Comments
-
Know your network. Proper monitoring allows you to see and more importantly, understand what is happening on your network. During my Navy days, every system I went to school for started with how the system operates under normal conditions. After learning normal, then you could understand how to troubleshoot abnormalities.…
-
As for the firewalls, I would prefer to allow all 443 traffic outbound based on subnet. All other communications would be point to point. Deny by default, allow by what the users can justify.
-
Oh yes, the family computer guy.
-
While pursuing my Cyber Security degree, I had one professor who would bring it up in the classes he taught. Whether is was a firewall class, Intrusion Analysis, Digital Forensics, etc...he would start old school with open source products and manual procedures. After we had mastered the fundamentals, we would be introduced…
-
Same here. Automatic escalation to tier three happens all to often.
-
As far as the Facetime App being responsible for the death in an auto accident, I have to disagree. First of all, when someone is intentionally distracting themselves while driving, they have crashes, not accidents. The app itself did not cause the crash, the driver of the car caused it. We need to start hold drivers…
-
Good read. While I do agree that false advertising needs to be addressed, the consumer should shoulder some responsibility. People have learned to lock their doors, not leave their keys in their cars, and look both ways before crossing the street.
-
Any suggestions?
-
I don't think Pinky fans are that vindictive, are they?
-
Number one - In general, people are not malicious, they just want their stuff to work. They want to go home on time, too. Number two - If they understood networks as well as us, they would be chasing packets with us. They have their niche, and we have ours. Ours is to support theirs. Number three - Many of us started in…
-
Document, document, document! If you can draw the network, you don't know the network.
-
No survey?
-
Most fences are psychological in nature. The can represent boundaries or confinement. It all depends on your perspective.
-
Great reads as usual. Love reading abut the hacks specifically since they are job specific for me. The article about fake news is well worth the read as well.
-
I can understand the advantage of correlating multiple sets of logs to get a high level view, say from a global CERT viewpoint. However, for me, sending my logs to the cloud is roughly the equivalent to washing my dirty laundry in my front yard. There may be nobody watching, but I can't be sure. I'll keep my logs to myself.
-
Looks like my Hyundai
-
but press forward we will
-
This looks like the six step troubleshooting technique I was taught during my Navy days 1. Symptom recognition. This is the action of recognizing some disorder or malfunction in electronic equipment. 2. Symptom elaboration. Obtaining a more detailed description of the trouble symptom is the purpose of this step. 3. Listing…
-
Reminds me of my Navy days. An instructor I worked with was demonstrating the rotating character drum of a printer we had attached to a main frame. This was part of a safety lecture he was giving. He had forgotten to remove the neckerchief from his uniform. As he bent over, the drum caught the neckerchief. Rotating at 1800…
-
Perhaps submit for user input? Each Thwack user submits A word and you select the top 30? Submit a word based on a theme?
-
Oh yeah...
-
Excellent write up. Me thinks that book would be a worth while purchase.
-
The insider threat is very real. It always has been. Whether the problem is an untrained user, a complacent system/network admin, or an employee with malicious intent. We must be ever vigilant. However, who is watching the watchers?
-
This is going to be fun.
-
Hyperconverged is coming soon. Thanks for the read.
-
All worth the read. Thanks.
-
Yes, congrats shale2001
-
We actually have management discussing all SSD for our network storage. Hopefully pushing in that direction.
-
A Tribe. Typically with a tribal leader, head geek. We have our own language. We have a common focus. We have elders, main framers. You are loyal to your tribe, but tribes usually interact well with other tribes.
-
Bringing back old memories. 20 years as a US Navy Electronics Technician. Comms, computers and crypto.