I had an odd question come up the other day: Who still uses Wordperfect? It’s a fair question. Wordperfect, as you may know, is still very much in production. Corel releases new versions every year or two. It’s the #2 word processor in the market, still. Someone is still using it, then.
As a security professional, I talk to a lot of people about common security attacks and countermeasures. I’m not always certain the people I’m talking to know what these things mean. I am almost certain they aren’t willing to ask.
I know it’s more complicated than it was when I took my Security+ exam a decade ago. The stakes are much higher now. The attacks I had to identify caused inconvenience, but someone conducting a successful smurf attack on your printer won’t get you in the headlines. Today’s attacks will.
Lotus 1-2-3 was the killer app that made the IBM PC the standard for computers. It wasn’t the first spreadsheet, but it ran on a computer that could easily address more than 64K of memory, it was fast, and relatively bug free. So it was super successful. Today we know it as the thing people used before Excel. So what were the advantages and disadvantages of Lotus 1-2-3?
I had a client with a huge list of hostnames that they needed to convert to IP addresses so they could scan them. That’s common. I used to have a Windows batch file to convert a list of hostnames to a list of IP addresses, so I dug it out of my archives. This isn’t like a ping sweep; they knew the machine names but their tool needed IPs.
I used the file to resolve lists of machines so I could load them into a centralized logging or vulnerability management system. This client had the same need and nobody there had a similar tool. So I shared mine with them. And I present it here so I won’t lose it again, and if you need it, you can use it too.
What’s the purpose of the scroll lock key? What does scroll lock do? With modern windowing operating systems we don’t need it very often, but it solved a very real problem in the days of DOS.
If you need a centralized logging solution for your business, you’ll need to consider Splunk vs Loglogic. I have experience with both in corporate environments.
I guess you can say I spent a lot of time configuring and waiting on Loglogic. I spent a little time configuring Splunk and a lot of time turning the data inside it into knowledge.
Sometimes it’s helpful to be able to find words in all caps in Word. Microsoft Word, that is. This helps you find all the acronyms so you can make sure you spelled them out or explained them properly.
Double-checking acronyms is especially important when writing government proposals, which require you to spell out acronyms on first usage. If you’ve never written a proposal, be glad, smile, and nod. Many acronyms make good index material, so this trick helps when you’re writing an index. Also, acronyms are frequently jargon, so making sure you explain them adequately is just part of good writing. Or, if you’re a fan of high quality typography, you might want to find them all so you can set them in small caps for improved aesthetics and readability.
Here’s how you do it.
I was making a chart in an Excel spreadsheet the other week and it insisted on adding trailing zeroes in the charts after the decimal point, even though all of my stats were whole numbers. Here’s the solution I finally found to get rid of trailing zeroes in Excel charts.
I hear the question from time to time what the advantages and disadvantages of Windows 3.0 were. Windows 3.0, released in May 1990, is generally considered the first usable version of Windows. The oft-repeated advice to always wait for Microsoft’s version 3 is a direct reference to Windows 3.0 that still gets repeated today, frequently.
Although Windows 3.0 is clumsy by today’s standards, in 1990 it had the right combination of everything to take the world by storm.
I heard an interesting question the other day: What’s the difference between a vulnerability scanner and a SIEM? Qualys and Nessus are examples of vulnerability scanners. Arcsight and Splunk are examples of SIEMs.
To a security practitioner, the tools couldn’t be much more different, but not everyone is a security practitioner.
On a basic, fundamental level, a vulnerability scanner deals in what’s missing in the environment and what could happen as a result of those things that are missing. A SIEM deals in what actually has happened and is happening.