Who still uses Wordperfect?

Who still uses Wordperfect?

I had an odd question come up the other day: Who still uses Wordperfect? It’s a fair question. Wordperfect, as you may know, is still very much in production. Corel releases new versions every year or two. It’s the #2 word processor in the market, still. Someone is still using it, then.

Read more

Common security attacks and countermeasures

As a security professional, I talk to a lot of people about common security attacks and countermeasures. I’m not always certain the people I’m talking to know what these things mean. I am almost certain they aren’t willing to ask.

I know it’s more complicated than it was when I took my Security+ exam a decade ago. The stakes are much higher now. The attacks I had to identify caused inconvenience, but someone conducting a successful smurf attack on your printer won’t get you in the headlines. Today’s attacks will.

Read more

Advantages and disadvantages of Lotus 1-2-3

Advantages and disadvantages of Lotus 1-2-3

Lotus 1-2-3 was the killer app that made the IBM PC the standard for computers.  It wasn’t the first spreadsheet, but it ran on a computer that could easily address more than 64K of memory, it was fast, and relatively bug free. So it was super successful. Today we know it as the thing people used before Excel. So what were the advantages and disadvantages of Lotus 1-2-3?

Read more

Convert a list of hostnames to a list of IP addresses

I had a client with a huge list of hostnames that they needed to convert to IP addresses so they could scan them. That’s common. I used to have a Windows batch file to convert a list of hostnames to a list of IP addresses, so I dug it out of my archives. This isn’t like a ping sweep; they knew the machine names but their tool needed IPs.

I used the file to resolve lists of machines so I could load them into a centralized logging or vulnerability management system. This client had the same need and nobody there had a similar tool. So I shared mine with them. And I present it here so I won’t lose it again, and if you need it, you can use it too.

Read more

Find words in all caps in Word

Find words in all caps in Word

Sometimes it’s helpful to be able to find words in all caps in Word. Microsoft Word, that is. This helps you find all the acronyms so you can make sure you spelled them out or explained them properly.

Double-checking acronyms is especially important when writing government proposals, which require you to spell out acronyms on first usage. If you’ve never written a proposal, be glad, smile, and nod. Many acronyms make good index material, so this trick helps when you’re writing an index. Also, acronyms are frequently jargon, so making sure you explain them adequately is just part of good writing. Or, if you’re a fan of high quality typography, you might want to find them all so you can set them in small caps for improved aesthetics and readability.

Here’s how you do it.

Read more

Advantages and disadvantages of Windows 3.0

I hear the question from time to time what the advantages and disadvantages of Windows 3.0 were. Windows 3.0, released in May 1990, is generally considered the first usable version of Windows. The oft-repeated advice to always wait for Microsoft’s version 3 is a direct reference to Windows 3.0 that still gets repeated today, frequently.

Although Windows 3.0 is clumsy by today’s standards, in 1990 it had the right combination of everything to take the world by storm.

Read more

The difference between a vulnerability scanner and a SIEM

I heard an interesting question the other day: What’s the difference between a vulnerability scanner and a SIEM? Qualys and Nessus are examples of vulnerability scanners. Arcsight and Splunk are examples of SIEMs.

To a security practitioner, the tools couldn’t be much more different, but not everyone is a security practitioner.

On a basic, fundamental level, a vulnerability scanner deals in what’s missing in the environment and what could happen as a result of those things that are missing. A SIEM deals in what actually has happened and is happening.

Read more

WordPress Appliance - Powered by TurnKey Linux