Saturday, February 14, 2009

Pod To PC Transfers Data From iPods And iPhone To PC

Tuesday, February 10, 2009

Subnet ScanPro

Subnet ScanPro is a quick, easy, and FREE solution for network professionals who need computer inventory data. No installation, no client-side software, just click and run! One simple executable does it all.

You get your inventory data quickly and easily in spreadsheet format with only the data YOU need. Small enough to fit on a floppy, flexible enough to meet the needs of a wide variety of environments. Simple WMI calls interrogate remote systems for data on everything from RAM and Hard drive usage to lists of installed software.

It has never been easier to scan a network and generate a computer inventory on all of the PC's in your network. Other PC inventory software can cost you thousands. Subnet ScanPro is 100% FREE!




Download Link

Tuesday, February 3, 2009

ISA Behind a Cisco ASA?

asking why I would have my ISA firewall behind a Cisco ASA. The answer is simple: enhanced security! I am following a long standing security best practice by implementing security in layers; defense in depth. Now, it’s not that the ISA firewall isn’t totally and completely capable of acting as an edge firewall, because it most certainly is. In this case though, I have elected to use an ASA as my edge firewall because I don’t need any real intelligence there. All I want is to do some very simple packet filtering here; basically just filtering out the bulk of the noise from the Internet and allowing my internal ISA firewall, with its advanced deep application layer inspection capabilities and granular user and group based access controls to do the important network communication inspection.

In addition to enhanced security, there are some other benefits to using the ASA (or another firewall) at the network edge. If someone were to circumvent the access controls that are in place on that edge firewall, they would not be able to use those same methods of exploitation on the ISA firewall. If I practice security in layers but deploy the same model firewall at each layer, an attacker can use the same method used to bypass my internal firewalls as they used to bypass my edge firewall.

An additional benefit by using another firewall at the network edge is that by squelching ‘Internet noise’, the logs on the ISA firewall become much more meaningful. It allows me to find important information much more quickly than having to sift through mountains of data this is mostly port scans and probes that occur constantly on the public Internet. This also frees up resources on my ISA firewall that are better put to use on inspecting important traffic.