I’ve been troubleshooting a program that’s written in a combination of Java and .NET (yes, now I’ve seen everything), and the program misbehaved. It misbehaved a lot, and the vendor was confused too. About four hours in, one of us had the idea to uninstall the .NET Framework 4.0 and install the newest .NET Framework […]
Yesterday I read, via Ars Technica, that the malware resided on cash registers (which I’d heard elsewhere before), and that the first step to getting there was via a compromised web server. And that led to a question in the comments, that sounds like it came from an IT professional: don’t they have their network […]
I had a search query about getting started in regulatory compliance, which I’ve written about before, but more from an organizational perspective. That won’t help you much from a career perspective. I think most any CISSP will answer that question similarly, so I’ll take a stab at it.
My baby at work is a centralized logging tool. That means my system has to touch every other system in this large company’s large network, which is kind of cool. Not many projects deal with that many different things, and I’m seeing some things I haven’t seen since college–and never expected to see in the […]
I’m working right now for a Fortune 25 company. This story is going to sound like bragging, so I’ll ask forgiveness in advance. Maybe if I mention I’m a contractor, then it’s not bragging quite so bad.
It was a long day at work yesterday. Some days things don’t go as planned, because something blows up, and that was the case yesterday. I’m sure I’ll write it up someday. Right now I fear it’s still in the early stages. But it’s a turning point of sorts.
IT World published something with the inflammatory title of “9 reasons your sysadmin hates you.” I’ve seen most of these things, but I haven’t seen my personal pet peeve, which is something my management structure calls “shadow IT.”
An anonymous Microsoft developer spilled some juicy opinions about why Windows kernel performance isn’t all it could be. Although he has recanted much of what he said, some of his insights make a ton of sense.
Livingsocial got breached. You need to change your password, if you have a Livingsocial account. There are two questions worth asking: How do you protect yourself, and how does this happen?
A Dutch ISP that acts as a spam haven is DDOSing Spamhaus, and they’re using DNS to do it. The attack is using spoofed DNS queries to create, basically, a smurf-like attack. And the sheer volume of traffic is likely to affect the Internet as a whole. That might explain why my recruiters were complaining […]