IT Trenches:

WWW


January 26, 2009  7:14 PM

Do you manage a firewall and want to find the source of malicious network activity? – Check out the Internet Malicious Activity Map



Posted by: Troy Tate
activity, Firewalls, graph, internet, malicious activity, malware, network, network security, research, Security, Subnet, WWW

For those of you who manage your own network, you have to consider the strength of the firewall at your network perimiter, the knowledge and skills of those who manage it. You also have to provide technology that can help protect your mobile users. Part of building that secure environment is...

September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


August 22, 2008  3:46 PM

Trolls on ITKE – I think not!



Posted by: Troy Tate
administration, awareness, blog, CIO, design, intellectual property, internet, IT education, Networking, online identity, reporting, risk, Security, web, website, WWW

Here's an interesting blog entry I came across this week. I have great respect for John Postel mentioned in the article. He...


August 20, 2008  6:19 PM

Did you see this? – Need some Exchange advice/support



Posted by: Troy Tate
administration, anti-virus, awareness, blog, CA, certificate authority, CIO, DataCenter, DataManagement, design, digital signatures, email, Exchange, Exchange 2007, howto, Microsoft Windows, Outlook Web Access, OWA, Performance, Policy, policy enforcement, Powershell, RSS, spam, toolkit, tools, web, website, wiki, WWW

Maybe you have already read my post about implementing new Exchange 2007 mailboxes for over 2000 users. If not... look here. So, as you see from this event, ongoing support...


August 18, 2008  7:24 PM

Did you see this? – Online tools/tutorials – RingOfSaturn



Posted by: Troy Tate
administration, awareness, DataCenter, DataManagement, design, diagnostics, howto, internet, IT education, LAN, malware, Metrics, Monitoring, network analysis, Networking, online identity, packet capture, Performance, reporting, research, risk, Security, Storage, tools, troubleshooting, VoIP, WAN, web, website, wireshark, WWW

Ok, I admit it. I'm a network tool junkie. I constantly look for neat tools to perform tasks in the easiest manner possible and give me reliable information. This website from RingofSaturn.com is definitely one of the cooler online...


July 25, 2008  12:58 PM

I know who I am – Do you know my name?



Posted by: Troy Tate
administration, awareness, blogging, Browsers, Database, DataCenter, DataManagement, design, Development, email, Exchange, Exchange 2007, howto, internet, Microsoft Windows, online identity, Policy, policy enforcement, reporting, research, Security, subscriptions, troubleshooting, website, wiki, WWW

If you read my previous post then you know we recently went through a major e-mail system migration. Part of that e-mail migration included moving from various naming...


July 8, 2008  5:12 PM

Browser warnings – Danger Will Robinson! – or did it just cry “Wolf!”?



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, Development, Firefox, forensics, Google, honeynet, honeypot, IT education, malware, Metrics, online identity, Policy, policy enforcement, reporting, Security, web, website, WWW

I sometimes browse the internet using Firefox. I say sometimes because Internet Explorer is the standard browser at my company and Firefox is not supported by IT. Well, since I work in IT, sometimes you have to test things on behalf of users and also to see how certain sites are different depending...


July 2, 2008  1:57 PM

If no one is answering the front door – try the back door



Posted by: Troy Tate
awareness, blogging, Browsers, CIO, customer service, DataManagement, design, Development, diagnostics, howto, Metrics, Performance, troubleshooting, web, website, WWW

I recently went to Target and was going to look at my daughter's wedding registry to see what she and her fiance had selected. When I got to the registry kiosks, there was a Target team member and a customer having problems getting into the service. The Target team member was on the phone...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: