April 27, 2018
FileHash icon

Software Updates – FileHash.exe

An update to FileHash.exe has been released as of April 18, 2018. 2018-04-18 — Version 2.3.0.430 Recent updates include the following: Added the -u (-summary) option […]
March 4, 2018

Virtual Credit Card Numbers

If your bank supports it, you would do well to consider Virtual Credit Card numbers for online purchases. I was looking around for some good articles […]
October 17, 2017

Not the best week for security protocols and technologies

The past few days have not been particularly good ones for the technology community.  First, we learned that the increasingly fragile WPA2 protocol has some glaring […]
September 25, 2017

Whose data is it, anyway?

It’s not just that we are experiencing big firms getting breached due to sheer negligence, but that no one is going to do anything about it […]
February 10, 2014

Automating Android

One of the cool things about the Android platform are the number of tools available for really extensive automation. So far, I have used the following […]
June 27, 2013

Looking forward to Windows Server 2012 R2

I was just reading the ComputerWorld article on some upcoming features of Windows Server 2012 R2, and I see some really intriguing improvements: In Windows Server 2012 […]
May 8, 2013

A look at Microsoft’s SIR v14

So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report. There’s a lot of really good info in […]
April 30, 2013

Dueling Business Mindsets

If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about processor technology.  At the end […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
August 3, 2006

Black Hat Briefings: NAC solutions vulnerable to attack

Network World is reporting that various NAC solutions vulnerable to attackbased on a presentation at this year’s Black Hat Conference. A snippet of the report from the link […]
August 4, 2006

Apple Might Have to Restate Earnings…

According to the story posted at eWeek, Apple Computer is likely to restate earnings because they’ve uncovered some more accounting irregularities.  They’ve even suggested that any reports they’ve […]
August 23, 2006

IT Career Paths

It shouldn’t be news to anyone who has been in Information Technology for more than a couple years now, but more and more folks are suggesting that […]
August 28, 2006

Getting caught up in trivia

I just finished reading an informative article by Peter Coffee on why it is important for technologists not to get overly caught up in the coolness of technology […]
August 29, 2006

P2P, IPv6 and Internet Anonymity

I was reading this article about P2P Darknets that was posted on Digg, and one of the comments on Digg was that Internet anonymity was going to get better […]
September 4, 2006

A Cost-Effective Infrastructure Deployment Strategy

Over the past few days, I have seen at least two posts or articles on a subject I’ve been meaning to write about for quite some time, […]
October 3, 2006

IT Security Confidence

I just finished reading a pretty decent CIO Insight article (with lots of research links) on the state of IT Security at a Corporate level.  It ends with the […]
October 30, 2006

Who is Clueless about Technology?

An article I read on ZDNet this week laments that fact that politicians as a group are woefully clueless about technology issues, yet keep pressing ahead with projects […]
November 12, 2006

Recent Home Network Woes…

The annual upgrade plans for my home network have to be accelerated somewhat due to a couple of system failures I have experienced over the past few months. […]
November 13, 2006

Scorching Fast Video Cards

nVidia has released it’s next generation card family, the 8800 series, and the reviews are looking great!  Sure, I’m not personally going to be purchasing a $450 or $600 video card, but for […]
December 9, 2006

Looking for the next CPU breakthrough…

The folks at MIT have made some serious progress in the search for the replacement material for silicon in transistors. One of the materials being discussed, according […]
December 12, 2006

SANS sees upsurge in zero-day Web-based attacks

It’s pretty much official now (in case you didn’t believe it before):  We have exited the Worm era, and jumped head first into the era of specialized […]