Free Download: http://win7gadgets.com/pc-system/xirrus_wi-fi_monitor.html Xirrus Wi-Fi Monitor is a simple Windows gadget that looks like a radar and shows all the available Wi-Fi networks and their relative range. It is a small toll that doesn’t take up that much space and can forever be turned on in your sidebar. Click here to learn more about Xirrus’ […]
Simple Denial of Service DOS attack mitigation using HAProxy
Denial of Service (DOS) attacks can be especially effective against certain types of web application. If the application is highly dynamic or database intensive it can be remarkably simple to degrade or cripple the functionality of a site. This blog article describes some simple methods to mitigate single source IP DOS attacks using HAProxy. I’ve described how you would implement the techniques using the Loadbalancer.org appliance but they are easily transferable to any HAProxy based cluster
Securing Active Directory: A Glimpse into the Future
As an MVP in Directory Services, I feel it is my job, duty, and responsibility to share, explain, and provide feedback into past, current, and future technologies that Microsoft provides with regards to Windows and Active Directory.
Hybrid Cloud Monitoring: End-to-End Application Performance Visibility
Monitor applications in your hybrid cloud environment today with a free 30 day trial of Server & Application Monitor: http://bit.ly/HybridCloudMonitoring Are you running Applications in the…
Windows 10 Telemetry Intelligence: Defending Active Directory Against the Unknown
I’d like to bring your attention to the reality of the Microsoft world we live in.
Vulnerability Disclosure Fight – WSWiR Episode 135
Want a quick way to learn about the latest information security (infosec) news and tips? Then this is the video for you! Every week, I summarize the most important stuff, and share what you should do about it
Desktop Central Voted a “Rising Star” by MobileVillage.com Readers
What better way for Desktop Central to start the new year than with a 2014 Mobile Star Award?
Windows Desktop Naming Convention Unveiled
I was sitting in an interview in Dubai, UAE , discussing the finer points of Active Directory, provisioning users, user life cycle management, monitoring AD changes, recovering from AD changes, etc. During our conversation, we got onto the issue of Windows desktops and the history of Microsoft and the desktop. We noticed that there is a distinct pattern of good and not-so-good (OK, in some cases AWFUL) operating systems.
Microsoft’s Last Patch Day Until 2015; Three Critical Patches
It’s that time of the month again; Microsoft Patch Day. Yesterday, Microsoft posted their regular batch of security updates, so it’s time you patch your Windows systems.
Solving a Cyber Crime Case Like Sherlock Holmes
IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey , 57% of the respondents said that they conduct forensic investigations to “find and investigate incidents as they are occurring” and 75% of the respondents said they conduct forensic investigations to “find and investigate incidents after the fact”. Detecting the activity of hackers is never easy