Yesterday I read, via Ars Technica, that the malware resided on cash registers (which I’d heard elsewhere before), and that the first step to getting there was via a compromised web server. And that led to a question in the comments, that sounds like it came from an IT professional: don’t they have their network […]
I had a search query about getting started in regulatory compliance, which I’ve written about before, but more from an organizational perspective. That won’t help you much from a career perspective. I think most any CISSP will answer that question similarly, so I’ll take a stab at it.
My baby at work is a centralized logging tool. That means my system has to touch every other system in this large company’s large network, which is kind of cool. Not many projects deal with that many different things, and I’m seeing some things I haven’t seen since college–and never expected to see in the […]
I’m working right now for a Fortune 25 company. This story is going to sound like bragging, so I’ll ask forgiveness in advance. Maybe if I mention I’m a contractor, then it’s not bragging quite so bad.
It was a long day at work yesterday. Some days things don’t go as planned, because something blows up, and that was the case yesterday. I’m sure I’ll write it up someday. Right now I fear it’s still in the early stages. But it’s a turning point of sorts.
IT World published something with the inflammatory title of “9 reasons your sysadmin hates you.” I’ve seen most of these things, but I haven’t seen my personal pet peeve, which is something my management structure calls “shadow IT.”
An anonymous Microsoft developer spilled some juicy opinions about why Windows kernel performance isn’t all it could be. Although he has recanted much of what he said, some of his insights make a ton of sense.
Livingsocial got breached. You need to change your password, if you have a Livingsocial account. There are two questions worth asking: How do you protect yourself, and how does this happen?
A Dutch ISP that acts as a spam haven is DDOSing Spamhaus, and they’re using DNS to do it. The attack is using spoofed DNS queries to create, basically, a smurf-like attack. And the sheer volume of traffic is likely to affect the Internet as a whole. That might explain why my recruiters were complaining […]
A very good question came in as a comment to my earlier post, the benefits of practicing IT at home. What do I mean by putting some Windows 7 machines on a domain? I mean standing up a server with centralized user accounts and shares, running on Windows Server or Samba, whichever you can afford. […]