RickRoll Everyone with BlueCoat
The Bluecoat SGOS can do a fair amount of stuff just like any web-proxy should, but my favorite is to RickRoll the whole company. ( People spend to much time on youtube as is ).
View ArticleSnort is Tweeting
Network engineer Leon Ward of SourceFire has taken the unusual step of publishing his intrusion detection system (IDS) alerts over Twitter, the popular microblogging platform. If you are so inclined,...
View ArticleWho’s Being Promiscuous in Your Active Directory?
I’m always a fan of more queries and peaks at what is going on in my AD domain, especially at what is happening on the workstations. I was working on some WMI queries to get information about network...
View Article2008 Server to the Core
One of my favorite websites in the days of Windows 2000 Server was a project from a group of system managers from the Department of Electrical Engineering at the Swiss Federal Institute of Technology;...
View ArticleVRF is the new Black: How I Learned to Stop Worrying and Love the Complexity
Breaking up your network “is good,” we all know this, and VLANs have traditionally been used to segment a network to help with maintenance, management, and security; but, they are not the only game in...
View ArticleLarry the Sailor Explains Cloud Computing
Larry Ellison has some concerns to share about the marketing of cloud computing:
View ArticleServer 2008 R2: Active Directory Functional Levels
Windows Server 2008 R2 was released in August, and it introduced new functional levels for Active Directory. This article takes a look back at the different functional levels of the past and what is...
View ArticleAre Borderless Networks Possible?
I attended SC World Congress in New York this week and a keynote from Cisco caught my attention: Securing the Cloud: Building the Borderless Network. I became fixated on the words used over and over by...
View ArticleOSSEC: Agentless to save the day
OSSEC is a Host Intrusion detection system (HIDS) in name, but in reality it is far more. It's able to look for rootkits, monitor logs (LIDS), and even actively respond to defined events. While all...
View ArticleOSSEC: Agentless scripts
In my last OSSEC post "OSSEC: Agentless to save the day" I went over how to setup agentless monitoring using the built in scripts. With this post I am going to get into the details of how to modify the...
View ArticleOSSEC: Agentless…It’s good, but not good enough
In working with OSSEC agentless for some time now I have come across some limitations in the implementation that I felt needed to be addressed. As OSSEC agentless is designed to preform syscheck...
View ArticleA Superbowl Wifi Problem
It’s an annual puff piece, whoever is in charge of security at the Super Bowl appears on the news in front of some barrier or computer screen, talking about the number of security guards, guard dogs,...
View Article
More Pages to Explore .....