J Wolfgang Goerlich's thoughts on Information Security

Archive

RSSAccess Control (0)

Date Title Rating

RSSActive Directory (3)

Date Title Rating
2009-04-17 Replication and Transfering Operations Master Roles None
2009-04-03 Domain controller holds the last replica None
2009-04-03 Troubleshooting Active Directory replication None

RSSApache (2)

Date Title Rating
2009-11-16 Audit for SSL/TLS renegotiation 1
2009-03-29 Apache Versus Internet Information Services Security 1

RSSApplication Security (2)

Date Title Rating
2015-05-15 Starbucks gift card fraud None
2015-03-06 Securing The Development Lifecycle 5

RSSArchitecture (12)

Date Title Rating
2012-03-30 Cloud adoption and use None
2012-02-27 Peer Incites next week 5
2011-10-04 Comments on Cloud computing disappoints early adopters None
2011-09-30 Private clouds, public clouds, and car repair None
2011-09-21 Cost justifying 10 GbE networking for Hyper-V None
2010-07-01 Cisco's new business tablet None
2009-12-21 A prediction on cloud computing adoption None
2009-05-26 Disposable end-point model 4.7
2009-03-13 Open Up and Lock Down None
2009-01-02 Security is Design None
2008-04-25 Perimeter-less Security and Clouds on the Horizon None
2004-05-08 Encrypting private circuits (VPN over Frame Relay and MPLS) 5

RSSBiometrics (1)

Date Title Rating
2009-03-22 VeriFace Facial Recognition None

RSSBusiness Continuity (24)

Date Title Rating
2011-09-16 Impact driven risk management and business continuity None
2011-07-12 Out and About: GrrCon None
2011-04-06 Disaster recovery metrics - beyond RTO and RPO 5
2011-02-26 Out and About: Storage Networking World 2011 None
2009-09-25 Making and mounting Vss snapsnots in Windows Server 2008 None
2009-04-20 Virtualization and BCP Webinar Today 5
2009-04-13 Virtualization Webinar next Monday None
2009-02-11 DRP Training, Testing and Auditing None
2009-02-10 CA Case Study on our use of ARCserve and Hyper-V None
2009-02-02 Relying on Third Parties for DR None
2009-01-30 Extreme IT: Chevron's Hurricane Disaster Recovery None
2008-12-29 Power Outages in Michigan None
2008-11-11 Security Journal: Developing Secure Disaster Recovery Programs None
2008-09-02 Baseline Article on Business Continuity Planning None
2008-08-27 How Microsoft Hyper-V Helped My IT Shop Revamp Disaster Recovery None
2008-06-25 Best Practices award for Business Continuity None
2008-04-06 Virtualization for Disaster Recovery: Strategies None
2008-04-05 Virtualization for Disaster Recovery: Metrics None
2008-03-18 Selecting backup data centers for DR None
2008-02-28 The Machine Stops 5
2008-02-10 Out and About: Storage Networking World None
2005-04-18 Budgeting for disaster recovery None
2004-11-05 Disaster Recovery Metrics None
2004-07-22 Defining Business Continuity and Disaster Recovery 4

RSSCryptography (8)

Date Title Rating
2015-02-16 Configuring trusted keys and certificates (PCI-DSS) 4.5
2013-01-10 Incog: past, present, and future 1
2012-07-27 Not-so-secure implementations of SecureString 3.7
2010-01-08 Microsoft embraces and extends IPSec NULL 1
2009-11-16 Audit for SSL/TLS renegotiation 1
2009-02-28 Criminal Intent and Cryptography (IANAL) 1
2008-01-10 2008 US Presidential Elections Predicted 2
2008-01-10 Reading your SSL Web Traffic 1

RSSData Loss Prevention (1)

Date Title Rating
2015-02-04 Biggest Mistakes Companies Make with Data & Information Security 5

RSSEncryption (7)

