Category Archives: Information Security

Mailboxes with special permissions

Got auditors who want to review any mailboxes that have permissions granted for users other than the mailbox owner?  If you do you’ll appreciate the usefulness of this oneliner, which will give you a list of all of the mailboxes … Continue reading

Posted in Exchange 2007, Information Security, PowerShell, System Administration | Comments Off on Mailboxes with special permissions

PIX Logging

PLA looks like a fairly handy log analyis tool for PIX firewalls, for free.

Posted in Information Security | Comments Off on PIX Logging

SetACL: ActiveX Control

SetACL is a set of routines for managing Windows permissions (ACLs) from the command line, from scripts and from programs. These routines can be used from various container or interface programs. Currently there exists a command line version to be … Continue reading

Posted in Information Security, System Administration, VBScript | Comments Off on SetACL: ActiveX Control

More security tools

Chaosreader for connection statistics out of a packet capture. Airsnare is a windows based wireless IDS, of sorts. AntiHook monitors processes creating system wide hooks in windows. Online multi-engine virus scanner

Posted in Information Security | Comments Off on More security tools

MSDN Blog: BufferOverrun

Another interesting looking MS Blog.

Posted in Information Security, References | Comments Off on MSDN Blog: BufferOverrun


So this looks like a fairly decent proximity/two-factor solution. Wonder if it works with Notes and Active Directory? It appears to be based on technology from this company

Posted in Information Security | Comments Off on HealthCast

From microsoft’s security weblog

Discovered the Microsoft Security Weblog today and it appears to have had some interesting information. Of that, here are some things that I’d like to spend more time reviewing: Security Management Functions Server and Domain Isolation Using IPsec and Group … Continue reading

Posted in Information Security | Comments Off on From microsoft’s security weblog