IT Trenches:

SSL

1

November 5, 2009  4:50 PM

Do you use TLS or client certificates for authentication? Beware of new MITM vulnerability



Posted by: Troy Tate
apache, authentication, certificates, IIS, information security, risk, risk management, SSL, tls, vulnerability, web services

As Michael Morisy of ITKE recently posted, New SSL security hole allows man-in-the-middle attacks, a new SSL...

September 30, 2009  1:36 PM

I resemble that award winning case study – wait, it IS me!



Posted by: Troy Tate
case study, frame relay, industry award, information security, ipsec, mpls, network management, remote access, Security, security management, SSL, ssl vpn, vpn, WAN

Have you ever wondered if vendor case studies are actually solutions to real life issues or if they are stories about compensated organizations using a particular vendor solution? Well, I am here to tell you that I know of at least one case study that is about an organization addressing real-life...


January 6, 2009  4:45 PM

Swiss-army knife for public network testing



Posted by: Troy Tate
connectivity testing, crypto, crypto testing, cryptography, dns, hash, icmp, ping, public network, ssh, SSL, tcp, testing, toolkit, tools, tracert, typosquatting, udp, website

Sometimes it is necessary to test connectivity outside of your private company network. There are several resources I use. I will share a couple of those with you in this posting. One of my favorite and most frequently used sites is

Bookmark and Share     1 Comment     RSS Feed     Email a friend


December 3, 2008  3:50 PM

Holiday greeting cards, holiday shopping and computer security awareness



Posted by: Troy Tate
administration, anti-virus, antivirus, awareness, Browsers, data loss, Data security, education, Firefox, Firewalls, homeland security, IT education, malware, Microsoft, Microsoft Windows, online identity, phishing, risk, Security, spam, SSL, vulnerability


October 3, 2008  7:59 PM

Did you see this? – Open Source Tools University



Posted by: Troy Tate
administration, analysis, anti-virus, blog, blogging, Data security, debugging, design, diagnostics, Firewalls, forensics, howto, internet, IT education, LAN, Metrics, Monitoring, network analysis, Networking, packet capture, Performance, performance monitoring, podcast, reporting, research, Sandbox, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

If you are like me, you like those little goodie tools like nmap and wireshark that do something that is actually pretty complex but do it well and have a great following. I just came across this website that I am going to have to take some time to go through and find all of the nuggets it offers....


September 30, 2008  1:34 PM

Did you see this? – Laura Chappell’s Troubleshooting & Security Summit



Posted by: Troy Tate
awareness, Data security, DataManagement, education, forensics, honeypot, howto, LAN, malware, Metrics, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, performance monitoring, reporting, research, risk, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

Maybe you already know Laura Chappell (The Viral Bitgirl), if not then this is your chance to meet her and gain loads of knowledge in 2 days. On November 4-5, 2008 - Las Colinas, TX...


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


June 18, 2008  5:26 PM

Did you see this? – Infosecurity Magazine RSS feed



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, CA, Data security, DataCenter, digital signatures, forensics, honeypot, IT education, malware, Metrics, Monitoring, Networking, Policy, policy enforcement, reporting, research, RSS, Security, SSL, tools, web, website, WWW

Infosecurity Magazine has a very good RSS feed to keep yourself up to date on events/issues and technologies. Check it out!


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: