May 2018 S M T W T F S « Jun 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Category Archives: Information Security
Got auditors who want to review any mailboxes that have permissions granted for users other than the mailbox owner? If you do you’ll appreciate the usefulness of this oneliner, which will give you a list of all of the mailboxes … Continue reading
PLA looks like a fairly handy log analyis tool for PIX firewalls, for free.
SetACL is a set of routines for managing Windows permissions (ACLs) from the command line, from scripts and from programs. These routines can be used from various container or interface programs. Currently there exists a command line version to be … Continue reading
Chaosreader for connection statistics out of a packet capture. Airsnare is a windows based wireless IDS, of sorts. AntiHook monitors processes creating system wide hooks in windows. Online multi-engine virus scanner
Another interesting looking MS Blog.
So this looks like a fairly decent proximity/two-factor solution. Wonder if it works with Notes and Active Directory? It appears to be based on technology from this company
Discovered the Microsoft Security Weblog today and it appears to have had some interesting information. Of that, here are some things that I’d like to spend more time reviewing: Security Management Functions Server and Domain Isolation Using IPsec and Group … Continue reading