Search:
Type: Posts; User: tonybradley; Keyword(s):
Search:
Search took 0.05 seconds; generated 29 minute(s) ago.
-
It has been about two years since my last garage clearance. This one is smaller because I have tried to be choosier about what books I get in the first place.
I am offering them up at a deeper...
-
March 21st, 2009, 02:58 AM
At the CanSecWest Security Conference in Vancouver this week, Charlie Miller made headlines by exploiting a Safari vulnerability on a fully patched Mac OS X system with a fully patched Safari web...
-
March 19th, 2009, 07:03 PM
Joanna Rutkowska has posted information on the Invisible Things Lab's blog, including a white paper and proof-of-concept code for an attack that allows for privilege escalation from Ring 0 to SMM...
-
March 19th, 2009, 02:30 PM
Understood.
FWIW- the various posts point to at least two, possibly three different sources- not just my Evangelyze blog. I used BitLy just to make the link length manageable, not to obfuscate.
...
-
March 19th, 2009, 02:05 PM
Hey. I replied to you elsewhere. I thought you had written this as a Private Message and I couldn't find it. Look for that other message from me.
IMHO, what makes this 'spam' is the trailing dots...
-
March 19th, 2009, 01:55 AM
When Microsoft Office Communications Server 2007 R2 (OCS 2007 R2) was unveiled in February of this year, it signaled the beginning of the end for the PBX or IP PBX. That is just my opinion I suppose,...
-
March 18th, 2009, 09:11 PM
As Director of Security for Evangelyze Communications my primary focus is on the security implications of VoIP and unified communications and helping our customers to understand the risks and...
-
March 18th, 2009, 09:08 PM
Forefront Client Security and other Forefront Server Security products, such as Forefront Security for Exchange Server and Forefront Security for Sharepoint, have been around for some time now....
-
March 16th, 2009, 07:32 PM
If you have been following unified communications and the evolution of Microsoft’s Office Communications Server, it is probably not a surprise to you to learn that Microsoft intends for the next...
-
March 16th, 2009, 04:23 PM
Even for organizations that have solid password policies, or for users who have done everything they can to ensure they are using a secure password, the password alone is still weaker protection than...
-
March 16th, 2009, 03:12 AM
Pretty cool name, huh? If you're going to create a new VoIP or unified communications attack, you want to have one with panache and it is hard to get a name with more impact than the 'INVITE of...
-
March 15th, 2009, 07:31 PM
Unified communications is more than the sum of the technology components that make it up. Unified communication is about shifting the focus and being able to implement or develop innovative...
-
March 15th, 2009, 07:28 PM
Pssst. Over here. Keep this just between us, ok? The global economy is trashed. Shhhh.
If you haven’t heard, the United States and the rest of the world are in a recession bordering on depression....
-
March 15th, 2009, 12:19 AM
The DirectAccess Server does not have to be public-facing. You can use ISA/IAG at the perimeter and route through to a DirectAccess server internally.
DirectAccess can be configured so that all...
-
March 14th, 2009, 08:07 PM
Well- they did. But, there was much debate and back and forth about the security implications of the default UAC in the Beta so they announced that they are modifying the default settings to tighten...
-
March 14th, 2009, 06:46 PM
Windows 7 has a lot of exciting features both for consumers and enterprises. One of the most promising features for enterprises is DirectAccess. DirectAccess makes VPN connections obsolete and...
-
March 14th, 2009, 06:42 PM
I have been using Internet Explorer 8 (IE8) almost exclusively since the first Beta became available. Now, my primary OS is the Windows 7 Beta, so IE8 is built-in as my default browser. I have run...
-
March 12th, 2009, 06:29 AM
SIP trunking provides organizations with a cost-effective, reliable method of connecting the internal network and telephony systems with exernal VoIP and traditional phone systems over the IP...
-
March 12th, 2009, 06:27 AM
The founder of Metasploit, HD Moore, has released a new set of tools for voice security research and penetration testing- WarVOX. Metasploit has been around for a few years and has offered security...
-
March 12th, 2009, 06:24 AM
The next major Service Pack release for Windows Vista and Windows Server 2008 is one step closer to its official release. Service Pack 2 (SP2) has moved from Beta to RC (Release Candidate). You can...
-
March 12th, 2009, 06:09 AM
As a consumer I have used VoIP for almost 5 years. I have been with Vonage in three different houses in two different states separated by 1300 plus miles. While I didn’t take advantage of it when...
-
September 14th, 2007, 09:14 PM
It is not an automated news feed site. I have been scouring various resources and blogging my own opinions and insights about current events in the networking world. The site gets its "official"...
-
September 14th, 2007, 08:31 PM
I started a new blog site- a couple actually.
One is focused on networking- routers, protocols, network hardware, etc. That one is a TechTarget blog you can find at Connectivity.
The other is...
-
September 14th, 2007, 08:21 PM
I got 25 / 30. I am a Security Wizard (or at least Agnitum thinks so)
-
September 14th, 2007, 05:41 AM
What versions of the products are you using? Assuming you are using a remotely current version, why not leverage the functionality built in. McAfee has ePO and Symantec has System Center. In either...
|
|