Monthly Archives: June 2006

New DOD Wireless LAN Policy

DOD recently released a memorandum aimed at boosting security on wireless local area networks connected to the Global Information Grid. This might be good starting pointing for developing a corporate wireless LAN security policy albeit somewhat less stringent.  Advertisements

Posted in Blog, IT Management, Security, Technology

Fyodor Releases 2006 Tool Survey

Today Fyodor released the 2006 top security tools survey: I am pleased to release the results of the 2006 top security tools survey.  I found them quite interesting in 2000 and 2003, so I'm glad that 3,243 of you answered

Posted in Blog, IT Management, Security, Technology

System Security Checklists and Configuration Guides

Noticeboard posted an article today about a number of system security checklist and configuration guides recently added to the NIST web site: A raft of new or updated security checklists and verification tools have been released by NIST covering: access

Posted in Blog, Security, Technology

5 Hacker Tools

This is a follow-up to an earlier post on Security Tools. An article in Information Security magazine in September 2005 described five hacker tools that security experts should have: Wikto: Web Server Assessment Tool Wikto can be used to quickly

Posted in Blog, Security, Technology

WinAudit

NoticeBored blooged about a nifty little utility called WinAudit. This utility is small enough to load on your USB thumb drive. Plug in the drive, run the file and browse the voluminous output with a web browser. Find out all

Posted in Blog, IT Management, Security, Technology

Ethereal is now Wireshark

According to SANS ISC, Ethereal is now Wireshark. Gerald Combs, the creator of the Ethereal® network protocol analyzer, has accepted a position with CACE Technologies. CACE is best known for the popular WinPcap packet capture library. Along with the move

Posted in Blog, IT Management, Security, Technology

Inappropriate Security Settings

Many Microsoft Windows security guidelines from organizations such as Microsoft, CIS, and NIST contain guidance that may significantly restrict functionality of a system. A Microsoft KB article, Security Configuration Guidance Support, provides information on a number of settings that: …

Posted in Blog, IT Management, Microsoft, Security
Categories
June 2006
M T W T F S S
« May   Jul »
 1234
567891011
12131415161718
19202122232425
2627282930