Monthly Archives: June 2012

The Hidden Security Risks of P2P Traffic

For years enterprises have been trying to control peer-to-peer (P2P) technologies inside their networks, and for good reason. The efficiency with which P2P technology move large files have made P2P networks key enablers of the Internet grey market by acting … Continue reading

Posted in Computer Security, Computers, Technology | Leave a comment

Network Access Denied error when reaching a share you once had access to

If you share a folder, you should only give permission to users who need access. Never share a folder to Everyone. But let’s say, that you once had access to a folder or a device such as a shared printer … Continue reading

Posted in Computer Security, network, Networking | Tagged , , , , , , | Leave a comment

Free App Encrypts, Destroys Mobile Messages – Dark Reading

Startup Wickr launches today with iPhone, iPad, iTouch app that ‘leaves no trace’ of text, video, and picture messagesFree App Encrypts, Destroys Mobile Messages – Dark Reading.

Posted in Computers | Leave a comment

Dibbler can help small businesses with IPv6

What is Dibbler?  “Dibbler is a portable DHCPv6 implementation. Is supports stateful (i.e. IPv6 address granting) as well as stateless (i.e. option granting) autoconfiguration for IPv6. Linux 2.4/2.6/3.0, Windows XP/2003/Vista/Win7 (experimental for NT4/2000), Mac OS X, FreeBSD, NetBSD and OpenBSD.” … Continue reading

Posted in Computers | Tagged , | Leave a comment

ISO 27001 standard: Breaking the documentation myth

Many entering the information security industry wonder about the basics, so what does it mean to be compliant? What are the pros and cons of making sure you adhere to a certain standard?     ISO 27001 standard: Breaking the documentation … Continue reading

Posted in Computers | Tagged | Leave a comment

Testing IPv6 Teredo – A comprehensive list

Instead of trying to impress everyone with bits, bytes and binary, we’re trying to put these tips in layman terms for young IT professionals (quick start guides). If you have installed your Teredo drivers and IPv6, you should receive a … Continue reading

Posted in Computers | Tagged , , , , , , , , , | 2 Comments

Mini flying robots

Posted in Computers | 2 Comments

Installing Teredo and Troubleshooting

IPv6 can be more efficient and your speed on the internet could improve. You’ve been riding the internet on a protocol (language) called TCP/IP.   This protocol allowed over 4 billion devices to route and move your data packets across … Continue reading

Posted in Computers | Tagged , , , , | 1 Comment

AlternateStreamView – View/Copy/Delete NTFS Alternate Data Streams

  But what is an Alternate File Stream? The Dangers of Alternate Data Streams – Files Hidden Inside of other Files An article I wrote at Brighthub explains what these are. How can you find them? AlternateStreamView is a small … Continue reading

Posted in Computers | Leave a comment

Can Your Digital Images Withstand A Court Challenge? | DFI News

While the transition from film to digital happened with little fanfare, the vastly different steps, processes, limitations, and vulnerabilities involved when creating a digital photograph hasn’t been widely recognized…Can Your Digital Images Withstand A Court Challenge? | DFI News.

Posted in Computers | Leave a comment

The Future of Steganography | DFI News

Our ability to discover hidden information during our investigations is vital, especially as new and innovative methods continue to evolve…The Future of Steganography | DFI News.

Posted in Computers | Leave a comment

ISO/IEC 17025:2005 Accreditation of the Digital Forensics Discipline | DFI News

Over the past several years, digital forensic related training and education has expanded rapidly in both the public and private sectors. Concurrently, many public (and some private) laboratories now routinely examine digital media. An all encompassing definition of the discipline … Continue reading

Posted in Computers | Leave a comment

Windows 7 Registry Forensics: Intrusion Related Activities | DFI News

Two possible situations arise when forensically examining a system for evidence of an intrusion: performing live incident response and/or conducting a post mortem examination of hard drivesWindows 7 Registry Forensics: Intrusion Related Activities | DFI News.

Posted in Computers | Leave a comment

Originally posted on TCAT Shelbyville – Technical Blog:
With Windows 8 coming out next year, can mobile computing be controlled by domains?  Part of the security nightmare is the fact that mobile computers cannot be controlled.    Andrew Milam used…

Posted in Computers | Leave a comment

I’ll take one

Microsoft Surface – We’ve used Windows 8 for a year and predicted it would be on a tablet.  With a full desktop on a tablet, Office and all of your software you use in business, home and school, this tablet … Continue reading

Posted in Computers | Leave a comment

One Minute of Botnet Traffic

Credit to Bill Mullins for posting this at his blog – original post at ThreatPost

Posted in Computers | Tagged , , , , , , | Leave a comment

Apple’s website change

An interesting article on Apple.   Link

Posted in Computers | Tagged , | Leave a comment

IPv6 without an IPv6 compliant router

There are ways to get IPv6 working without an IPv6 compliant router.  By using the drivers built into Windows (Teredo, 6to4 and isatap) and by adding your IPv6 address statically in your network properties.  (Step by Step instructions coming soon) … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

Originally posted on TCAT Shelbyville – Technical Blog:
Error code 80072ee2 Link Error codes 80072efe or 80072f76 – (Windows Update Components)  Fixit Link Error code 0x800A138F  – Fixit Link  – You may also reset your MTU with TCPOptimizer  (Set to 1472)…

Posted in Computers | Leave a comment

Why you need a failover WAN loadbalancer

Call before you dig.  So what happens when one of your WAN lines are dug up?     Having a good policy in place and a load balancer in place can keep your organization up.

Posted in Computers | Tagged , , | Leave a comment