Date Title Rating
2011-07-13 Browsing in public with PuTTY 0.61, Firefox 5.0, and Amazon EC2 None
2011-04-24 Dropbox - risks and remediation None
2011-03-11 Cord Blood Registry breach - encryption controls and media controls None
2011-03-04 Miss the basics, miss the boat - Core Blood Registry None
2010-01-08 Microsoft embraces and extends IPSec NULL 1
2005-06-29 Load balance SSH without "Potential Security Breach" or "Someone Is Doing Something Nasty" 5
2004-05-08 Encrypting private circuits (VPN over Frame Relay and MPLS) 5

RSSForensics (3)

Date Title Rating
2011-08-02 iOS Forensic website None
2008-10-02 iPhone Forensics book None
2004-10-22 Detecting information leakage in Windows Server None

RSSGeneral (46)

Date Title Rating
2015-05-27 InfoSec Institute: IT Thought Leader Interview None
2015-05-08 Friday Books and Talks 05/08/2015 None
2015-04-24 Friday Books and Talks 04/24 None
2015-04-17 Friday Books and Talks 04/17/2014 None
2015-04-17 Comfortable professionalism 5
2015-04-11 Website update None
2015-04-10 Friday Books and Talks 04/10/2014 None
2015-04-03 Friday Books and Talks 04/03/2014 None
2015-02-20 Friday Books and Talks 02/20/2015 5
2015-01-30 Friday Books and Talks 01/30/2015 2
2015-01-23 Friday Books and Talks 01/23/2015 3
2015-01-16 Friday Books and Talks 01/16/2015 None
2015-01-09 Friday Books and Talks 01/09/2015 None
2015-01-03 Finding And Using A Mentor None
2014-01-01 Happy New Year 2014 None
2013-12-27 December 2013 wrap-up None
2013-12-06 Friday Books and Talks 12/06/2013 None
2013-11-22 Friday Books and Talks 11/22/2013 5
2013-11-15 Friday Books and Talks 11/15/2013 None
2013-11-08 Friday Books and Talks 11/08/2013 None
2013-11-01 Friday Books and Talks 11/01/2013 None
2013-10-25 Friday Books and Talks 10-25-2013 None
2013-10-18 Friday Books and Talks 10-18 None
2013-10-11 Friday Books and Talks 10-11 None
2013-10-04 Friday Books and Talks 10-04 None
2013-09-27 Friday Books and Talks 09-27 None
2013-09-20 Friday Books and Talks 09-20 None
2013-09-06 Friday Books and Talks 09-06-2013 None
2013-01-01 Happy New Year 2013 5
2012-01-02 Happy New Year 2012 None
2011-09-20 Six notebooks, three controls, and a third of a presentation 5
2011-08-13 A business IT enabler None
2011-07-11 iPad for the office None
2011-05-29 Egpyt's Mubarak fined for Internet cut-off None
2011-05-11 Everything includes training 5
2010-11-03 Crime and criminals (sans cyber) 4
2010-01-01 Happy New Year and how I spent Y2K None
2009-09-15 Food for Thought: Brain Train Smoothie None
2009-06-04 Egyptian Radio in the 1930s and Cybersecurity 5
2009-05-20 Your IT Skills are Dying -- Time to Study None
2009-05-11 InfoSec Poetry and Hacker Haikus 5
2009-02-13 Patience and Persistence None
2008-07-13 Information overload - how a day turns into a week None
2008-04-03 Effective Presentation Techniques None
2008-02-09 German YouTube Videos None
2004-07-26 5 ways to explain IT security non-technically None

RSSHistory (3)

Date Title Rating
2009-06-04 Egyptian Radio in the 1930s and Cybersecurity 5
2008-12-19 Metropolis None
2007-02-17 SQL Server Tip: Bulk load a csv file None

RSSHyper-V (14)

Date Title Rating
2009-12-14 Matriux - Upgrade to 2.6.32-7 and install the GPL Hyper-V integration 1
2009-12-14 Matriux - Downgrade to 2.6.18 and install Hyper-V's integration components 5
2009-12-13 Matriux - Penetration Testing from Hyper-V 5
2009-07-08 Virtualization and the physical security boundary 4
2009-06-28 Installing ARCserve on Hyper-V Core None
2009-04-13 Virtualization Webinar next Monday None
2009-03-11 Delegating management in Hyper-V None
2009-02-10 CA Case Study on our use of ARCserve and Hyper-V None
2008-12-10 Microsoft Case Study on Virtualization None
2008-10-16 Hyper-V Disk Issues None
2008-10-15 Hyper-V Scripting Guide None
2008-09-30 Huh? VMware's ESX KO's a roughly built Hyper-V package None
2008-08-27 How Microsoft Hyper-V Helped My IT Shop Revamp Disaster Recovery None
2008-03-28 Hyper-V RC Tip -- Installing and Setting IP None

RSSIIS (3)

Date Title Rating
2009-11-16 Audit for SSL/TLS renegotiation 1
2009-08-11 Excel Extension Hardening and Web Applications 3.7
2009-03-29 Apache Versus Internet Information Services Security 1

RSSIncident Response (4)

Date Title Rating
2013-06-14 Incident Management in PowerShell: Recovery, Lessons Learned None
2013-06-12 Incident Management in PowerShell: Containment None
2013-06-11 Incident Management in PowerShell: Identification None
2013-06-10 Incident Management in PowerShell: Preparation None

RSSIntellectual property (2)

Date Title Rating
2015-02-04 Biggest Mistakes Companies Make with Data & Information Security 5
2011-07-25 Protect IP and the Professors' Letter 4

RSSLeadership (3)

Date Title Rating
2015-02-05 Premiership CISOs – How Are You Treating Yours? None
2015-02-03 Guest on PVC Security 5
2014-08-28 Security Culture Show - Making Plans None

RSSOperations Security (17)

Date Title Rating
2011-09-23 Learning the wrong lesson from DigiNotar None
2011-03-11 Cord Blood Registry breach - encryption controls and media controls None
2010-01-19 Google and China, Internet Explorer and Aurora 5
2009-12-13 Matriux - Penetration Testing from Hyper-V 5
2004-04-29 Concluding Information Security for Intellectual Property None
2004-04-26 Engaging with the business on Intellectual Property issues None
2004-04-23 Avoiding infringement: Trade secrets None
2004-04-21 Avoiding infringement: Patents None
2004-04-18 Avoiding infringement: Copyrights None
2004-04-17 Avoiding infringement: Trademarks None
2004-04-16 Avoiding infringement None
2004-04-13 Protecting your assets: Trade secrets None
2004-04-11 Protecting your assets: Patents None
2004-04-08 Protecting your assets: Copyrights None
2004-04-03 Protecting your assets None
2004-04-02 Providing Information Security for Intellectual Property None
2003-11-13 Strategies for allowing guest access 5

RSSOut and About (22)

Date Title Rating
2015-07-21 Converge Detroit Podcasts None
2013-12-09 MiSec events in December None
2013-03-25 Whispering on the Wires Workshop None
2013-02-25 Out and About: Great Lakes InfraGard Conference None
2013-01-10 Incog: past, present, and future 1
2012-08-18 North Oakland ISSA and Motorcity ISSA None
2012-07-15 BSidesCleveland 2012 None
2012-06-04 BSides Detroit 12 by MiSec 5
2012-05-10 Stir Trek Reflections 2.5
2012-03-25 Out and About: GrrCon 2012 None
2012-03-14 Out and About: Stir Trek None
2012-03-06 Achieving Hyper Productivity Through DevOps None
2012-02-27 Peer Incites next week 5
2011-09-12 Grand Rapids on Friday (GrrCon) None
2011-07-12 Out and About: GrrCon None
2011-06-02 Out and About: Detroit's B-Sides None
2011-02-26 Out and About: Storage Networking World 2011 None
2009-04-13 Back from the mountains None
2008-08-12 Out and About: Practical Risk Management None
2008-08-01 Out and About: ISSA None
2008-03-27 Out and About: Xerox next Week None
2008-02-10 Out and About: Storage Networking World None

RSSPhysical Security (3)

Date Title Rating
2011-03-11 Cord Blood Registry breach - encryption controls and media controls None
2011-03-04 Miss the basics, miss the boat - Core Blood Registry None
2009-05-15 HVAC Security Controls 4.5

RSSProject Management (5)

Date Title Rating
2015-01-16 Friday Books and Talks 01/16/2015 None
2012-02-27 Peer Incites next week 5
2012-01-05 The team, the tools, and the time 4.5
2011-05-11 Everything includes training 5
2011-02-26 Project management beyond scope, budget, time None

RSSRisk Management (24)

Date Title Rating
2015-05-18 Phone phreaking visits Apple Pay's authentication 5
2015-05-15 Starbucks gift card fraud None
2015-02-19 Action-Oriented IT Risk Management None
2015-01-20 Shelfware and Constraint Analysis None
2015-01-12 Upcoming keynote: CampIT None
2013-12-05 Risk management circa 2018 4
2012-07-17 Boulder rolling in Dark Reading None
2011-10-17 Remediating IT vulnerabilities None
2011-10-12 I fight for the users None
2011-09-23 Learning the wrong lesson from DigiNotar None
2011-09-16 Impact driven risk management and business continuity None
2011-09-09 Building a vulnerability management program 3
2011-07-12 Out and About: GrrCon None
2011-06-15 Hello SSAE16 None
2011-06-15 Goodbye SAS70 None
2011-01-29 Internet kill switches 4
2010-06-29 Insurance None
2009-05-12 How to gracefully lose control over computing assets None
2009-04-14 Security Journal: Finding Security in Tough Times None
2009-02-02 Modulo automates risk management None
2009-01-19 Risk Management is prevention and Security Information Management is detection None
2008-08-12 Out and About: Practical Risk Management None
2008-07-22 Risk Management None
2004-04-02 Providing Information Security for Intellectual Property None

RSSSecurity (109)

Date Title Rating
2015-07-21 Converge Detroit Podcasts None
2015-03-06 Securing The Development Lifecycle 5
2014-01-03 Attacking hypervisors without exploits 5
2013-11-13 Why You Should Work in Information Security None
2013-07-15 Building a better InfoSec community 4.7
2013-06-12 Incident Management in PowerShell: Containment None
2013-06-10 Incident Management in PowerShell: Preparation None
2013-04-29 Software vulnerability lifecycle 4.5
2013-02-25 Out and About: Great Lakes InfraGard Conference None
2013-01-28 Surviving the Robot Apocalpyse None
2013-01-17 Privilege management at CSO None
2013-01-16 Considerations when testing Denial of Service None
2013-01-10 Incog: past, present, and future 1
2013-01-08 Write-up of the 29c3 CTF "What's This" Challenge 5
2012-07-27 Not-so-secure implementations of SecureString 3.7
2012-07-07 Steven Fox's Social Illusion 5
2012-01-10 Software support for password strength None
2011-12-28 DNS covert channels None
2011-10-28 Small Business Security Advantages 5
2011-10-25 Effective Small Business Security Podcast 5
2011-10-14 How advanced are advanced attacks? 2
2011-10-13 How sophisticated are sophisticated attacks? 1.3
2011-10-12 I fight for the users None
2011-10-10 Malware Removal Guide for Windows 5
2011-09-23 Learning the wrong lesson from DigiNotar None
2011-09-15 Cloud Security Alliance in SE Michigan None
2011-07-20 Find your personal credit cards, SSN, and passwords in a stack of documents None
2011-07-13 Browsing in public with PuTTY 0.61, Firefox 5.0, and Amazon EC2 None
2011-06-24 Unified threat management - multi-function firewalls 5
2011-06-15 Hello SSAE16 None
2011-06-15 Goodbye SAS70 None
2011-06-12 Tip: Google a Domain for Hosts using Python None
2011-06-06 B-Sides Detroit overview 4.5
2011-06-02 Out and About: Detroit's B-Sides None
2011-05-29 Egpyt's Mubarak fined for Internet cut-off None
2011-04-24 Dropbox - risks and remediation None
2011-03-11 Cord Blood Registry breach - encryption controls and media controls None
2011-03-04 Miss the basics, miss the boat - Core Blood Registry None
2011-03-03 Bypassing IDS/NSM detection None
2011-02-06 DNS Intel with Dig in Cygwin 4
2011-01-29 Internet kill switches 4
2011-01-12 Netflows Simplified (Part 2) None
2011-01-05 Netflows Simplified (Part 1) None
2010-12-23 TJ Maxx security incident impact? None
2010-12-12 Can you capture all the packets on your network? None
2010-11-12 Net Neutrality basics None
2010-11-03 Crime and criminals (sans cyber) 4
2010-08-12 Social networking and loose lips None
2010-06-29 Insurance None
2010-06-04 Pentetration testing lab None
2010-04-09 Nessus Tip: auditing services on non-standard ports None
2010-03-27 SANS Investigative Forensic Toolkit (SIFT) workstation updates None
2010-02-12 Locking down USB flash drives in Windows 7 None
2010-01-19 Google and China, Internet Explorer and Aurora 5
2009-12-14 Matriux - Upgrade to 2.6.32-7 and install the GPL Hyper-V integration 1
2009-12-14 Matriux - Downgrade to 2.6.18 and install Hyper-V's integration components 5
2009-12-13 Matriux - Penetration Testing from Hyper-V 5
2009-11-25 WatchGuard 11.1 and HTTP headers None
2009-11-22 Pentetration testing Microsoft Office Communication Server None
2009-11-16 Audit for SSL/TLS renegotiation 1
2009-11-06 Building our own cloud None
2009-09-02 TJ Maxx security incident timeline None
2009-08-11 Excel Extension Hardening and Web Applications 3.7
2009-08-08 Viewing memory on hibernating computers None
2009-07-08 Virtualization and the physical security boundary 4
2009-06-04 Egyptian Radio in the 1930s and Cybersecurity 5
2009-05-26 Disposable end-point model 4.7
2009-05-15 HVAC Security Controls 4.5
2009-05-12 How to gracefully lose control over computing assets None
2009-05-11 InfoSec Poetry and Hacker Haikus 5
2009-04-14 Security Journal: Finding Security in Tough Times None
2009-03-29 Apache Versus Internet Information Services Security 1
2009-03-28 Cross Site Scripting: eWeek None
2009-03-22 VeriFace Facial Recognition None
2009-03-13 Open Up and Lock Down None
2009-03-11 Delegating management in Hyper-V None
2009-03-02 Fun Stuff -- Wireshark, L0phtcrack, Netcat None
2009-01-02 Security is Design None
2008-11-28 Nmap output to XML and SQL None
2008-11-25 Tip: Cygwin for Steganography in Sounds (.wav) None
2008-10-18 Clickjacking Revealed None
2008-10-16 Gmail Outage None
2008-09-26 VBScript Fork Bomb 3.7
2008-09-08 London Stock Exchange - When Good Systems Go Bad None
2008-07-28 DNS Cache Polution None
2008-07-21 Would you hire an ethical hacker? None
2008-05-06 Preventing scanning in paper None
2008-03-20 Inside the Twisted Mind of the Security Professional (Wired) None
2008-02-28 The Machine Stops 5
2008-02-25 Motive, Expertise, Opportunity None
2008-02-20 Using Worms for Patching None
2008-01-23 A Project Approach to Securing Web Services None
2008-01-09 The Return of MBR Malware None
2008-01-03 Financial Information eXchange (FIX) Flaws None
2008-01-01 2008 Security Challenges None
2007-12-18 Preventing Hosts and LMHosts Tampering None
2007-11-08 Prevent the computer screensaver from locking the console None
2007-04-08 Celebrating ten years of watching my back None
2007-02-26 Viewing cached credentials, clearing cached credentials, preventing cached credentials 3
2005-09-22 Baking in security with a technology, practices, projects approach None
2005-06-29 Load balance SSH without "Potential Security Breach" or "Someone Is Doing Something Nasty" 5
2005-05-07 Spot problem Windows Servers (automatic updates) None
2004-05-08 Encrypting private circuits (VPN over Frame Relay and MPLS) 5
2002-11-22 Essential Insecurities Part 6 -- Conclusion None
2002-11-15 Essential Insecurities Part 5 - IP None
2002-11-08 Essential Insecurities Part 4 -- Ethernet None
2002-11-01 Essential Insecurities Part 3 -- Topology None
2002-10-25 Essential Insecurities Part 2 -- Cabling None
2002-10-18 Essential Insecurities Part 1 -- Introduction None

RSSSecurity Information Management (19)

Date Title Rating
2013-09-27 Monitoring attack paths 5
2011-06-06 B-Sides Detroit overview 4.5
2011-03-03 Bypassing IDS/NSM detection None
2011-02-18 Egypt up, Libya down None
2011-01-12 Netflows Simplified (Part 2) None
2011-01-05 Netflows Simplified (Part 1) None
2010-12-12 Can you capture all the packets on your network? None
2010-06-04 Pentetration testing lab None
2010-04-09 Nessus Tip: auditing services on non-standard ports None
2009-01-19 Risk Management is prevention and Security Information Management is detection None
2008-11-28 Nmap output to XML and SQL None
2008-10-03 LinkedIn Security Information Management Group None
2008-08-23 A look at Q1 Labs' QRadar None
2008-06-10 Rolling your own SIM None
2008-04-25 Perimeter-less Security and Clouds on the Horizon None
2008-02-18 CMRR Secure Erase for Hard Drives Released None
2004-10-22 Detecting information leakage in Windows Server None
2004-06-13 Recover Office XP and Office 2003 passwords None
2004-06-13 Recover Office XP and Office 2003 passwords None

RSSStorage (10)

Date Title Rating
2011-04-24 Dropbox - risks and remediation None
2011-04-19 Innovating in storage - apps and clouds None
2011-03-04 Miss the basics, miss the boat - Core Blood Registry None
2008-10-07 Double-Take Software aquires netBoot/i None
2008-09-02 Baseline Article on Business Continuity Planning None
2008-08-27 How Microsoft Hyper-V Helped My IT Shop Revamp Disaster Recovery None
2008-05-09 WinBoot/I -- Check it Out None
2008-02-18 CMRR Secure Erase for Hard Drives Released None
2008-02-10 Out and About: Storage Networking World None
2008-02-01 Tiered Storage None

RSSSystems Engineering (51)

Date Title Rating
2013-06-28 Get over being afraid of our shadow 3.7
2013-01-27 Sticky PowerShell and Command Prompt settings 2.5
2013-01-26 Grep on Windows compared to OSX 1
2013-01-21 Grep versus Select-String Speedtest 3.3
2013-01-17 Privilege management at CSO None
2013-01-16 Considerations when testing Denial of Service None
2013-01-08 Write-up of the 29c3 CTF "What's This" Challenge 5
2012-05-01 Private cloud computing case study None
2012-03-23 Disabling SMTP verbs like Turn for PCI compliance 5
2012-01-10 Software support for password strength None
2012-01-05 The team, the tools, and the time 4.5
2011-12-28 DNS covert channels None
2011-10-10 Malware Removal Guide for Windows 5
2011-09-21 Cost justifying 10 GbE networking for Hyper-V None
2011-06-24 Unified threat management - multi-function firewalls 5
2011-06-12 Tip: Google a Domain for Hosts using Python None
2011-06-06 B-Sides Detroit overview 4.5
2011-05-11 Everything includes training 5
2011-02-06 DNS Intel with Dig in Cygwin 4
2011-01-29 Internet kill switches 4
2010-10-06 Tools for converting files to ePub format 5
2010-08-16 Browse the Web over command line with Ncat None
2010-08-04 Hard Link Shell Extension None
2010-02-12 Locking down USB flash drives in Windows 7 None
2010-01-08 Microsoft embraces and extends IPSec NULL 1
2009-11-25 WatchGuard 11.1 and HTTP headers None
2009-11-22 Pentetration testing Microsoft Office Communication Server None
2009-11-21 The pack is not online -- Diskpart errors on some file systems 4
2009-11-06 Building our own cloud None
2009-09-25 Making and mounting Vss snapsnots in Windows Server 2008 None
2009-08-08 Viewing memory on hibernating computers None
2009-06-10 IP addressing by integer None
2008-11-25 Tip: Cygwin for Steganography in Sounds (.wav) None
2008-11-05 Tip: Cygwin for RAR Archives None
2008-09-10 SQL Server Tip: Shrink Database None
2008-06-13 Tip: Cygwin for Bzip2 (.bz2) None
2008-04-23 My standard IOmeter test None
2007-12-18 Preventing Hosts and LMHosts Tampering None
2007-12-04 Tip: Cygwin for Gzips (.gz) and Tarballs (.tar) 5
2007-11-23 SQL Server Tip: Find and Change File Locations None
2007-11-08 Prevent the computer screensaver from locking the console None
2007-06-08 Tip: Bash scripting in Cygwin without \r syntax errors 5
2006-03-05 Winlogon and the protection ring None
2005-09-22 Baking in security with a technology, practices, projects approach None
2005-06-29 Load balance SSH without "Potential Security Breach" or "Someone Is Doing Something Nasty" 5
2005-05-07 Spot problem Windows Servers (automatic updates) None
2004-10-22 Detecting information leakage in Windows Server None
2004-10-12 Tip: Identifying file types None
2004-08-03 Clearing a DNS server cache using VBscript and WMI None
2004-05-03 Sending Windows event logs to Syslog None
2003-11-13 Strategies for allowing guest access 5

RSSTeam management (28)

Date Title Rating
2015-05-22 Wired: DevOps isn't a job, but it is still important None
2015-01-03 Finding And Using A Mentor None
2014-06-06 Friday Books and Talks 06/06/2014 None
2014-05-30 Friday Books and Talks 05/30/2014 None
2014-05-23 Friday Books and Talks 05/23/2014 None
2014-05-17 Friday Books and Talks 05/16/2014 4
2014-05-09 Friday Books and Talks 05/09/2014 None
2014-04-18 Friday Books and Talks 04/18/2014 None
2013-09-18 Keys to a high-performing IT department None
2013-07-19 Wolf in the news None
2013-06-28 Get over being afraid of our shadow 3.7
2013-02-19 How to get the most out of a small IT staff None
2012-07-30 Parkour styled IT management 5
2012-07-16 Let me tell you why you are right 5
2012-07-09 Focusing the diffusion of innovation None
2012-06-25 InfoWorld 2012 Technology Leadership Awards 5
2012-05-21 InfoSec Career Panel Thoughts None
2012-05-14 IT Table Stakes 4.5
2012-05-07 Addressing the Dev/Ops Divide None
2012-04-30 Thoughts on training after BSides Chicago 5
2012-04-23 The power of a good story None
2012-04-16 Thinking inside the box None
2012-04-02 DevOps and Project Management None
2012-03-26 90% of IT managers run their team into the ground 5
2012-03-19 A clear competitive advantage 5
2012-03-12 A clear value proposition statement None
2012-03-06 Achieving Hyper Productivity Through DevOps None
2012-03-05 An emerging movement None

RSSThreat modeling (4)

Date Title Rating
2015-05-18 Phone phreaking visits Apple Pay's authentication 5
2014-10-18 Exercising with Threat Models None
2013-11-07 Video of my GrrCon Threat Modeling Talk 5
2013-09-27 Monitoring attack paths 5

RSSTroubleshooting (15)

Date Title Rating
2009-11-21 The pack is not online -- Diskpart errors on some file systems 4
2009-11-05 Use Diskpart to Create and Format Partitions 4.7
2009-08-11 Excel Extension Hardening and Web Applications 3.7
2009-04-03 Domain controller holds the last replica None
2009-04-03 Troubleshooting Active Directory replication None
2008-10-16 Hyper-V Disk Issues None
2008-05-01 SSRS reports work on the server but not on the clients 5
2008-03-12 XenServer hangs on Himem.sys when booting DOS None
2008-01-17 100% Processor Utilization on Windows Backup None
2007-04-08 Celebrating ten years of watching my back None
2007-02-26 Viewing cached credentials, clearing cached credentials, preventing cached credentials 3
2007-01-28 Viewing and releasing file handles None
2005-08-17 Move an OS, set the IP, and see the IP address you have entered is already assigned None
2005-06-29 Load balance SSH without "Potential Security Breach" or "Someone Is Doing Something Nasty" 5
2004-08-03 Clearing a DNS server cache using VBscript and WMI None

RSSVirtualization (24)

Date Title Rating
2014-01-03 Attacking hypervisors without exploits 5
2012-05-01 Private cloud computing case study None
2012-04-11 Private Cloud ROI None
2012-03-30 Cloud adoption and use None
2011-09-21 Cost justifying 10 GbE networking for Hyper-V None
2009-12-14 Matriux - Upgrade to 2.6.32-7 and install the GPL Hyper-V integration 1
2009-12-14 Matriux - Downgrade to 2.6.18 and install Hyper-V's integration components 5
2009-12-13 Matriux - Penetration Testing from Hyper-V 5
2009-11-06 Building our own cloud None
2009-07-08 Virtualization and the physical security boundary 4
2009-06-28 Installing ARCserve on Hyper-V Core None
2009-05-26 Disposable end-point model 4.7
2009-04-20 Virtualization and BCP Webinar Today 5
2009-04-13 Virtualization Webinar next Monday None
2008-12-23 Virtual server Sprawl None
2008-11-14 More on VDI None
2008-11-13 XenDesktop and Virtual Desktop Infrastructure None
2008-10-16 Hyper-V Disk Issues None
2008-09-30 Huh? VMware's ESX KO's a roughly built Hyper-V package None
2008-08-27 How Microsoft Hyper-V Helped My IT Shop Revamp Disaster Recovery None
2008-04-06 Virtualization for Disaster Recovery: Strategies None
2008-04-05 Virtualization for Disaster Recovery: Metrics None
2008-03-12 XenServer hangs on Himem.sys when booting DOS None
2005-08-17 Move an OS, set the IP, and see the IP address you have entered is already assigned None

Uncategorized (18)

Date Title Rating
2015-07-31 Friday Books and Talks 07/31/2015 None
2015-05-29 Friday Books and Talks 05/29/2015 None
2015-05-15 Friday Books and Talks 05/15/2015 None
2015-04-28 Who Watches the Watchers? Firewall Monitoring None
2015-02-27 Friday Books and Talks 02/27/2015 None
2014-05-02 Friday Books and Talks 05/02/2014 None
2014-04-25 Friday Books and Talks 04/25/2014 None
2013-08-05 Getting back in the game with VioPoint 5
2013-01-18 Out and About: Incident Management with PowerShell None
2012-12-28 Tip: Running aespipe on Cygwin None
2012-04-09 What is the problem? 5
2011-05-24 Mark Twain on jury duty None
2008-12-12 System Center Data Protection Manager 2007 (DPM) None
2008-10-01 The Technology Angle of the Economic Situation None
2008-08-11 Viigo overdrives RSS on your Blackberry None
2008-05-20 Delegating to Strengths None
2008-05-17 SQL Tip: Last Update Time None
2004-04-04 Protecting your assets: Trademarks None

Total

338 posts

299 raters

    Log in