Newsletter Archives


Security Professional Need To Test Network Penetration
How do you tell a good security company from a bad one? That is the problem, do you really know you are getting the experts you are paying for. Businesses hire experts to do pen testing and audit their company to make sure that they are compliant.

Date: 2008-12-22


Is Your Email Budget Recession Proof?
Succeed in challenging with the right processes, tools, and technology. For nearly a decade, Mailtrust has provided thousands of business just like you with cost-effective email hosting solutions.

Date: 2008-12-10


Security Engineers Have Good Reasons Using P2P Software
Let us face it, I use P2P, and in many ways that people do not expect, I use it for Joost, I use it to down load software like open office, and Linux distro's, I also use it to download hacker tools to test and research. P2P, Bittorrent in particular have legitimate uses, and I use Bittorrent for a great many things on the internet.

Date: 2008-12-08


Experience the Rackspace difference
No more worrying about web hosting uptime. No more spending your time, energy and resources trying to stay on top of things like patching, updating, monitoring, backing up data and the like. And no more wondering if there's a better way to go about it all.

Date: 2008-11-26


Two Fresh Apple Security Hacks
Two new chunks of malware are making the rounds this week that allow an attacker to download code of choice on your apple computer. What is interesting is that with the increase in sales, and market penetration of Apple computers it is still hard to find software that can actually compromise one.

Date: 2008-11-24


Azureus : The Latest Search Engine Hack
This interesting Google hack returns 134 entries in Google, and 63 in Microsoft's search engine, Yahoo returns 216 results. This quick Google hack allows someone to go in and see what someone is sharing with Azureus, one of the more popular bittorrent clients out there.

Date: 2008-11-17


Never Manage Your Email System Again!
Mailtrust is a premium email hosting provider that offers two world-class email systems supported 24x7 by certified email specialists.

Date: 2008-11-12


Sinowal Is A Serious Security Threat
RSA Security Blog has a fascinating digest of the Sinowal Trojan, and the idea that is has been in operation since 2006, compromising nearly 300,000 on line banking accounts. There is always a fascination to malware, in many ways malware can be considered an element of cyberwar because it is one way that someone can penetrate a network leaving few if any traces behind.

Date: 2008-11-03


Belgium Outlaws Hacker Tools, Leaves Security Holes Open
When good laws go bad, Belgium opens the door to some seriously fun Google Hacking, by outlawing tools, but not addressing poor security measures in the first place.

Date: 2008-10-27


Custom Email Solution for Any Size Business
Mailtrust is a premium email hosting provider that offers two world-class email systems that are supported 24x7 by certified email specialists.

Date: 2008-10-15


Wireless Network Security Takes A Hit
Fair warning, everyone: due to the work of a Russian security company called ElcomSoft, wireless networks are looking rather less safe than they have in the past. ElcomSoft's researchers claim to have sped up the process of cracking WPA and WPA2 keys by a factor of up to 100.

Date: 2008-10-13


Decrease In Network Security Attacks
The Aberdeen Group just told me that they released a free report on a decrease in network threats. The highlights are: Best-in-Class companies reported a year over year decrease of 8.6% in network security attacks.

Date: 2008-09-29


Create Custom Security Hosting Solutions
It's far more than a server. It's a smart and cost-effective way for you to make the most of your resources.

Date: 2008-09-24


Mailtrust: The Benefits of Business Email
As an extension of your IT department, Mailtrust manages and maintains your entire email service in our carrier-grade Rackspace data centers. Our hosted email hosting solutions free-up your internal IT resources, allowing them to focus more on your core business strategies. We strive to alleviate your email system burdens, with reliable email and webmail services at a fraction of in-house costs.

Date: 2008-09-17


Hackers Attack The LHC
The shiny new Large Hadron Collider has been hacked, with hackers taking over the Compact Muon Solenoid detector. The hacker group 2600 of the Greek Security Team has claimed responsibility.

Date: 2008-09-15


U.S. Falling Behind In Internet Traffic
Last week, U.S. cable provider and ISP Comcast put a cap on monthly broadband use, and now there are reports surfacing that the U.S. in general is falling behind when it comes to Internet traffic. This is not a direct result of the Comcast situation, but with Comcast being the 2nd largest ISP in the country, it's certainly not going to help.

Date: 2008-09-02


Update Your System To Prevent DNS Exploits
HD Moore has released an exploit module for the Metasploit framework, meaning script kiddies and every other security person and wanna be is going to be downloading, if they have not already, and are playing around with DNS on the internet today.

Date: 2008-08-25


Mailtrust: Full featured hosted email for your business
Noteworthy Hosted Email securely stores, manages, and delivers spam and virus free email to your inbox. Best of all, Noteworthy allows you to access email from Outlook, Blackberry, webmail, or any other email client or wireless device.

Date: 2008-08-20


FCC Declares Comcast's Filtering Illegal
It's official, as far as the FCC is concerned, that Comcast's throttling of peer-to-peer traffic was illegal and in violation of the FCC's network neutrality principles. The highly expected ruling came down a few days ago, with Chairman Kevin Martin crossing the political aisle to join commissioners Copps and Adelstein, serving Comcast with a cease-and-desist order.

Date: 2008-08-11


EFF Launches Net Neutrality Tool
The Electronic Frontier Foundation has introduced a new tool that allows users to find out if their ISPs are throttling their P2P files. The new "Switzerland Tool" will reveal if a user's network connection has any restrictions on it from ISPs.

Date: 2008-08-04


A Premium Email Service for Your Business
Along with webmail, mobile email, shared calendaring, you'll also enjoy premium protection against spam and viruses. Best of all, Noteworthy allows you to access email from Outlook, Blackberry, webmail, or any other email client or wireless device. With Noteworthy there are no start-up fees, no costly add-ons, and no hidden fees.

Date: 2008-07-23


SQL Server Upgrade Database Mirroring Issues
Before upgrading our production servers I simply removed the mirroring with the wizard. After the upgrade process the last step was to recreate the mirroring. If you have done this you know that you need to do a full backup with transaction log backup of the db and restore it.

Date: 2008-07-21


Reactions To European Telecommunications Packet Regulations
Today the European Parliament is going to vote on proposed amendments to the telecommunications packet regulation, below an excerpt of FFII press release and Kathy Sinnott reactions.

Date: 2008-07-07


Custom Email Solution for Any Size Business
Your business needs the heavyweight collaboration features of Exchange for the corner offices, but do all your employees need it? With our integrated Hosted Exchange and Noteworthy service, everyone gets what they need and you save a ton.

Date: 2008-06-25


RIAA Demands ISP's To Spy On Their Users
ISP's are beginning to bow to RIAA demands and spying on their users. This is odd if you consider them a communications company... like the telephone companies are. For example, do you talk on the cell phone each day? How about a LAN line? What if...AT&T, Verizon, and T-Mobile (I've probably hit about 80% of you) monitored your phone conversations?

Date: 2008-06-16


The Planet Datacenter Offline After Fire
A transformer fire knocked a Houston datacenter offline, taking down thousands of customers with it.

Date: 2008-06-02


Network Access Control Is Achievable
Network Access Control (NAC) promises to allow only authorized and compliant devices to access and operate on a network. If implemented properly, NAC can improve the security profile of a network and lower the overall security risks faced by an enterprise.

Date: 2008-05-14


Information Security Programs
If you ever have the chance, it is well worth your time to go through the information provided about the Masters of Information security programs at various colleges. If you take a very good look at them, and work on trying to figure out what they are actually trying to teach, you might just walk away either disappointed that there are not more real world information, or that these programs are doing the right thing.

Date: 2008-04-14


ISPs Tracking Everything You're Doing Online
A controversial company in Britain is out to see everything you're doing online. And they are going straight to the source to find out - your ISP. They are about to partner with Britian's top ISPs (BT, Virgin and Talk Talk) to track every single action you take and use it to show you ads.

Date: 2008-03-31


Business Centric Network Monitoring Software - Free Download
ManageEngineŽ OpManager is a complete network monitoring software that offers combined WAN, Server, Applications monitoring with integrated help desk, asset management & WAN traffic analysis functionality. OpManager automates several network monitoring tasks and removes the complexity associated with network management.

Date: 2008-03-19


Microsoft Will Prevail Over Open Source Software
An aspect of the open source software nirvana has been the end of Microsoft's dominance. Well, anyone who sees Linux, OpenOffice or another OSS project/product as the death nail in Microsoft's coffin is not living in reality. It pains me to say this; it really does.

Date: 2008-03-03


Net Stalker's N-Stealth
If you need yet another tool in your tool box, and you want a good web site application level scanner, then you might want to check out N-Stealth from Net Stalker. Nstealth is a small footprint scanner that in the free edition can find a lot of interesting things about your web site, from cross site scripting issues, through foot printing and fingerprinting of your system.

Date: 2008-02-11


Business Centric Network Monitoring Software - Free Download
ManageEngineŽ OpManager is a complete network monitoring software that offers combined WAN, Server, Applications monitoring with integrated help desk, asset management & WAN traffic analysis functionality. OpManager automates several network monitoring tasks and removes the complexity associated with network management.

Date: 2008-01-30


A Recent Security Horror Story
This will teach folks to put out help wanted ads, seems a receptionist in Florida read a help wanted ad that her employer put on, and thought that she was going to be replaced. Rather than asking, and thinking that her job was threatened, she decided to delete files, to the tune of 2.5 million dollars.

Date: 2008-01-25


The Un-Server: Using A MacBook
I started following through with some of my 2008 resolutions. First thing was to finally take the time to program our thermostat. I set it to 59 degrees at 10:00 PM, then to turn up to 64 at 7:00 AM, down to 62 again at 10:00, up to 64 at 5:00.

Date: 2008-01-07


2007 Archive
2006 Archive
2005 Archive
NetworkNewz
SmallBusinessNewz
ITManagementNews

Send me relevant info on
products and services.