Jurassic Park Movie Clip, Titled: Nature Will Find A Way

Firewall Evasion Techniques and Countermeasures

Life finds a way. This is one of my favorite quotes from one of my favorite movies and books, Jurassic Park. Internet traffic, like life, will break free and expand to new territories. There is a vast amount of examples of people changing their behaviour to get what they want ... Read More
The Zero Inbox

The Zero Inbox

The Zero Inbox.People hold onto emails like they are dollars.There are oodles of e-mail applications that are all trying to help you get to this point. You've heard of this but for most people the concept of having zero email in their inbox is like finishing grocery shopping. Eventually you ... Read More
Firewall Evasion with UDP (PingTunnel)

Firewall Evasion with UDP (PingTunnel)

This is a follow up post to using PingTunnel to bypass security controls by tunneling traffic over ping. For this example we will use the same tool but do it over UDP instead. For the background, architecture, and other specifics please see this post here.The reason you would want to tunnel ... Read More
Firewall Evasion - PingTunnel

Firewall Evasion with ICMP (PingTunnel)

Most networks today use a network based access control system to permit certain traffic and deny others. Since the inception of firewalls and web filters users (and malware) working behind them have strived to bypass the firewalls in order to do whatever it is they want to do.For those who ... Read More
Back to Basics - Network Design

Back to Basics – Network Design

Networking is fun. It should also be pragmatic.  There are many networks in production that have been architected like a service provider network, or how networking companies want them designed.  This is not to say that these networks aren't providing service, as they all are, just not to the scale ... Read More
Resetting Client Device Management

Resetting Client Device Management

Data is like water.  It ends up flowing freely through devices and cloud services like water down a river.  And users are bringing in an evolving group of devices and using more services that make up the riverbed.  Users are bringing their own smartphones, tablets, wearables, and laptops, and leveraging ... Read More
A Year With The BlackBerry Z10

A Year With The BlackBerry Z10

| | blackberry, Mobile, Mobility
It's been just about a year since I received a beta version of the BlackBerry Z10 smartphone.  This is the first touch screen phone produced by BlackBerry.  The device I received is the same hardware specifications that has been generally for sale since. Like most smartphones there are things that are great ... Read More
A Month With The Lenovo Helix

A Month With The Lenovo Helix

As previously discussed we have implemented a CYOD (Choose Your Own Device) program.  The device I chose was the Lenovo Helix, an Ultra Book tablet hybrid.Here is an interim review of the device after a month of full time use.Windows 8I've been using Windows at work for 15 years, up until approximately 1 year ... Read More
CYOD - The Device Selection

CYOD – The Device Selection

As pointed out here we are working through a Choose Your Own Device program (CYOD) to weigh the benefits against BYOD.We were offered to choose one of a standard group of devices.  The goal of the program was for the participants to use the device either as their primary or secondary device.These ... Read More

Choose Your Own Device

Providing users with flexibility in the devices they use for work is one of the most discussed topics in technology.Bring Your Own Device (BYOD) provides the greatest flexibility for users.  With so many variations available to the end users, BYOD also brings significant complexity from a management perspective.  Addressing all ... Read More
Loading...