IT Trenches:

Security


August 28, 2009  4:21 PM

BlackHat USA technical presentations available online – not just for hackers



Posted by: Troy Tate
antivirus, blackhat, bootkit, Database, Development, education, hacker, information security, infosec, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information security...

August 24, 2009  8:33 PM

Red alert – automated SHIELDS Up – malware becomes smarter!



Posted by: Troy Tate
bot, command and control, information security, malware, malware research, threat, vulnerability

If you haven't recently kept up to date on the malware front, a recent article at DarkReading may come as a surprise to you. ALERT: Malware has become intelligent!


August 19, 2009  6:21 PM

Can a botnet make me sexy?



Posted by: Troy Tate
antivirus, autoupdate, botnet, command, command and control, configuration manager, control, infection, mcafee, Microsoft, parasite, systems center

Ponder this question. Are there botnets that are sexy and make you more attractive? I got this idea from the Animal Planet (Discovery) show: Monsters Inside Me: Can a...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 14, 2009  12:48 PM

Bootkit – rootkit – malware bypasses disk encryption!



Posted by: Troy Tate
antivirus, blackhat, bootkit, hacker, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the...


August 12, 2009  4:01 PM

Improve IT service levels at little or no cost – Microsoft’s Spotlight on Costs



Posted by: Troy Tate
best practices, cost reduction, cost savings, infrastructure management, Service Level Agreement, sla, technology services

Microsoft has released a video & whitepaper series on optimizing an organization's core infrastructure. This series reviews 31 best practices that can improve IT service levels at little or no...


July 24, 2009  6:03 PM

Using Wireshark to analyze a bot infected host



Posted by: Troy Tate
bot, data capture, education, ethereal, information security, Laura Chappell, network analysis, network security, packet analysis, packet capture, Security, tutorial, wireshark

My favorite Bitgirl (Laura Chappell) is at it again in this 15 minute presentation. She came across a host on a network that appears to be infected with some bot application. Take a few...


July 20, 2009  6:36 PM

Wireshark quickstart tutorial – learn to capture network traffic



Posted by: Troy Tate
analysis, education, ethereal, howto, IT education, Laura Chappell, Metrics, Monitoring, network analysis, Networking, packet analysis, packet capture, performance monitoring, protocol analysis, reporting, tcp/ip, tools, trace files, training, troubleshooting, wireshark

There are more upcoming sessions in the Laura Chappell seminar series called Wireshark 101Jumpstart tutorials. Check out the schedule at Chappell University website. Some of the things you will learn include:


July 20, 2009  6:05 PM

Nmap v5 released – nearly 600 changes!



Posted by: Troy Tate
host scanning, host testing, network administration, network education, network management, network mapping, network scanning, network toolkit, nmap, penetration testing, security administration, security tool, utility

Fyodor has announced the release of Nmap v5. This is the first major release since 1997. There are over 600 changes in the new version. According to Wikipedia: Nmap...


June 25, 2009  3:37 PM

Tips for negotiating a managed services contract – the vendor selection process



Posted by: Troy Tate
contract negotiation, cost reduction, evaluation, managed services, management, negotiation, project management, project work breakdown schedule, proposal, request for proposal, rfp, Service Level Agreement, sla, strategy, support, technical requirements, technical vendor management, vendor evaluation, vendor management, vendor selection, wbs

You have now received back the proposals from the vendors based on the RFP that you built according to the RFP anatomy described...


June 24, 2009  6:24 PM

Did you see this? – SYSTEM CLEANING: GETTING RID OF MALWARE FROM INFECTED PCS



Posted by: Troy Tate
anti-virus, antivirus, av, availability, bot, botnet, information security, integrity, malicious software, malware, registry, Security, trojan

I don't know about you but I do get frustrated when a white paper is advertised and it has little or no meat to it. Most times it seems like the whitepapers offered by vendors today are light marketing fluff with little substance to help IT folks do their job better. I came across a...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: