IT Trenches:

Security


April 2, 2009  8:53 PM

5 Things we learned from the Conficker non-event



Posted by: Troy Tate
anti-virus, antivirus, Conficker, endpoint, endpoint protection, information security, lessons learned, malware, Microsoft, network, patches, patching, predicting future, Security

1. The media can take a story about Information Technology and say nothing of substance. What did the 60 Minutes story do for the IT industry? It made Symantec look like they could not effectively...

March 31, 2009  3:32 PM

Simple Conficker Scanner tool released – find the infected machines



Posted by: Troy Tate
anti-virus, antivirus, Conficker, detection, diagnostic tools, honeynet, ms08-067, patches, scanning, vulnerability, vulnerability scanning

A Simple Conficker Scanner (SCS) tool has been released by members of the Honeynet Project. This tool can be run under linux or Windows. It runs a...


March 27, 2009  12:52 PM

The Conficker Analysis – are you ready for April 1?



Posted by: Troy Tate
asset management, Conficker, Microsoft patch, Microsoft updates, patch, patches, patching, updates, worm

There is a feeling in the infosec community that Conficker may change its behavior April 1 and wreak havoc. Headlines have included: ComputerWorld: Conficker's next move a mystery to...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


March 23, 2009  3:57 PM

Need help? Ask questions – help someone – read my blog & win one of 3 XBox 360′s



Posted by: Troy Tate
analysis tools, Cisco, contest, network capacity, network throughput, protocol analysis, Security, social engineering, social networking, tools, xbox

Looking for some help on some troublesome IT isssues? Post your question on IT Knowledge Exchange. Maybe take some time to read through some of the questions on ITKE. Provide an answer or even improve...


February 24, 2009  3:14 PM

Financial crisis due to poor risk understanding & management – IT security next?



Posted by: Troy Tate
financial analysis, information security, measurement, Monitoring, risk, risk management, technology

I have written before about IT being an accelerator for the financial crisis. Another recent article, this time from Wired called


February 23, 2009  4:20 PM

IP address / Identity management & protecting youth from exploitation by adults



Posted by: Troy Tate
House, identity management, IP address management, ISP, Law, logging, Security, Senate, service providers

There is a recent bill introduced in both the House and Senate to strengthen current legislation addressing online child...


February 19, 2009  1:47 PM

Is protocol analysis or network management your thing?



Posted by: Troy Tate
education, ethereal, network analysis, packet analysis, packet capture, protocol analysis, tcp/ip, trace files, training, wireshark

Laura Chappell (the Viral Bitgirl) has announced that Sharkfest 09 registration is open and all registered attendees get a FREE AIRPCAP ADAPTER (US $198)! Sharkfest is the...


February 11, 2009  8:08 PM

Tracking down that user/computer that locks AD accounts



Posted by: Troy Tate
account management, Active Directory, AD, administration, analysis, anti-virus, antivirus, Data security, diagnostics, howto, information security, malicious activity, malware, Microsoft, Microsoft Windows, network security, Password, password management, policy enforcement, reporting, risk, risks, scanning, search, Security, security notification, tools, troubleshooting, Windows

With an environment spanning 18+ sites and more than 3000 computers around the globe, you could understand how challenging it would be to track down what device/user might be locking user accounts. There are tools out there that you can pay for that can help do this. However, Microsoft has some...


January 29, 2009  9:13 PM

Nifty tools for tracking down that “interesting” network traffic



Posted by: Troy Tate
Cisco, LAN, malware, Microsoft, network analysis, network monitor, network troubleshooting, pstools, Routers, Security, Sysinternals, toolkit, troubleshooting, WAN

My previous posting was meant to help you determine the source of potentially dangerous...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 26, 2009  7:14 PM

Do you manage a firewall and want to find the source of malicious network activity? – Check out the Internet Malicious Activity Map



Posted by: Troy Tate
activity, Firewalls, graph, internet, malicious activity, malware, network, network security, research, Security, Subnet, WWW

For those of you who manage your own network, you have to consider the strength of the firewall at your network perimiter, the knowledge and skills of those who manage it. You also have to provide technology that can help protect your mobile users. Part of building that secure environment is...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: