Tag Archives: Information SEcurity

Network Access Protection

Windows 2008 Server has Network Access Protection which is also known as NAP or NPS. This tool serves an administrative purpose to help organizations compare the security level in a computer on the network to the Server 2008’s policies. This … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , | Leave a comment

Security Videos and Links

The information in these links should help to educate security analyst and administrators on some of the attacks that may happen.  More…

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

NIST Computer Security Division

TheNIST’s Computer Security Division – Computer Security Resource Center has a wealth of information on computer security and information for anyone.  With SP 800.x (Federal) and security from ISO 27000, security standards for companies and government are more important than ever. … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

SANS Internet Storm Center article on “How to Suck at Information Security”

You can’t ignore this article.  This excellent article points out the ‘what not to dos’.   Lenny Zeltser does a great job at listing information that is often overlooked.  Here are a few examples from this article.  Make sure you read … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , | Leave a comment

Early Cipher

I often give the example that our first cipher and encryption is in first or second grade.  At this early age,  we begin to explore and we have all shared this code: ABCDEFGHI   Answer 123456789   Code We would write the … Continue reading

Rate this:

Posted in Technology | Tagged , , | Leave a comment

Banks and Your Email will be Hacked

This could affect several sites according to Information Week.  Amazon, GMail and others. From InformationWeek: Just over a week ago, security researcher Mike Perry presented information at the DEFCON security conference about a vulnerability that affects many SSL-secured Web sites, … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , , , , , , | Leave a comment