Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2026 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

So here we go…

February 12, 2009 By Michael Kavka Leave a Comment

I can’t express how important it is to make sure you not only document your network, but what a pain it is when you don’t.

6 weeks of planning and having to map out Active Directory comes to a head for myself this week as I take care of the last parts of the redesign. Of course a lot fo this time could have been prevented with the proper documentation.

And I don’t mean just listing out what harware you have and how its connected. Active Directory, Network Shares, Security on the shares, all of it should be documented. Not just in case you need to change things, but to show what work has been done, so others can understand what has been done, how things are set up, and more importantly why they are done that way.

It also help out when trying to track down potential causes of issues. It doesn’t matter if its SBS or not, it should be done. Use Visio, make a network notebook, whatever floats your boat, but just do it

Filed Under: Computers Tagged With: Active Directory, Computers, documentation, network design, network documentation, networking, networks

Well Well Well, Look what they figured out…

February 5, 2009 By Michael Kavka Leave a Comment

So it seems that a company called Beyond Trust did a little research into Microsoft’s disclosed vulnerabilities, and found that 92% of them could have been avoided if people didn’t have Admin rights.  You can read the full article at Computer World.

Honestly, I would have thought it was quite obvious that this was a big problem. Even with the UAC in Vista and Windows 7, it is a problem, and Microsoft just won’t admit to it.  Someone needs to hit them with a clue by four I think.

Filed Under: Computers Tagged With: Computer World, Computers, Microsoft, Operating Systems, Security, UAC, Vista, vulnerabilities, Windows, Windows 7, XP

First Advice

February 4, 2009 By Michael Kavka Leave a Comment

So, as I was at work today, I got a call to go out on my 7th virus removal in the last 6 weeks. Yeah 1 a week at different clients does seem a bit much, but considering how skittish people are at running Windows Updates, things like this happens.

To those who want to know what I tend to use to clean machines of malware, let me tell you.

First off turn off the System Restore. Malware loves to hide there and it is nigh impossible to clean out of the restore points. Kill them, get rid of them.

Now then the software I use includes Ad-Aware, Malwarebytes, Spybot, and HiJack This. If possible keep these programs with their latests versions on your USB thumb drive. They are invaluable.

Make sure that they are as up to date as possible (yes sometimes you need to run them without checking for updates cause the malware will prevent updates from being downloaded) in safe mode.

Just remember google is your friend in these instances, and removal of the malware can take a long time. If you can just wipe and reload the machine, that of course is the preffered method, but use your own judgement.

Filed Under: Computers Tagged With: Ad-Aware, Anti-virus, Computers, HiJack This, Malware, Malwarebytes, Microsoft, Spybot, Virus, Virus Removal, Windows

  • « Previous Page
  • 1
  • …
  • 245
  • 246
  • 247
  • 248
  • Next Page »

RSS Taggart Institute Intel Feed

  • Exposed MongoDB instances still targeted in data extortion attacks February 1, 2026 Bill Toulas
  • New Apple privacy feature limits location tracking on iPhones, iPads February 1, 2026 Sergiu Gatlan
  • AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues. February 1, 2026 Jessica Lyons
  • OpenAI says you can trust ChatGPT answers, as it kicks off ads rollout preparation February 1, 2026 Mayank Parmar
  • OpenAI is retiring famous GPT-4o model, says GPT 5.2 is good enough February 1, 2026 Mayank Parmar
  • Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site February 1, 2026 Matthew Gault
  • America’s Best Chance to Transform Iran January 31, 2026 Ilan Goldenberg
  • Minnesota's effort to end the surge is rejected as journalists are arrested, but pushback continues January 31, 2026 Chris Geidner
  • RINA Accountants & Advisors is creating $400K settlement fund to settle lawsuit over 2022 data breach January 31, 2026 Dissent
  • Comcast agrees to $117.5 million settlement to resolve lawsuits over 2023 Citrix Bleed data breach January 31, 2026 Dissent

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP