<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4506106577801078776</id><updated>2024-10-25T00:42:57.932-04:00</updated><category term="Security"/><category term="Exchange 2007"/><category term="Cisco"/><category term="CCNP"/><category term="Windows Server 2008"/><category term="Windows Server Hyper-V"/><category term="Authored Articles"/><category term="Exchange 2010"/><category term="Windows Server 2012"/><category term="OSPF"/><category term="Active Directory"/><category term="Exchange Management Shell"/><category term="Windows 8"/><category term="certification"/><category term="Exchange 2003"/><category term="Powershell"/><category term="Windows Vista"/><category term="CCNA"/><category term="HyperV"/><category term="education"/><category term="Exchange Management Console"/><category term="Group Policy"/><category term="Microsoft Office 2007"/><category term="Windows 7"/><category term="Windows Server 2008 R2"/><category term="CCR"/><category term="Exchange 2013"/><category term="Failover Clustering"/><category term="SP1"/><category term="ASA"/><category term="Clustered Continuous Replication"/><category term="Clustering"/><category term="Server 2008 Core"/><category term="Ubuntu"/><category term="iSCSI"/><category term="Apple"/><category term="Cisco CM"/><category term="Core Installation"/><category term="DNS"/><category term="Deployment"/><category term="Group Policy Management Console"/><category term="Hypervisor"/><category term="Linux"/><category term="NAP"/><category term="Network Access Protection"/><category term="Password"/><category term="RSAT"/><category term="System Center Virtual Machine Manager"/><category term="Terminal Services"/><category term="Troubleshooting"/><category term="Windows Server 2003"/><category term="virtualization"/><category term="Active Directory Certificate Services"/><category term="Automatic Updates"/><category term="BGP"/><category term="Business Continuity Planning"/><category term="CCIE"/><category term="Call Manager"/><category term="Cryptography"/><category term="E-mail"/><category term="Forefront Security"/><category term="Hacking"/><category term="Highly Available Virtual Machines"/><category term="Hub Transport Role"/><category term="InfoSec"/><category term="Launch"/><category term="MCITP"/><category term="MCSE"/><category term="MOOC"/><category term="Microsoft Excel"/><category term="Microsoft Office"/><category term="Office 365"/><category term="Patch Management"/><category term="Patching"/><category term="Project Management"/><category term="Python"/><category term="Remote Server Administration Tools"/><category term="SQL Server"/><category term="Skills Gap"/><category term="Technet"/><category term="Terminal Services Gateway"/><category term="Virtual Server 2005 R2"/><category term="Vulnerability Scanning"/><category term="Windows Registry"/><category term="Windows Update"/><category term="Wireless"/><category term="Word 2007"/><category term="hardware-assisted virtualization"/><category term="ldp.exe"/><category term="phishing"/><category term="programming"/><category term="user education"/><category term="AD RMS"/><category term="ASA 5506"/><category term="ASA5505"/><category term="Adobe Acrobat"/><category term="Azure"/><category term="BETA"/><category term="BSOD"/><category term="Backtrack"/><category term="Backup"/><category term="Basecamp"/><category term="CM 8"/><category term="Call Manager 8"/><category term="Career"/><category term="Certificate Services"/><category term="Citrix"/><category term="DPM"/><category term="Disaster Recovery Planning"/><category term="Documenting"/><category term="Eseutil"/><category term="FSW"/><category term="File Share Witness"/><category term="Fun"/><category term="GPMS"/><category term="IMAP"/><category term="IPv6"/><category term="Intel"/><category term="Internet Explorer"/><category term="Java"/><category term="KMS"/><category term="Key Management Services"/><category term="Leadership"/><category term="MAP"/><category term="MCM"/><category term="MCSA"/><category term="MMC"/><category term="MSITP"/><category term="Management"/><category term="Meterpreter"/><category term="Microsoft Certified IT Professional"/><category term="Microsoft Certified Master"/><category term="Microsoft Operations Framework"/><category term="Microsoft Project"/><category term="NAS"/><category term="NTLM"/><category term="Network Administrator"/><category term="OSI Model"/><category term="OWA"/><category term="Office 2010"/><category term="Outlook"/><category term="Outlook Web Access"/><category term="PKI"/><category term="Packet Analysis"/><category term="Penetration Testing"/><category term="Pivot Tables"/><category term="Protocol Analyzer"/><category term="QoS"/><category term="RMS"/><category term="Rights Management Services"/><category term="SSTP"/><category term="Secure Sockets Tunnelling Protocol"/><category term="Sharepoint"/><category term="Shellshock"/><category term="SoftGrid"/><category term="Software Development"/><category term="Subscription"/><category term="Support incident"/><category term="SysInternals"/><category term="System Center"/><category term="Teamwork"/><category term="Terminal Services RemoteApp"/><category term="Two-Factor Authentication"/><category term="Unified Messaging"/><category term="VBA"/><category term="VMware"/><category term="VPN"/><category term="Veeam"/><category term="Vista Gadget"/><category term="Visual Studio"/><category term="WAAS"/><category term="WAN"/><category term="WSUS"/><category term="Wide Area Application Services"/><category term="Wide Area Network"/><category term="Windows XP"/><category term="Wireshark"/><category term="asp.net"/><category term="cloud storage"/><category term="data analysis"/><category term="data mining"/><category term="data science"/><category term="iPad"/><category term="macros"/><category term="scripting"/><category term="soft skills"/><category term="spam"/><category term="windows"/><title type='text'>Windows Server, Exchange Server, Cisco Networking, and other IT Pro Stuff</title><subtitle type='html'>This blog focuses mostly on Microsoft Windows Server, Exchange Server, and Cisco Networking and Voice.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>385</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-2034261475756828447</id><published>2017-06-23T08:56:00.002-04:00</published><updated>2017-06-23T08:57:11.039-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Intro to Python Network Automation</title><content type='html'>&lt;a href=&quot;http://packetpushers.net/intro-python-network-automation/&quot;&gt;http://packetpushers.net/intro-python-network-automation/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/2034261475756828447/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/2034261475756828447' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2034261475756828447'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2034261475756828447'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2017/06/intro-to-python-network-automation.html' title='Intro to Python Network Automation'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-8792737064725450921</id><published>2017-06-20T11:17:00.000-04:00</published><updated>2017-06-20T11:17:00.686-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Powershell"/><title type='text'>PowerShell Desired State Configuration of Cisco UCS</title><content type='html'>&lt;a href=&quot;http://www.powershellmagazine.com/2017/05/29/cisco-ucs-custom-resource-for-the-windows-powershell-desired-state-configuration-dsc/&quot;&gt;http://www.powershellmagazine.com/2017/05/29/cisco-ucs-custom-resource-for-the-windows-powershell-desired-state-configuration-dsc/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/8792737064725450921/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/8792737064725450921' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/8792737064725450921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/8792737064725450921'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2017/06/powershell-desired-state-configuration.html' title='PowerShell Desired State Configuration of Cisco UCS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-968812647423150528</id><published>2017-06-17T09:22:00.001-04:00</published><updated>2017-06-17T09:22:34.317-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cryptography"/><title type='text'>EncryptionandDecryption.com</title><content type='html'>http://encryptionanddecryption.com/&lt;br /&gt;
&lt;br /&gt;
Nice starting point for learning some of the basics about encryption.</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/968812647423150528/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/968812647423150528' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/968812647423150528'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/968812647423150528'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2017/06/encryptionanddecryptioncom.html' title='EncryptionandDecryption.com'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-3831896826051283958</id><published>2015-05-18T07:00:00.000-04:00</published><updated>2015-05-18T07:00:01.784-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="ASA 5506"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><title type='text'>Cisco ASA 5506 no switch ports!</title><content type='html'>Cisco recently began selling the &lt;a href=&quot;http://www.cisco.com/c/en/us/support/security/asa-5506-x-firepower-services/model.html&quot;&gt;ASA 5506 with FirePower Services&lt;/a&gt;.&amp;nbsp; This expanded the existing next generation firewall line replacing the ASA 5505.&lt;br /&gt;
&lt;br /&gt;
A few days ago I got a chance to configure one for a client.&amp;nbsp; I was excited to learn a bit about the new IPS features before doing a basic configuration.&amp;nbsp; Based on the very limited amount of documentation available, it appears the new model offers a nice increase in capacity.&lt;br /&gt;
&lt;br /&gt;
One the great features of the ASA 5505, was its ability to act as both a firewall and switch.&amp;nbsp; For small offices with small budgets, this meant an affordable option to add a firewall with some switch port capacity.&lt;br /&gt;
&lt;br /&gt;
The ASA 5506, looks very similar aside from its black and case and red label.&lt;br /&gt;
&lt;br /&gt;
I was disappointed to learn that the 5506 really isn&#39;t a replacement for the 5505.&amp;nbsp; It does everything and more the 5505 did, with one exception: &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;You cannot use any of the 8 ports as a switch port!&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
I&#39;m not sure what Cisco is planning with this new hardware, but I&#39;m really hoping that a later release of software will enable the same functionality we have grown accustomed to in the 5505.&lt;br /&gt;
&lt;br /&gt;
The little &lt;a href=&quot;http://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/models-comparison.html&quot;&gt;documentation specific to the 5506&lt;/a&gt; is a little misleading.&amp;nbsp; Previously, with the 5505, you could have 3 VLANs.&amp;nbsp; With the new 5506, the referenced document states that you can have 5 VLANs.&amp;nbsp; Good luck trying to get it working though!&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
If you refer to some the other higher end models you can see they also have an allowed number of VLANs.&amp;nbsp;&amp;nbsp;The 5505 truly acts as a switch when it comes to VLANs, access ports, and trunk ports.&amp;nbsp; The 5506 acts just like a router, where you can apply 802.1q tagging to place sub interfaces in different VLANs.&lt;br /&gt;
&lt;br /&gt;
I&#39;m a big Cisco fan, so I&#39;m very hopeful that a later software release will offer more flexibility and allow us to use the 5506 just like we&#39;re used to with the 5505.</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/3831896826051283958/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/3831896826051283958' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3831896826051283958'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3831896826051283958'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2015/05/cisco-asa-5506-no-switch-ports.html' title='Cisco ASA 5506 no switch ports!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-124216382710859100</id><published>2015-03-08T13:53:00.000-04:00</published><updated>2015-03-08T13:53:00.799-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Cisco ASA OS versions that address security vulnerabilities</title><content type='html'>&lt;a href=&quot;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa&quot;&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/124216382710859100/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/124216382710859100' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/124216382710859100'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/124216382710859100'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2015/03/cisco-asa-os-versions-that-address.html' title='Cisco ASA OS versions that address security vulnerabilities'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-3618400997218315592</id><published>2015-03-07T13:45:00.001-05:00</published><updated>2015-03-07T13:45:07.260-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Active Directory Certificate Services"/><title type='text'>PKI Step by Step Server 2012 R2: Great posts!</title><content type='html'>Part 1&lt;br /&gt;
&lt;a href=&quot;http://blogs.technet.com/b/yungchou/archive/2013/10/21/enterprise-pki-with-windows-server-2012-r2-active-directory-certificate-services-part-1-of-2.aspx&quot;&gt;http://blogs.technet.com/b/yungchou/archive/2013/10/21/enterprise-pki-with-windows-server-2012-r2-active-directory-certificate-services-part-1-of-2.aspx&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Part 2&lt;br /&gt;
&lt;a href=&quot;http://blogs.technet.com/b/yungchou/archive/2013/10/22/enterprise-pki-with-windows-server-2012-r2-active-directory-certificate-services-part-2-of-2.aspx&quot;&gt;http://blogs.technet.com/b/yungchou/archive/2013/10/22/enterprise-pki-with-windows-server-2012-r2-active-directory-certificate-services-part-2-of-2.aspx&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/3618400997218315592/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/3618400997218315592' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3618400997218315592'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3618400997218315592'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2015/03/pki-step-by-step-server-2012-r2-great.html' title='PKI Step by Step Server 2012 R2: Great posts!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-7529967476238061350</id><published>2014-12-21T07:00:00.000-05:00</published><updated>2014-12-21T07:00:02.689-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>FBI claims North Korea responsible for attack on Sony</title><content type='html'>&lt;a href=&quot;http://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation/&quot;&gt;http://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/7529967476238061350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/7529967476238061350' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7529967476238061350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7529967476238061350'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/12/fbi-claims-north-korea-responsible-for.html' title='FBI claims North Korea responsible for attack on Sony'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-3467171751725304497</id><published>2014-12-20T08:39:00.000-05:00</published><updated>2014-12-20T08:39:05.654-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>After 65000 complaints Microsoft suing tech support scammers</title><content type='html'>&lt;a href=&quot;http://hothardware.com/news/after-receiving-65000-complaints-microsoft-files-suit-against-tech-support-scammers&quot;&gt;http://hothardware.com/news/after-receiving-65000-complaints-microsoft-files-suit-against-tech-support-scammers&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/3467171751725304497/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/3467171751725304497' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3467171751725304497'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3467171751725304497'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/12/after-65000-complaints-microsoft-suing.html' title='After 65000 complaints Microsoft suing tech support scammers'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-7178715280183735448</id><published>2014-11-12T08:14:00.001-05:00</published><updated>2014-11-12T08:14:43.840-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backup"/><category scheme="http://www.blogger.com/atom/ns#" term="Veeam"/><title type='text'>Check out Veeam version 8</title><content type='html'>Veeam version 8 was released to the world last week.&lt;br /&gt;
Check out some of the new features&lt;br /&gt;&lt;a href=&quot;http://www.veeam.com/veeam_backup_8_whats_new_en_wn.pdf&quot;&gt;http://www.veeam.com/veeam_backup_8_whats_new_en_wn.pdf&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/7178715280183735448/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/7178715280183735448' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7178715280183735448'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7178715280183735448'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/11/check-out-veeam-version-8.html' title='Check out Veeam version 8'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-977972500635870009</id><published>2014-10-08T08:06:00.000-04:00</published><updated>2014-10-08T08:08:12.912-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Goodbye SHA-1</title><content type='html'>In November 2013, Microsoft announced plans to &lt;a href=&quot;https://technet.microsoft.com/library/security/2880823&quot;&gt;deprecate issuing certificates using the SHA-1&lt;/a&gt; algorithm. &amp;nbsp;Chromium, and other browsers, also has plans to &lt;a href=&quot;http://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html&quot;&gt;change the way SSL certs using SHA-1 are treated&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Industry expert Bruce Schneier explains the need in an article he posted October 2012, &lt;a href=&quot;https://www.schneier.com/blog/archives/2012/10/when_will_we_se.html&quot;&gt;When Will We See Collisions for SHA-1?&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
For more info:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.schneier.com/blog/archives/2012/10/when_will_we_se.html&quot;&gt;https://www.schneier.com/blog/archives/2012/10/when_will_we_se.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.symantec.com/connect/blogs/google-s-sha-1-deprecation-plan-chrome&quot;&gt;http://www.symantec.com/connect/blogs/google-s-sha-1-deprecation-plan-chrome&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://technet.microsoft.com/library/security/2880823&quot;&gt;https://technet.microsoft.com/library/security/2880823&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://support.godaddy.com/help/article/4818/information-about-requiring-the-sha-2-hash-function&quot;&gt;https://support.godaddy.com/help/article/4818/information-about-requiring-the-sha-2-hash-function&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html&quot;&gt;http://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/&quot;&gt;https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.entrust.com/sha-1-deprecation-on-to-sha-2/&quot;&gt;http://www.entrust.com/sha-1-deprecation-on-to-sha-2/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/977972500635870009/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/977972500635870009' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/977972500635870009'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/977972500635870009'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/10/goodbye-sha-1.html' title='Goodbye SHA-1'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-2971809986720417509</id><published>2014-10-01T13:05:00.001-04:00</published><updated>2014-10-01T13:05:37.034-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Shellshock"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Scanning"/><title type='text'>The Shellshock Vulnerability</title><content type='html'>If you are running any Unix-based systems (which you most likely are) you&#39;ll want to read this article about the Shellshock Vulnerability. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.trustwave.com/Resources/Trustwave-Blog/The-Scoop-on-Shellshock/&quot; target=&quot;_blank&quot;&gt;The Scoop on Shellshock&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/2971809986720417509/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/2971809986720417509' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2971809986720417509'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2971809986720417509'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/10/the-shellshock-vulnerability.html' title='The Shellshock Vulnerability'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-7769296376433267531</id><published>2014-09-26T09:13:00.000-04:00</published><updated>2014-09-26T09:13:52.550-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Two-Factor Authentication"/><title type='text'>Two-Factor Authentication</title><content type='html'>Are you using two-factor authentication for your system?&lt;br /&gt;
&lt;br /&gt;
User names and passwords, as pointed out in a &lt;a href=&quot;http://www.trustwave.com/Resources/Trustwave-Blog/A-Simple-Strategy-to-Make-Life-Harder-for-Hackers/?page=1&amp;amp;year=0&amp;amp;month=0&amp;amp;topic=0&amp;amp;category=0&amp;amp;author=0&quot; target=&quot;_blank&quot;&gt;recent Trustwave article&lt;/a&gt;, were never meant to live this long. &amp;nbsp;And with all of the recent breaches we should be looking for more secure login methods.&lt;br /&gt;
&lt;br /&gt;
This is where two-factor authentication comes in. &amp;nbsp;It combines the traditional login (something you know) with another of two factors (either something you have or something you are). &amp;nbsp;Two-factor authentication can utilize biometric scanning, key fobs, login tokens, or a second password that is sent to a unique device that you carry.&lt;br /&gt;
&lt;br /&gt;
One option is to use a product like &lt;a href=&quot;https://www.duosecurity.com/why-two-factor&quot; target=&quot;_blank&quot;&gt;Duo Security&lt;/a&gt; to have a second, randomly generated password sent to the users cell phone. &amp;nbsp;A more complete option would be &lt;a href=&quot;http://www.safenet-inc.com/multi-factor-authentication/two-factor-authentication-2fa/&quot; target=&quot;_blank&quot;&gt;SafeNet&lt;/a&gt;, who offers a range of two-factor options including one-time password authenticators, USB tokens, smart cards, Mobile PASS, cell phone options, cloud based options, and more.&lt;br /&gt;
&lt;br /&gt;
There are many options available with a simple Google search. &amp;nbsp;Find something that works for you and add an extra layer of defense to your network.</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/7769296376433267531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/7769296376433267531' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7769296376433267531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7769296376433267531'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/two-factor-authentication.html' title='Two-Factor Authentication'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-372623816700734022</id><published>2014-09-22T13:14:00.000-04:00</published><updated>2014-09-22T13:14:21.191-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basecamp"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft Project"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Sharepoint"/><category scheme="http://www.blogger.com/atom/ns#" term="Teamwork"/><title type='text'>Waiting on Co-workers</title><content type='html'>A recent &lt;a href=&quot;http://www.cio.com/article/2605852/careers-staffing/are-your-co-workers-killing-your-productivity.html?source=CIONLE_nlt_leader_2014-09-18#tk.rss_careersstaffing&quot; target=&quot;_blank&quot;&gt;article on CIO.com&lt;/a&gt; about co-workers negatively impacting productivity suggested that project management software might lead to better results. &amp;nbsp;However, the article failed to explore the many options available on the market today.&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The first option is to go with &lt;a href=&quot;http://office.microsoft.com/en-us/project/&quot; target=&quot;_blank&quot;&gt;Microsoft Project&lt;/a&gt;. &amp;nbsp;My personal experience with this software is that it is not intuitive and therefore you have to allocate time to learn it, teach it, and then implement it. &amp;nbsp;Also, it is not an open source package so you have licensing expenses to budget for.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Next up is the option of installing a Sharepoint server and creating your own central collaboration resource. &amp;nbsp;Again, this is going to take time, budget, and education resources in order to achieve results.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A better option may be to use a free online resource such as &lt;a href=&quot;https://basecamp.com/&quot; target=&quot;_blank&quot;&gt;Basecamp&lt;/a&gt;. &amp;nbsp;I have experience with Basecamp and have found it to be much more intuitive than other software, such as Project. &amp;nbsp;New projects are easy to create, as are tasks, and you can easily administer group communication settings. &amp;nbsp;The free version will limit you on the total number of projects you can maintain, so this isn&#39;t meant to be used enterprise-wide on a large scale. &amp;nbsp;However, to get immediate results with minimal expense and training this is a great route to go.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Click &lt;a href=&quot;https://basecamp.com/&quot; target=&quot;_blank&quot;&gt;here &lt;/a&gt;to check out Basecamp. &amp;nbsp;Or, alternatively, click &lt;a href=&quot;https://www.teamwork.com/&quot; target=&quot;_blank&quot;&gt;here &lt;/a&gt;for another option called Teamwork.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/372623816700734022/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/372623816700734022' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/372623816700734022'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/372623816700734022'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/waiting-on-co-workers.html' title='Waiting on Co-workers'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-7405701394660528174</id><published>2014-09-17T08:53:00.001-04:00</published><updated>2014-09-17T08:53:59.121-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Scanning"/><title type='text'>Enterprise Vulnerability Scanning Tools</title><content type='html'>Good article with practical tips and suggestions about selecting a vulnerability scanning tool for your business.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.cio.com/article/2683235/security0/how-to-choose-the-best-vulnerability-scanning-tool-for-your-business.html?source=CIONLE_nlt_insider_2014-09-17#tk.rss_dataprotection&quot; target=&quot;_blank&quot;&gt;Enterprise Vulnerability Scanning Tools&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/7405701394660528174/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/7405701394660528174' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7405701394660528174'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/7405701394660528174'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/enterprise-vulnerability-scanning-tools.html' title='Enterprise Vulnerability Scanning Tools'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-2881635839249537134</id><published>2014-09-10T10:14:00.000-04:00</published><updated>2014-09-10T10:14:34.979-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-mail"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="user education"/><title type='text'>Tips for User Education</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;a href=&quot;http://itprostuff.blogspot.com/2014/09/securing-e-mail.html&quot; target=&quot;_blank&quot;&gt;Monday I posted&lt;/a&gt; about the difficulties in securing e-mail
and the need for more user education in organizations.&amp;nbsp; As promised I have a few suggestions for
establishing user training in your organization on a shoestring budget.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
I’ll begin with a question.&amp;nbsp;
Which type of movie do you remember better when you leave the theatre:
an action movie like The Avengers or a chick flick like The Fault in our Stars?&amp;nbsp; Personally, I retain more from X-Men and
action movies than I remember from the chick flicks that I watch to keep my
wife happy.&amp;nbsp; But I’m sure women (and a
few guys) prefer the emotional movies.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Your choice doesn’t matter as much as your motivation
here.&amp;nbsp; Why do you remember certain movies
more than others?&amp;nbsp; Because they aren’t
boring &lt;b&gt;&lt;u&gt;to you&lt;/u&gt;&lt;/b&gt;.&amp;nbsp; They are exciting and they likely have your
interest before the opening credits begin to roll.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
In security training your focus needs to be on making the
material interesting &lt;b&gt;&lt;u&gt;to the users&lt;/u&gt;&lt;/b&gt;.&amp;nbsp; No one cares how interesting the technical
details are to you.&amp;nbsp; Your job is to make
it memorable for the users.&amp;nbsp; My
suggestions to make it memorable, practical, educational, and inexpensive:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Create the material in-house rather than hiring an outside consultant.&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Make the&amp;nbsp; presentation yourself (it’s good practice in a safe environment).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Show people why they should care and what benefits they get from a secure system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Use a Powerpoint presentation rather than lecturing.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Use real-life examples.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Have a competition to see who can identify the most fraudulent e-mails and advertisements.&amp;nbsp; The winner gets a restaurant gift card or cash.&amp;nbsp; Cash is great incentive to pay attention.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Make the reward large enough to get attention but small enough to ensure future budget approval (somewhere in the $25-50 range should do).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Offer more rewards for real incident reports.&amp;nbsp; Getting it right in the training is great, but catching spam and malware in real-time is a game changer.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Create a safe environment for questions.&amp;nbsp; The reason most non-IT people don’t understand attacks is because IT people make them feel stupid.&amp;nbsp; Don’t be that guy (or gal).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -24px;&quot;&gt;Use a tool (examples listed below) to create and track test e-mail.&amp;nbsp; You can use the results to reward users that detect the phony stuff and also to sell management on the benefits of future training (which may lead to a larger budget).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
The bottom line is that if you make it fun and safe and
offer some sort of incentive your audience will engage, and that is a win for
everyone in your organization.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.knowbe4.com/phishing-security-test/&quot; target=&quot;_blank&quot;&gt;Free Phishing Security Test&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://krebsonsecurity.com/2012/01/phishing-your-employees-101/&quot; target=&quot;_blank&quot;&gt;Simple Phishing Toolkit&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/2881635839249537134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/2881635839249537134' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2881635839249537134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2881635839249537134'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/monday-i-posted-about-difficulties-in.html' title='Tips for User Education'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-3483786987963042770</id><published>2014-09-08T09:54:00.000-04:00</published><updated>2014-09-08T09:54:56.080-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-mail"/><category scheme="http://www.blogger.com/atom/ns#" term="education"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="user education"/><title type='text'>Securing E-mail</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;
Securing e-mail is a big challenge for admins.&amp;nbsp; You have to mix expertise in hardware,
software, and user education in order to construct a complete defense.&amp;nbsp; Even then you probably won’t rest well, and
for good reason.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Users are still the number one way into a system and one of
the oldest tricks in the book to gain access via users, spam, is still in full
force.&amp;nbsp; According to &lt;a href=&quot;http://www.cio.com/article/2600349/phishing/email-security-still-a-struggle-for-most-companies.html&quot; target=&quot;_blank&quot;&gt;this CIO.com article&lt;/a&gt;
banks and social media have improved their security and the focus has now shifted
to the travel industry, which experienced an 800% increase in threats from Q1
to Q2 2014.&amp;nbsp; There are a couple of
reasons for this – people are fatigued and people are on mobile devices, which
are not secured as well.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Hardware and software anti-spam measures are constantly
being usurped.&amp;nbsp; &lt;a href=&quot;http://blog.spiderlabs.com/2014/09/stupid-spammer-tricks-reversing-characters.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+SpiderlabsAnterior+%28SpiderLabs+Anterior%29&quot; target=&quot;_blank&quot;&gt;This recent article&lt;/a&gt; from
SpiderLabs demonstrates a rekindled method of obscuring text from spam filters.
&amp;nbsp;It is simple, brilliant, and
effective.&amp;nbsp; It will lead to changes in the
spam filtering algorithms, at which point attackers will have moved on to
another method.&amp;nbsp; Rinse, lather, and
repeat…&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
User education is, and will likely always be, the most
effective defense against spam and phishing scams.&amp;nbsp; However, almost no companies have formal
training programs and even fewer have e-mail education in their annual
budget.&amp;nbsp; I think the CIO article
summarizes it best when they say that hackers/attackers are “businessmen and
businesswomen” and as such are “incentivized to be successful”.&amp;nbsp; Are we creating incentives to be successful
in defense?&amp;nbsp; Do users have incentives to
be educated and proactive?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Come back Wednesday and I’ll have some suggestions on how to
train and incentivize with a shoestring budget.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/3483786987963042770/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/3483786987963042770' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3483786987963042770'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3483786987963042770'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/securing-e-mail.html' title='Securing E-mail'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-4320747749783876958</id><published>2014-09-08T09:47:00.001-04:00</published><updated>2014-09-08T09:47:16.414-04:00</updated><title type='text'>Cisco Error Message Decoder</title><content type='html'>Cisco devices can log some fairly cryptic messages. &amp;nbsp;To help you get additional information, they have provided an Error Message Decoder. &amp;nbsp;Enjoy!&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi&quot;&gt;https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/4320747749783876958/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/4320747749783876958' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4320747749783876958'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4320747749783876958'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/cisco-error-message-decoder.html' title='Cisco Error Message Decoder'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-1652577339241334243</id><published>2014-09-03T09:09:00.000-04:00</published><updated>2014-09-03T09:09:28.478-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Explorer"/><category scheme="http://www.blogger.com/atom/ns#" term="Java"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows XP"/><title type='text'>How to Mitigate Vulnerability in Windows</title><content type='html'>Although &lt;a href=&quot;http://www.cio.com/article/2376575/windows-xp/10-ways-to-keep-windows-xp-machines-secure.html&quot; target=&quot;_blank&quot;&gt;this article&lt;/a&gt; was intended as a guide to those still using unsupported Windows XP the guidelines are quite practical for any user in any operating system. &amp;nbsp;The basics:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Don&#39;t use Internet Explorer. &amp;nbsp;Quite honestly I didn&#39;t know people still used IE. &amp;nbsp;However, it does still have quite a following as the default browser in most systems, both old and new, and it is commonly used by those that are less tech-savvy. &amp;nbsp;I strongly encourage the use of &lt;a href=&quot;https://www.google.com/chrome/browser/&quot; target=&quot;_blank&quot;&gt;Chrome &lt;/a&gt;or &lt;a href=&quot;https://www.mozilla.org/en-US/firefox/new/&quot; target=&quot;_blank&quot;&gt;Firefox&lt;/a&gt;, just as the article advocates.&lt;/li&gt;
&lt;li&gt;Remove Java. &amp;nbsp;The article lists Flash next but Java has been the big offender over the past few years. &amp;nbsp;Uninstall it...immediately. &amp;nbsp;Re-install if absolutely necessary and quickly trash it when your task is complete.&lt;/li&gt;
&lt;li&gt;Don&#39;t use administrator accounts. &amp;nbsp;You need one admin account but it shouldn&#39;t be the one you use when you are surfing, checking Facebook, Instagramming, or whatever else consumes your time online. &amp;nbsp;All you need is the admin password in case you need to install something. &amp;nbsp;You&#39;re better off leaving the admin account unused as much as possible.&lt;/li&gt;
&lt;li&gt;Disconnect from the network. &amp;nbsp;An attempted attack occurs on your PC or laptop every 37 seconds. &amp;nbsp;How many attacks could you prevent by turning the machine off when you go to bed? &amp;nbsp;Or when you hop in the shower? &amp;nbsp;Or while you prepare dinner? &amp;nbsp;The safest way to prevent attacks is to disconnect from the internet or power down completely.&lt;/li&gt;
&lt;/ol&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/1652577339241334243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/1652577339241334243' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/1652577339241334243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/1652577339241334243'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/09/how-to-mitigate-vulnerability-in-windows.html' title='How to Mitigate Vulnerability in Windows'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-4576613025271338711</id><published>2014-08-30T13:50:00.000-04:00</published><updated>2014-08-30T13:50:08.273-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><title type='text'>Cisco Prime NCS Demo License</title><content type='html'>If you try acquiring a demo license from www.cisco.com/go/license you&#39;ll be frustrated with invalid serial prompts.&lt;br /&gt;
&lt;br /&gt;
Instead, use this version of the same form, and you&#39;ll be all set.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://tools.cisco.com/SWIFT/LicensingUI/loadDemoLicensee?FormId=3999&quot; rel=&quot;nofollow&quot; style=&quot;background-color: white; color: #4a7399; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; outline: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;https://tools.cisco.com/SWIFT/LicensingUI/loadDemoLicensee?FormId=3999&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/4576613025271338711/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/4576613025271338711' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4576613025271338711'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4576613025271338711'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/cisco-prime-ncs-demo-license.html' title='Cisco Prime NCS Demo License'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-3659840528420205389</id><published>2014-08-27T22:07:00.000-04:00</published><updated>2014-08-27T22:07:10.173-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Career"/><category scheme="http://www.blogger.com/atom/ns#" term="soft skills"/><title type='text'>How to Identify Soft Skills in IT Job Candidates</title><content type='html'>&lt;a href=&quot;http://www.cio.com/article/2466088/hiring/how-to-identify-soft-skills-in-it-job-candidates.html?source=CIONLE_nlt_leader_2014-08-21#tk.rss_hiring&quot; target=&quot;_blank&quot;&gt;How to Identify Soft Skills in IT Job Candidates&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Outstanding article on the value of &quot;soft&quot; skills, especially in IT. &amp;nbsp;The best quotes:&lt;br /&gt;
&lt;br /&gt;
&quot;IT is in the room with the business leaders when decisions are made.&quot;&lt;br /&gt;
&lt;br /&gt;
&quot;The heads-down IT person who&#39;s just programming is becoming less and 
less attractive to employers, because you have to be able to communicate
 with your business partners or their customers.&quot;&lt;br /&gt;
&lt;br /&gt;
&quot;In IT, it&#39;s important to go to the non-IT people who don&#39;t understand what technology can actually do.&quot;&lt;br /&gt;
&lt;br /&gt;
&quot;IT should come out of behavioral interviewing.&quot;&lt;br /&gt;
&lt;br /&gt;
If you are, as the article puts it, &quot;in the back room with the lights off writing code&quot; you may find yourself on the outside looking in as IT moves into decision-making roles and business roles. &amp;nbsp;Technical skills can be taught to anyone that is eager to learn and are almost universally taught on-the-job. &amp;nbsp;People skills, as the article points out, are more rare and in high demand.&lt;br /&gt;
&lt;br /&gt;
What are you doing to sharpen your soft skills?</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/3659840528420205389/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/3659840528420205389' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3659840528420205389'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/3659840528420205389'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/how-to-identify-soft-skills-in-it-job.html' title='How to Identify Soft Skills in IT Job Candidates'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-4142770053470524531</id><published>2014-08-12T21:42:00.003-04:00</published><updated>2014-08-12T21:42:54.933-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><title type='text'>Cisco Bug Search Tool</title><content type='html'>Cisco support is pretty good. &amp;nbsp;I just hate it when I open a support request for some wierd issue and then find out they just used the bug search tool and found out an IOS upgrade would probably fix the problem.&lt;br /&gt;
&lt;br /&gt;
For my own future reference, and anyone else out there who&#39;s been there, here is a link to the tool&amp;nbsp;&lt;a href=&quot;https://tools.cisco.com/bugsearch&quot;&gt;https://tools.cisco.com/bugsearch&lt;/a&gt;&amp;nbsp;.</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/4142770053470524531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/4142770053470524531' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4142770053470524531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/4142770053470524531'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/cisco-bug-search-tool.html' title='Cisco Bug Search Tool'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10049068288881461310</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-5429829816425663036</id><published>2014-08-11T13:07:00.001-04:00</published><updated>2014-08-11T13:07:15.237-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Management"/><title type='text'>How the LinkedIn CEO Manages Projects</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;
I do the same thing that Jeff Weiner does.&amp;nbsp; We are almost indistinguishable.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Well, that may be a slight exaggeration.&amp;nbsp; Weiner is the CEO of LinkedIn, he is the 3&lt;sup&gt;rd&lt;/sup&gt;
highest influencer on LinkedIn, he has over 1.5 million connections on LinkedIn,
and he is on the board of directors or advisors of at least 6 different
organizations.&amp;nbsp; Me?&amp;nbsp; I’m slightly behind those accomplishments.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
However, the one thing we both do is manage projects.&amp;nbsp; Project management is a trendy topic and can
be made to sound as complex as constructing an AI algorithm.&amp;nbsp; In his recent interview with Fortune magazine
Weiner spoke about his style as CEO of LinkedIn and I couldn’t help but notice
that some project management techniques were sprinkled and hidden in the
interview.&amp;nbsp; They are the same basic
principles that I use every day, and you can apply them as well for effective
project management.&amp;nbsp; They are:&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Define the purpose of the project.&amp;nbsp; Weiner is quoted as saying “I don’t just want
to make money.&amp;nbsp; I want to add value and
feel as though I am making a contribution to the world around me.”&amp;nbsp; Approaching each project with the general
purpose of improving the bottom line is not specific enough.&amp;nbsp; Have a &lt;i&gt;specific&lt;/i&gt;
purpose.&amp;nbsp; Define &lt;i&gt;where&lt;/i&gt; you want to add value.&amp;nbsp;
Find &lt;i&gt;specific&lt;/i&gt; ways to make a
contribution to the workplace around you.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Put your plan in writing.&amp;nbsp; In the article Weiner is reviewing a letter
that he wrote to his father 20 years earlier.&amp;nbsp;
In the letter Weiner stated specific goals and a planned path to achieve
those goals.&amp;nbsp; He goes back to the letter
often and reviews it to ensure that he is still on track.&amp;nbsp; If the CEO of LinkedIn puts goals in writing
and reviews them often shouldn’t we do the same with our teams?&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Communicate clearly to your team.&amp;nbsp; There is a great deal of history shared about
how Weiner looked at the future direction of such companies as Yahoo and created
a vision and plan of how to get to that point.&amp;nbsp;
One of his former employees called it an “ability to develop conceptual
frameworks and render them in understandable formats”.&amp;nbsp; The overall project is made up of pieces and chunks
that combine together to achieve the end result.&amp;nbsp; Become an expert at making the plan easy to
understand, simple to follow, and constantly moving towards the final goal.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Assign tasks to the right people.&amp;nbsp; Reid Hoffman may be the founder of LinkedIn
but he realized that his strength is in thinking and building.&amp;nbsp; He needed a CEO to run the company that was
well suited for operations.&amp;nbsp; In your
project management you need to find solid performers and assign them the tasks
that they are the best at.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Plan a wrap-up before the next project.&amp;nbsp; Some of the advice that Weiner gives as
influencer for LinkedIn includes proper leader feedback, how to retain top
talent, and the importance of removing people that are wrong for the job.&amp;nbsp; It is important to review the project at
conclusion, not just for the purpose of congratulating the team for how well
things went, but also to determine what could have been better, what changes
are needed, who needs more responsibility, who was a top producer, and who
needs to be replaced for increased efficiency.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
It’s basic stuff but it works like magic.&amp;nbsp; The same process works for me that works for
Jeff Weiner and it can work for you too.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/5429829816425663036/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/5429829816425663036' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/5429829816425663036'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/5429829816425663036'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/how-linkedin-ceo-manages-projects.html' title='How the LinkedIn CEO Manages Projects'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-2826743496160768525</id><published>2014-08-07T09:54:00.000-04:00</published><updated>2014-08-07T09:54:24.908-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>The Russian Internet Audit</title><content type='html'>Let&#39;s not call it an e-mail or website hack - in &lt;a href=&quot;http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html?_r=0&quot; target=&quot;_blank&quot;&gt;this NY Times article&lt;/a&gt; there is a quote stating that the Russian crime ring had &quot;audited the Internet&quot;. &lt;br /&gt;
&lt;br /&gt;
I &lt;a href=&quot;http://itprostuff.blogspot.com/2014/08/usernames-and-e-mail-addresses.html&quot; target=&quot;_blank&quot;&gt;recently wrote a post&lt;/a&gt; advocating an overhaul of e-mail addresses. &amp;nbsp;Specifically, there should be no correlation between the e-mail address and username. &amp;nbsp;In light of this breach I have to renew my suggestion. &amp;nbsp;It may also be in your best interests to do a personal password overhaul. &amp;nbsp;Chances are good that at least one of your accounts has been compromised, and if one is compromised how many of your other accounts could they access with the same credentials?</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/2826743496160768525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/2826743496160768525' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2826743496160768525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/2826743496160768525'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/the-russian-internet-audit.html' title='The Russian Internet Audit'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-8515545725074071471</id><published>2014-08-05T13:23:00.005-04:00</published><updated>2014-08-05T13:23:57.916-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="programming"/><title type='text'>The Best Programming Languages</title><content type='html'>I don&#39;t normally put much value into this sort of article. &amp;nbsp;However, when someone supports their selections with &lt;i&gt;technical knowledge&lt;/i&gt; and then illustrates with &lt;i&gt;actual code samples&lt;/i&gt; it does add a degree of credibility. &lt;br /&gt;
&lt;br /&gt;
It&#39;s well worth the read, even if you&#39;re not a programmer. &amp;nbsp;It will help you keep abreast of the most current technologies, structures, and platforms.&lt;br /&gt;
&lt;br /&gt;
&lt;h1 class=&quot;entry-title&quot; style=&quot;background: rgb(255, 255, 255); border: 0px; color: #444444; font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: 21px; line-height: 1.1; margin: 0px 0px 5px; outline: 0px; padding: 0px; text-rendering: optimizelegibility; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://news.dice.com/2014/07/29/5-programming-languages-youll-need-next-year-beyond/?CMPID=EM_SV_UP_JS_AD_LC_AD_&amp;amp;utm_source=Cheetahmail&amp;amp;utm_medium=Email&amp;amp;utm_content=&amp;amp;utm_campaign=Advisory_Lifecycle&amp;amp;om_rid=AAGso-&amp;amp;om_mid=_BQI8$-B8tYqRPk&amp;amp;dadv&amp;amp;om_rid=AAQ4T5&amp;amp;om_mid=_BT2hOkB87htKtz&amp;amp;dice&quot; target=&quot;_blank&quot;&gt;5 Programming Languages You’ll Need Next Year (and Beyond)&lt;/a&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/8515545725074071471/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/8515545725074071471' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/8515545725074071471'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/8515545725074071471'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/the-best-programming-languages.html' title='The Best Programming Languages'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4506106577801078776.post-299042112799754744</id><published>2014-08-01T12:00:00.000-04:00</published><updated>2014-08-01T12:00:52.433-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Usernames and E-mail Addresses</title><content type='html'>Is your username the same as your e-mail address, sans the @domainname extension?&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Most likely the answer is yes. &amp;nbsp;One of the basic steps in hacking and/or penetration testing is to scour the web for e-mail addresses of the domain that is being hacked/tested. &amp;nbsp;The logic is that you can obtain a list of good usernames to be used in an attack, whether it be by brute force, rainbow tables, etc.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I&#39;m not sure why more companies aren&#39;t overhauling their e-mail address name conventions but perhaps the following two articles will help to convince you of how necessary it is.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
First is this article explaining how to easily get a large list of Google e-mail addresses, even the ones that are hosted for businesses.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://www.orenh.com/2014/06/one-token-to-rule-them-all-tale-of.html&quot; target=&quot;_blank&quot;&gt;One Token to Rule Them All&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Next is an article explaining how to go from username to a full account takeover. &amp;nbsp;They also touch on how interconnected your e-mail account is with all other online accounts. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://blog.spiderlabs.com/2014/06/from-a-username-to-full-account-takeover.html&quot; target=&quot;_blank&quot;&gt;From a Username to Full Account Takeover&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Did you think that you were safe having Google host your e-mail service? &amp;nbsp;Perhaps it&#39;s time to start pushing Google to sandbox business accounts, as the first article suggested. &amp;nbsp;But it&#39;s also time to start restructuring e-mail naming conventions. &amp;nbsp;We can&#39;t make it so simple for attackers to get login credentials.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itprostuff.blogspot.com/feeds/299042112799754744/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4506106577801078776/299042112799754744' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/299042112799754744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4506106577801078776/posts/default/299042112799754744'/><link rel='alternate' type='text/html' href='http://itprostuff.blogspot.com/2014/08/usernames-and-e-mail-addresses.html' title='Usernames and E-mail Addresses'/><author><name>Ross Denton</name><uri>http://www.blogger.com/profile/10878191044894490666</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPfeXRvZ2QHqAbLtajdCYN5iQyi2OcVCjKclPZIJH-HKBjpIeR3n7TTVZ0dyvoOOn8flxRjUu6ottAMbh8oycHwS0U7gt7s1gZeHbTqte14Dt7YmQ6nVytdLQznAmijVA/s1600/*'/></author><thr:total>0</thr:total></entry></feed>