Tech Update in English

English

Download a eForensic magazine free copy with my latest article

I would like to invite you to download the latest copy of eForensic Magazine with my latest Article free. Is a 30$ gift, hope you enjoy 🙂 I have only a limited number of downloads available so the sooner the better http://eforensicsmag.com/network-toolbox/     Related posts: Appunti sulla Costituzione Italiana, Art. 2. PostOffice has a new home PostOffice: A Facebook Hack An Embarassing mistake or an hidden message? My Latest Article on Hakin9 is on Ddos Powered by YARPP.

Look what I found

While digging some pictures for my website i found a few old certifications of mine, the old MCP one, the MCT MCSE that state since 1996, even the Cisco Ironport Certification (I used to be a trainer) and the old ASE and ACT compaq certification. Geez I feel so old. in the same dig i were trying to find pictures of my previous job activities but I’m afraid I were not able to find anything. But at least I found a few old business card, I have never been a huge fan of Business Cards so it was quite a…

Foretelling: Will Crystal Balls Run On Android?

  TECHNOLOGY   Foretelling: Will Crystal Balls Run On Android?   By Antonio Ieranò on November 3, 2013 at 10:22 AM   It is always good to take a look at the people in the metro or train to get a better sense of the impact of technology in our lives. Consumers’ rapidly evolving and new tastes become apparent, a process that should interest anyone with some interest in where we are headed. Until not very long ago, it was common to see few commuters reading newspapers or magazines while most stood up trying not sleep. Today things have changed. The expansion…

Wanted Dead or Alive: The Human Factor

TECHNOLOGY originally published on DaftBlogger.com Wanted Dead or Alive: The Human Factor By Antonio Ieranò on September 29, 2013 at 7:45 PM Contents [hide] 1 From where should we start? 2 I said it all but… 3 Theory? OK I confess I am quite bored to listen to all those knowledgeable IT security experts talking about what is needed to secure a system. Everyone has his own point of view; of course they’re right when they say we need end-point security, mobile protection, anti-malware, anti-hacking, dlp, advance threat defense and protection. We all know we need firewalls, IPSIDS, cypher encryption systems, SSO, 802.1x, strong authentication, anti-virus, anti-everything,…

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

Digging it up on Security Costs and Security Budgets – part1

In my previous article, security costs and security budget, I made some assumption to simplify an introductory analysis on how much we should spend on security. Some of those assumptions have been made to simplify out tasks. Today I would like to quickly analyse some of those simplifications. One of the biggest assumption I made on the previous article is that if a problem cost us X then we can find a number n that express the number of incidents I’m allowed to permit so that nX can express the cost I’m allowed to accept. This simplification was based on…

Security Costs and Security Budgets

When I’m talking about security with customers, partners or at an event the first question I usually receive is: “how much this will cost to me?” This is an understandable question, costs have to be monitored and expenditure have to be planned wisely, the problem of  how much I canshould spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seamed to be attracted more by strange inner believes than a empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that I’ve…

Is Big C missing the point on security?

Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security. Are they really able to focus on the innovation and development that security require? I  can talk about what I know so i will express my mixed feeling about Cisco and Security. For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world. But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas…

Kiss to you my new friend

Let’s follow a new spam saga 🙂   I juzt recieved a new spam message and now i’ll show you all bits and bytes 🙂 and of course we can continue publishing if you suggest me an answer   cheers   —–Original Message—– —–Internet Headers—– Microsoft Mail Internet Headers Version 2.0 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxs-xx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxx-xxx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from mtv-iport-4.cisco.com ([173.36.130.15]) by xbh-rcd-301.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 08:41:49 -0500 X-Files: 2062888s.jpg : 60599 Received: from…

ISE basic installation and configuration. Part 2

When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong. By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked. The Web Interface   Now we can go on and see what we can do. open a supported browser and go to: http://<IP address or host name>/admin/…

Posts navigation