IT Trenches:

August, 2010

August 27, 2010  5:49 PM

Did you see this? – Microsoft updates Security Compliance Management Accelerator toolkit

Troy Tate Profile: Troy Tate

In 2008, I blogged about Microsoft's release of Security Compliance Management Accelerator toolkit. Now two years later Microsoft...

August 27, 2010  2:12 PM

Friday fun: HEADLINE: Microsoft Windows glider crashes

Troy Tate Profile: Troy Tate

Well, the headline may be tongue-in-cheek but this is truly a fun story for a Friday. The Register reports the Microsoft Phoenix glider fails to show the "right stuff" in the recent Red Bull Flugtag competition...

August 27, 2010  1:35 PM

Hackers send exploit code to Microsoft

Troy Tate Profile: Troy Tate

Go ahead and report why your system crashed - send Microsoft the exploit code you are working on. As most Windows users know, you can send Microsoft details about what caused a system crash. In some cases hackers respond yes and their exploit code is sent to Microsoft according to a

August 26, 2010  6:08 PM

Online devices, applications and threats grow – predictions for 2013

Troy Tate Profile: Troy Tate

The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013.

August 24, 2010  8:01 PM

Whak-a-mole testing for Microsoft DLL exploit

Troy Tate Profile: Troy Tate

HD Moore of

August 23, 2010  6:32 PM

Investigation indicates trojan contributed to 2008 Spainair crash

Troy Tate Profile: Troy Tate

0 Comments     RSS Feed     Email a friend

August 17, 2010  5:48 PM

8-character passwords are so 1999 – 12 characters is 21st century

Troy Tate Profile: Troy Tate

Today's computers and add-on processors (think graphics processing units - GPU's) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating...

August 16, 2010  6:56 PM

Automated file integrity monitoring using MD5 or SHA-1 hashing

Troy Tate Profile: Troy Tate

I recently had a task to monitor some file folders for changes to files and report when changes were made to the files. The reporting requirements were just to notify each day if files and what files were changed. There were no requirements to track who made the changes due to the limited access to...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: