IT Trenches:


June 4, 2008  7:26 PM

Researching Network TAPs – Strike 1 (part 4)

Posted by: Troy Tate
DataCenter, DataManagement, howto, LAN, Metrics, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, reporting, tools

Yesterday, I received my Datacom Systems Singlestream 102 network tap. I installed it during lunch and wouldn't you know, something started not working right on the network! Hmmmmm... maybe I should have tested...

May 23, 2008  7:58 PM

Did you see this? – Security Primer for the non-technical

Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, IT education, malware, Monitoring, online identity, Policy, policy enforcement, Security, tools

This is a shout-out to fellow blogger Martin McKeay. His Security Primer for the non-technical is a blog worth sharing with friends, family and co-workers. Hence, I am sharing this with you...

May 21, 2008  1:18 PM

Cutting IT corners is not cutting IT

Posted by: Troy Tate
administration, anti-virus, antivirus, CIO, Data security, DataCenter, DataManagement, malware, Mobile, Network Admission Control, Performance, Policy, policy enforcement, reporting, Security, tools

How often does this happen to you? A user is going to travel to another company location and they want to checkout a laptop for the journey. However, they tell you the morning of the travel rather than in advance. So you do not have time to check out the device and ensure that it is really in good...

May 16, 2008  6:40 PM

Did you see this? – Fear or doubt? New rootkit from researcher’s labs

Posted by: Troy Tate
anti-virus, antivirus, forensics, honeypot, malware, Monitoring, research, Security, tools

Do you fear or doubt these types of announcements? There are so many possibilities and weaknesses in systems and services. According to: SoftPedia...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 13, 2008  4:06 PM

To be done: an acquisition/merger checklist

Posted by: Troy Tate
anti-virus, antivirus, CIO, DataCenter, DataManagement, email, howto, LAN, malware, Metrics, Microsoft Windows, Monitoring, Networking, reporting, research, Security, tools, WAN

An acquisition or merger is not a frequent event for my organization. However, it seems like in the past year or so we have worked on a number of these activities. So, it seems like it may be time to create a formalized checklist for the IT department items that need to be addressed during an...

May 9, 2008  12:51 PM

Did you see this? – the viral bitgirl

Posted by: Troy Tate
forensics, howto, humor, LAN, Metrics, Monitoring, network analysis, Networking, packet capture, Performance, reporting, tools, troubleshooting, WAN, wireshark

I have always had an appreciation for Laura Chappel of fame and her quirky sense of ... hmmmmm.. sense?? hahaha... well... she does have a great sense of humor and a heightened sense of awareness with respect to those...

April 29, 2008  5:11 PM

I can’t get no technical (support) satisfaction

Posted by: Troy Tate
CIO, DataCenter, Linux, Microsoft Windows, Monitoring, Networking, Security, tools, troubleshooting

My apologies to the Rolling Stones for munging their classic song. How many times have you encountered a situation in your organization where something needs to be done yet either IT is not able or willing to...

April 23, 2008  5:13 PM

Dear John…. let’s talk about Cisco

Posted by: Troy Tate
Data security, LAN, Networking, tools, WAN

Don't you wish that every vendor's competitor had something similar to the Dear John (Chambers of Cisco fame) site found here. What would a Dear Bill (Gates) letter website look like? Well a video documentary was...

April 15, 2008  1:00 PM

VMWare Player:My ears are still ringing!

Posted by: Troy Tate
Linux, Performance, Security, tools, troubleshooting, Virtualization, vmware

Wow! I didn't know my laptop could have such loud alerts. Yesterday, I shutdown a virtual machine in VMWare's VMPlayer application. As soon as I clicked the shutdown button in the guest OS, my laptop let out...

April 4, 2008  1:40 PM

Did you see this? – Sandbox behavior

Posted by: Troy Tate
Data security, Monitoring, Security, tools

Many of our organizations use "standard" anti-virus like the Symantec, McAfee, Panda, Trend-Micro products. Virus signatures are still valuable, don't get me wrong, but it seems like there are newer detection methods out there that are challenging this time-tested technology. Heuristics have gotten...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: