare, technology

In that realm of odd and unusual news stories, a recent story on Wired tells about a Texas A&M production of Shakespeare's A Midsummer Night's Dream using robot flying fairies alongside the rest of...


November 5, 2009  4:50 PM

Do you use TLS or client certificates for authentication? Beware of new MITM vulnerability



Posted by: Troy Tate
apache, authentication, certificates, IIS, information security, risk, risk management, SSL, tls, vulnerability, web services

As Michael Morisy of ITKE recently posted, New SSL security hole allows man-in-the-middle attacks, a new SSL...


October 15, 2009  6:44 PM

Free Training – Laura Chappell presents: Wireshark 201 Jumpstart – Filtering on the Good, the Bad, the Ugly



Posted by: Troy Tate
analysis, education, ethereal, howto, IT education, Laura Chappell, Metrics, Monitoring, network analysis, Networking, packet analysis, packet capture, performance monitoring, protocol analysis, reporting, tcp/ip, tools, trace files, training, troubleshooting, wireshark

Laura Chappel, the BitGirl, is at it again with another in her series of Wireshark Jumpstart webinars. The next one is called


October 15, 2009  12:51 PM

Google’s Postini services restored – cascading issues caused message delivery issues



Posted by: Troy Tate
antispam, antivirus, Cloud Services, corrective actions, Google, incident report, root cause analysis, saas, service level, service outage

I recently posted about Google’s Postini - cloud email security service - delivery issues. This is a follow-on post about the incident root cause...


October 13, 2009  7:59 PM

Google’s Postini – cloud email security service – delivery issues



Posted by: Troy Tate
antispam, antivirus, Cloud Services, Google, saas, service level, service outage

Since very early today, US Eastern Daylight Time, Google's Postini services have been experiencing some service issues. It is unknown as of this writing as to the cause or full scope of the issue. However, when logging into the Postini support portal, an administrator is given the following status...


October 7, 2009  6:38 PM

IT services and The Three Chinese Curses



Posted by: Troy Tate
bot, botnet, career, information security, information technology, infosec, IT, network analysis, professional, Security, service level, support, trojan

In America, October is the time when haunting, evil spirits and curses come to mind. Earlier today I posted a blog entry titled Can IT education bring an end to the...

Bookmark and Share     1 Comment     RSS Feed     Email a friend


September 30, 2009  1:36 PM

I resemble that award winning case study – wait, it IS me!



Posted by: Troy Tate
case study, frame relay, industry award, information security, ipsec, mpls, network management, remote access, Security, security management, SSL, ssl vpn, vpn, WAN

Have you ever wondered if vendor case studies are actually solutions to real life issues or if they are stories about compensated organizations using a particular vendor solution? Well, I am here to tell you that I know of at least one case study that is about an organization addressing real-life...


September 16, 2009  6:41 PM

Google search results serve up malware – I’ve had the crime of my life



Posted by: Troy Tate
browser security, drive-by attack, Google, information security, malicious software, malware, search results, software, software security

Well, that may not be news to you. However, there is a recent trend in malware propagation that uses Google as the portal to deliver payloads to visitors. Unsuspecting users go to Google and search for topics such as Patrick Swayze's death or the controversy about Serena Williams cursing at the...


September 16, 2009  6:31 PM

Would you click if it showed on the NY Times website? – Really would you?



Posted by: Troy Tate
ad revenue, browser security, computer network, hardware, information security, information security management, licensing, malicious software, malware, network access, PC, permit, Security, social engineering, software, user education

Yesterday Fierce CIO reported that New York Times falls victim to rogue ad. This is a trend that seems to be happening more frequently. Rogue...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: