
Firewall Evasion Techniques and Countermeasures
asdfasdfasdfasdf | | bypass, Evasion, firewall, ICMP, Next Generation Firewall, NGFW, PingTunnel, ptunnel, tunnel, Web Security Gateway
Life finds a way. This is one of my favorite quotes from one of my favorite movies and books, Jurassic Park. Internet traffic, like life, will break free and expand to new territories. There is a vast amount of examples of people changing their behaviour to get what they want ... Read More

The Zero Inbox
The Zero Inbox.People hold onto emails like they are dollars.There are oodles of e-mail applications that are all trying to help you get to this point. You've heard of this but for most people the concept of having zero email in their inbox is like finishing grocery shopping. Eventually you ... Read More

Firewall Evasion with UDP (PingTunnel)
asdfasdfasdfasdf | | bypass, Evasion, firewall, ICMP, Next Generation Firewall, NGFW, PingTunnel, ptunnel, tunnel, Web Security Gateway
This is a follow up post to using PingTunnel to bypass security controls by tunneling traffic over ping. For this example we will use the same tool but do it over UDP instead. For the background, architecture, and other specifics please see this post here.The reason you would want to tunnel ... Read More

Firewall Evasion with ICMP (PingTunnel)
asdfasdfasdfasdf | | bypass, Evasion, firewall, ICMP, Next Generation Firewall, NGFW, PingTunnel, ptunnel, tunnel, Web Security Gateway
Most networks today use a network based access control system to permit certain traffic and deny others. Since the inception of firewalls and web filters users (and malware) working behind them have strived to bypass the firewalls in order to do whatever it is they want to do.For those who ... Read More

Back to Basics – Network Design
Networking is fun. It should also be pragmatic. There are many networks in production that have been architected like a service provider network, or how networking companies want them designed. This is not to say that these networks aren't providing service, as they all are, just not to the scale ... Read More

Resetting Client Device Management
asdfasdfasdfasdf | | Bring Your Own Computer, bring your own technology, BYOC, byod, byot, Cloud, MAM, MDM, Mobile Application Management, Mobile Device Management, NAC, network access control, networking, policy, wifi
Data is like water. It ends up flowing freely through devices and cloud services like water down a river. And users are bringing in an evolving group of devices and using more services that make up the riverbed. Users are bringing their own smartphones, tablets, wearables, and laptops, and leveraging ... Read More

A Year With The BlackBerry Z10
It's been just about a year since I received a beta version of the BlackBerry Z10 smartphone. This is the first touch screen phone produced by BlackBerry. The device I received is the same hardware specifications that has been generally for sale since. Like most smartphones there are things that are great ... Read More

A Month With The Lenovo Helix
As previously discussed we have implemented a CYOD (Choose Your Own Device) program. The device I chose was the Lenovo Helix, an Ultra Book tablet hybrid.Here is an interim review of the device after a month of full time use.Windows 8I've been using Windows at work for 15 years, up until approximately 1 year ... Read More

CYOD – The Device Selection
As pointed out here we are working through a Choose Your Own Device program (CYOD) to weigh the benefits against BYOD.We were offered to choose one of a standard group of devices. The goal of the program was for the participants to use the device either as their primary or secondary device.These ... Read More
Choose Your Own Device
Providing users with flexibility in the devices they use for work is one of the most discussed topics in technology.Bring Your Own Device (BYOD) provides the greatest flexibility for users. With so many variations available to the end users, BYOD also brings significant complexity from a management perspective. Addressing all ... Read More