<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-36718294</atom:id><lastBuildDate>Wed, 01 Oct 2025 15:55:36 +0000</lastBuildDate><title>Tech on Tech</title><description>Where those who know about tech come to share with those who don&#39;t</description><link>http://tech-on-tech.blogspot.com/</link><managingEditor>noreply@blogger.com (rdauman)</managingEditor><generator>Blogger</generator><openSearch:totalResults>135</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-7352822946574717045</guid><pubDate>Sat, 04 Jun 2011 22:23:00 +0000</pubDate><atom:updated>2011-06-04T18:24:21.126-04:00</atom:updated><title>25 More Tech Tips and Tricks by David Pogue</title><description>David Pogue is at it again and we would be remiss not to listen.&lt;br /&gt;&lt;br /&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://pogue.blogs.nytimes.com/2011/05/19/25-more-tech-tips-and-tricks/?ref=davidpogue&quot;&gt;Enjoy!&lt;/a&gt;</description><link>http://tech-on-tech.blogspot.com/2011/06/25-more-tech-tips-and-tricks-by-david_04.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-7614813982032444143</guid><pubDate>Sat, 13 Mar 2010 20:14:00 +0000</pubDate><atom:updated>2010-03-13T15:14:47.717-05:00</atom:updated><title>Easy Steps to Improve Your PC&#39;s Performance</title><description>&lt;div&gt;This article is from AOL and does recommend some AOL products; however, the majority of the content is informative  - and easily overlooked!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://daol.aol.com/articles/pc-performance?ncid=webmaildl5&quot;&gt;Easy Steps to Improve Your PC&#39;s Performance&lt;/a&gt;</description><link>http://tech-on-tech.blogspot.com/2010/03/easy-steps-to-improve-your-pcs.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8991106182839017024</guid><pubDate>Sun, 18 Oct 2009 23:00:00 +0000</pubDate><atom:updated>2009-10-18T19:00:31.482-04:00</atom:updated><title>OWASP Top 10 - #1 - Cross Site Scripting (XSS)</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;In another &lt;a href=&#39;http://tech-on-tech.blogspot.com/2009/09/locking-down-your-switchcont.html&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;post&lt;/a&gt;, I said I would talk about the OWASP Top 10, which is a list of the 10 most dangerous current Web application security flaws. This list, interestingly, is built into both the &lt;a href=&#39;https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;PCI DSS&lt;/a&gt; standard as well as &lt;a href=&#39;http://sharedassessments.org/&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;Shared Assessments&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;#1 on the OWASP Top 10 is &lt;b&gt;Cross Site Scripting (XSS)&lt;/b&gt;, which, per OWASP is:&lt;br/&gt;&lt;br/&gt;&lt;i&gt;whenever an application takes user supplied data and sends it to a web&lt;br/&gt;browser without first validating or encoding that content. XSS allows&lt;br/&gt;attackers to execute script in the victim&#39;s browser which can hijack&lt;br/&gt;user sessions, deface web sites, possibly introduce worms, etc.&lt;br/&gt;&lt;/i&gt;&lt;br/&gt;&lt;br/&gt;For more information on XSS, check out this nice &lt;a href=&#39;http://bit.ly/45uio1&#39; target=&#39;_blank&#39; rel=&#39;http://bit.ly/plugins/iframe?hashUrl=http%3A%2F%2Fbit.ly%2F45uio1&#39;&gt;FAQ&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;In the next post we will cover #2 on the Top 10.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;DID YOU KNOW?&lt;/b&gt; Shared Assessments&#39; Application Vulnerability Assessment actually contains &lt;i&gt;11&lt;/i&gt; attributes. Can you name #11?&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/10/owasp-top-10-1-cross-site-scripting-xss_8630.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-959305957974449468</guid><pubDate>Sat, 17 Oct 2009 23:17:00 +0000</pubDate><atom:updated>2009-10-17T19:17:23.865-04:00</atom:updated><title>Cisco Tip: ip default-gateway</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;The &lt;b&gt;ip default-gateway&lt;/b&gt; command is used when you need to configure a default router and IP routing is either disabled or not available (on the 2960, for example).&lt;br/&gt;&lt;br/&gt;Aside from looking through the configuration (&lt;i&gt;show run | inc default-gateway&lt;/i&gt;), how can you check to see that your default router has indeed been configured?&lt;br/&gt;&lt;br/&gt;Use the &lt;b&gt;show ip redirects&lt;/b&gt; command to see your just configured default router. Give it a try!&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/10/cisco-tip-ip-default-gateway_17.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-735447729149281958</guid><pubDate>Sat, 17 Oct 2009 19:27:00 +0000</pubDate><atom:updated>2009-10-17T15:27:10.875-04:00</atom:updated><title>What is the best method for baselining your control environment?</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;CobiT combined with ITIL and ISO27001/2? CobiT in combination with another &lt;a href=&#39;http://bit.ly/1ZsoxF&#39; target=&#39;_blank&#39; rel=&#39;http://bit.ly/plugins/iframe?hashUrl=http%3A%2F%2Fbit.ly%2F1ZsoxF&#39;&gt;standard&lt;/a&gt;?&lt;br/&gt;&lt;br/&gt;What are your thoughts?&lt;br/&gt;&lt;br/&gt;&lt;font size=&#39;5&#39;&gt;&lt;font face=&#39;Arial&#39;&gt;&lt;span style=&#39;font-size: 18px;&#39;/&gt;&lt;/font&gt;&lt;/font&gt;&lt;font size=&#39;5&#39;&gt;&lt;font face=&#39;Arial&#39;&gt;&lt;span style=&#39;font-size: 18px;&#39;/&gt;&lt;/font&gt;&lt;/font&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/10/what-is-best-method-for-baselining-your_17.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-2373876993493690865</guid><pubDate>Sat, 17 Oct 2009 13:38:00 +0000</pubDate><atom:updated>2009-10-17T09:38:24.758-04:00</atom:updated><title>Using 1Password &amp;amp; RoboForm can keep you safe.....cont&amp;#39;d</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;If you need further convincing about the importance of good password management, check out this recent &lt;a href=&#39;http://bit.ly/3mmHWd&#39; target=&#39;_blank&#39; rel=&#39;http://bit.ly/plugins/iframe?hashUrl=http%3A%2F%2Fbit.ly%2F3mmHWd&#39;&gt;article&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;After reading this article and the Newsweek &lt;a href=&#39;http://bit.ly/OSQdT&#39; target=&#39;_blank&#39;&gt;article&lt;/a&gt; mentioned &lt;a href=&#39;http://bit.ly/2QeIjs&#39; target=&#39;_blank&#39; rel=&#39;http://bit.ly/plugins/iframe?hashUrl=http%3A%2F%2Fbit.ly%2F2QeIjs&#39;&gt;here&lt;/a&gt;, it is no small wonder that &lt;a href=&#39;http://bit.ly/1fCenu&#39; target=&#39;_blank&#39; rel=&#39;http://bit.ly/plugins/iframe?hashUrl=http%3A%2F%2Fbit.ly%2F1fCenu&#39;&gt;1Password&lt;/a&gt; is the solution to this over 30-year-old problem.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/10/using-1password-roboform-can-keep-you_17.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-2863008921687104043</guid><pubDate>Fri, 16 Oct 2009 13:13:00 +0000</pubDate><atom:updated>2009-10-16T09:13:26.737-04:00</atom:updated><title>Securing your password.....and your wallet! (Using 1Password &amp;amp; RoboForm can keep you safe)</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;What do you think of when you think of security? Still thinking, right? Exactly. No surprise, then, that functionality and utility have taken the front seat when it comes to application development. Today, however, with the rampant spread of cross site scripting and sql injection attacks, not to mention the already inescapable viruses and malware that live and breathe on anything running Windows, things are starting to change.&lt;br/&gt;&lt;br/&gt;One of the most important facets of security is your password - the key to the castle. Newsweek just came out with a great article on building a better password. But, for my money - and that&#39;s what we are really trying to protect a lot of the time when we are online - there is no better solution than &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;1Password&lt;/a&gt;. For those of you still in the unfortunate position of having to use a PC (and that is how I look at it), you can turn to a good solution like RoboForm. But, for those in the know, we use a &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;RoboForm for the Mac&lt;/a&gt;, if you will. &lt;br/&gt;&lt;br/&gt;I have &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;written&lt;/a&gt; about &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;1Password&lt;/a&gt; before, so will let you &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;read&lt;/a&gt; my other posts to find out about it. My point in this post is that if you want to be secure online you need to have good (at a minimum) password management. By this, I am talking about a password that is not easily going to be hacked by a brute-force attack - something not easily guessed. With &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;1Password&lt;/a&gt;, you get all of this. And, further, &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;1Password&lt;/a&gt; automatically fills all of your forms for you.&lt;br/&gt;&lt;br/&gt;I will be writing more about security soon, but you can find out more about how to secure your Mac now with &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;1Password&lt;/a&gt; &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39; target=&#39;_blank&#39; bitly=&#39;BITLY_PROCESSED&#39;&gt;here&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/10/securing-your-passwordand-your-wallet_16.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-1841390518966861769</guid><pubDate>Fri, 18 Sep 2009 04:36:00 +0000</pubDate><atom:updated>2009-09-18T00:36:29.146-04:00</atom:updated><title>Locking Down Your Switch.....Cont&amp;#39;d</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I have been talking &lt;a href=&#39;http://tech-on-tech.blogspot.com/2009/09/lock-down-your-switch-or-else.html&#39; target=&#39;_blank&#39;&gt;here&lt;/a&gt; and &lt;a href=&#39;http://tech-on-tech.blogspot.com/2009/09/more-on-locking-down-your-switch_13.html&#39; target=&#39;_blank&#39;&gt;here&lt;/a&gt; of the importance of locking down your switch (indeed your network in general) and why this is so important. It seems to me that the most basic controls are often the most overlooked. It is not surprising that most best practices call for basic network physical security and, on the same note, it is not surprising that basic security is often overlooked.&lt;br/&gt;&lt;br/&gt;Looking through PCI DSS, for example, you will see a requirement both for WAFs (Web Application Firewalls), which operate at Layer 7, and for restricting physcial access at OSI Layer 1. Indeed, it doesn&#39;t make sense to put 3 deadbolts on the front door if the back door or a window is still open.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#39;http://sharedassessments.org/&#39; target=&#39;_blank&#39;&gt;Shared Assessments&lt;/a&gt; is a member-driven industry standard used to &quot;inject standardization, consistency, speed, efficiency and cost savings into the service provider assessment process.&quot; This standard also requires that physical ports be locked down (disabled) as referenced in:&lt;br/&gt;&lt;br/&gt;&lt;b&gt;I.3 Secure System Hardening Standards&lt;/b&gt;: &lt;i&gt;Unnecessary physical access ports disabled or removed.&lt;/i&gt;&lt;br/&gt;&lt;br/&gt;On another note (and I will discuss in another post), it is interesting to note that both PCI DSS and Shared Assessments include &lt;a href=&#39;http://www.owasp.org/index.php/Top_10_2007&#39; target=&#39;_blank&#39;&gt;OWASP Top 10&lt;/a&gt; as requirements.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/locking-down-your-switchcont.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8675168942687524849</guid><pubDate>Sun, 13 Sep 2009 22:20:00 +0000</pubDate><atom:updated>2009-09-13T18:20:13.073-04:00</atom:updated><title>Cybersecurity Act of 2009</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;The Cybersecurity Act of 2009 is something to keep your eye on.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#39;http://bytestyle.tv/content/cybersecurity-act-2009-president-can-take-over-internet-access-private-data&#39; target=&#39;_blank&#39;&gt;Here&lt;/a&gt;&lt;a href=&#39;http://bytestyle.tv/content/cybersecurity-act-2009-president-can-take-over-internet-access-private-data&#39; target=&#39;_blank&#39;&gt;&#39;s&lt;/a&gt; what you need to know.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/cybersecurity-act-of-2009.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8347613181172653255</guid><pubDate>Sun, 13 Sep 2009 19:58:00 +0000</pubDate><atom:updated>2009-09-13T15:58:56.962-04:00</atom:updated><title>MasterCard&amp;#39;s Security Changes and its impact on PCI Compliance</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Over the past few months, MasterCard has made some major security changes that, seemingly, will impact PCI compliance now and in the future for quite a number of businesses.&lt;br/&gt;&lt;br/&gt;First, MasterCard advised all Level 2 merchants (those processing between 1 - 6 million payments cards annually) that Self-Assessment questionnaires would no longer be sufficient for compliance; thus, Level 2 merchants would now be required to have a third-party perform an on-site assessment. This new change &quot;&lt;a href=&#39;http://www.internetretailer.com/article.asp?id=31666&#39; target=&#39;_blank&#39;&gt;can cost $10,000 - $30,000 per year for a merchant already PCI-compliant and more for a retailer meeting the standard for the first time.&lt;/a&gt;&quot;&lt;br/&gt;&lt;br/&gt;Not too surprisingly, merchants are looking for alternative payment methods (i.e. PayPal) in order to reduce the number of card transactions.&lt;br/&gt;&lt;br/&gt;MasterCard, with their &lt;a href=&#39;http://www.computerworld.com/s/article/9135316/MasterCard_halts_remote_POS_security_upgrades?sourc%20e=rss_security&#39; target=&#39;_blank&#39;&gt;second big security change&lt;/a&gt;, has decided to disallow merchants&#39; use of RKI (remote key injection) services to install new encryption keys on POS systems. This new rule by MasterCard jeopardizes the on-going Triple DES compliance efforts for all POS terminals: merchants have until July 2010 to upgrade their POS terminals from DES to Triple DES. If this upgrade now has to be done manually, as opposed to automatically with RKI, it could make meeting the July 2010 deadline quite difficult for businesses with a large number of POS terminals.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/mastercard-security-changes-and-its.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-5235046086424451683</guid><pubDate>Sun, 13 Sep 2009 19:10:00 +0000</pubDate><atom:updated>2009-09-13T15:10:40.432-04:00</atom:updated><title>More on Locking Down Your Switch.....</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;In my last &lt;a href=&#39;http://tech-on-tech.blogspot.com/2009/09/lock-down-your-switch-or-else.html&#39; target=&#39;_blank&#39;&gt;post&lt;/a&gt; I talked about the importance of locking down (disabling) physical access on your network switches to only those with authorized access. I discussed how, along with being a best practice, it is also a requirement of such standards as &lt;a href=&#39;https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml&#39; target=&#39;_blank&#39;&gt;PCI DSS&lt;/a&gt; and &lt;a href=&#39;http://www.isaca.org/Template.cfm?Section=Standards&amp;amp;Template=/TaggedPage/TaggedPageDisplay.cfm&amp;amp;TPLID=29&amp;amp;ContentID=42792&#39; target=&#39;_blank&#39;&gt;ISACA&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Let&#39;s add another standard to that list today and that&#39;s &lt;a href=&#39;http://www.nerc.com/page.php?cid=2%7C20&#39; target=&#39;_blank&#39;&gt;NERC&lt;/a&gt;. Indeed, NERC CIP 007-1: R2 states that &quot;&lt;i&gt;The Responsible Entity shall establish and document a process to ensure that only those ports and services required for normal and emergency operations are enabled.&quot;&lt;/i&gt;&lt;br/&gt;&lt;br/&gt;More to come.....&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/more-on-locking-down-your-switch_13.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-7994903384855927544</guid><pubDate>Sat, 12 Sep 2009 18:33:00 +0000</pubDate><atom:updated>2009-09-12T14:33:48.122-04:00</atom:updated><title>Lock Down Your Switch, or Else!</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Locking down your switch is one of the most important steps to do (for the network engineer) or verify (for the IT auditor). Indeed, restricting physical access to your network to only those authorized is paramount. Further, it is a requirement of PCI DSS (9.1.2. &lt;i&gt;Restrict physical access to&lt;/i&gt; &lt;i&gt;publicly accessible network jacks&lt;/i&gt;) and ISACA (P8 &lt;i&gt;Security Assessment—Penetration Testing and Vulnerability Analysis&lt;/i&gt; - 6.1 &lt;i&gt;Rogue Access Jacks&lt;/i&gt;)&lt;br/&gt;&lt;br/&gt;Looking at this from both an operational and assurance mindset, it is equally important to ensure physical access control. But, as I am sure you are aware, importance is relative. How often is PCI DSS 9.1.2 given a checkmark for compliance on either your Self-Assessment Questionnaire or on-site assessment?&lt;br/&gt;&lt;br/&gt;From an audit, and even an engineering perspective, it is really a best practice to lock down your switches and disable any ports not in use, especially those going to areas where people may have easy, unattended access to the network. &lt;br/&gt;&lt;br/&gt;Of course, for those in site support who may have to set up new user connections, it is quite cumbersome if the ports they need to plug their patch cables into are disabled. Indeed, instead of patching their cable and being on their merry way they now need to create that dreaded &lt;i&gt;change request&lt;/i&gt;!&lt;br/&gt;&lt;br/&gt;When you are on the operational side - and are feeling the pain - it is hard to see the merit of going through these processes. But, when you realize that there is a &lt;i&gt;reason &lt;/i&gt;why the change request asks for &lt;b&gt;business&lt;/b&gt; impact and, in many cases, will need &lt;b&gt;business&lt;/b&gt; approval you start to see a pattern. The work we do is not in a vacuum - it supports the business. To that end, we need to be cognizant of what we are doing and what the risks are to the business.&lt;br/&gt;&lt;br/&gt;So, the next time you need to patch in a new user and the port is disabled. Don&#39;t get mad (and, please, don&#39;t get even!) - just be glad that someone out there is doing what he/she can to keep your business secure. Now it is your turn.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/lock-down-your-switch-or-else.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-7229143698990975612</guid><pubDate>Sat, 12 Sep 2009 03:41:00 +0000</pubDate><atom:updated>2009-09-11T23:41:29.850-04:00</atom:updated><title>SAS 70 vs. ISAE 3402</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;This &lt;a href=&#39;http://tinyurl.com/lrexpx&#39; target=&#39;_blank&#39;&gt;article&lt;/a&gt; from PWC touches on some of the key differences. One of note is that service organization management are now required to provide a formal assertion acknowledging responsibility for their controls.&lt;br/&gt;&lt;br/&gt;More to come.....&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/sas-70-vs-isae-3402.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8860545929875872634</guid><pubDate>Sat, 12 Sep 2009 03:35:00 +0000</pubDate><atom:updated>2009-09-11T23:35:33.839-04:00</atom:updated><title>More thoughts on PCI DSS</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Network Solutions, whose recent security breach exposed almost 600,000 cardholders, said &quot;&lt;a href=&#39;http://news.cnet.com/8301-27080_3-10296817-245.html&#39; target=&#39;_blank&#39;&gt;We store credit card data in an encrypted manner, and we are PCI (Payment Card Industry)-compliant&lt;/a&gt;.&quot; Here again is another example of the mindset to which I referred in my last &lt;a href=&#39;http://tech-on-tech.blogspot.com/2009/09/thoughts-on-pci-dss_2811.html&#39; target=&#39;_blank&#39;&gt;post&lt;/a&gt;: PCI compliance does not equal security. &lt;br/&gt;&lt;br/&gt;If PCI compliance doesn&#39;t equal security, does it equal culpability? Indeed, Heartland&#39;s CEO blamed the PCI QSA for the breach. Interestingly, Nevada in June passed a law that mandated PCI compliance for businesses that accept payment cards &lt;a href=&#39;http://www.huntonprivacyblog.com/2009/06/articles/information-security/nevada-updates-encryption-law-and-mandates-pci-dss-compliance/&#39; target=&#39;_blank&#39;&gt;and provides that compliance will shield such businesses from liability for damages from a security breach&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;As the breaches continue, let&#39;s recall Visa&#39;s &lt;a href=&#39;http://www.reuters.com/article/pressRelease/idUS130907+19-Mar-2009+PRN20090319&#39; target=&#39;_blank&#39;&gt;statement&lt;/a&gt; after Heartland:&lt;br/&gt;&lt;br/&gt;&lt;div align=&#39;left&#39;&gt;&lt;i&gt;PCI DSS remains an effective security tool when implemented properly - and remains the best defense against the loss of sensitive data. &lt;b&gt;No compromised entity to date has been found to be in compliance with PCI DSS at the time of the breach.&lt;/b&gt;&lt;/i&gt; [emphasis added]&lt;br/&gt;&lt;br/&gt;Good to know.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/more-thoughts-on-pci-dss_11.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-5218518943125137187</guid><pubDate>Fri, 11 Sep 2009 04:36:00 +0000</pubDate><atom:updated>2009-09-11T00:37:43.935-04:00</atom:updated><title>Thoughts on PCI DSS</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;Of the &lt;a href=&quot;http://tinyurl.com/nybh8n&quot; target=&quot;_blank&quot;&gt;Ten Common Myths of PCI DSS&lt;/a&gt;, Myth 4 is surely the one most in need of debunking. Indeed, PCI compliance in and of itself will not make you secure. If an organization is to ensure compliance AND security, there must be a &quot;&lt;a href=&quot;http://tinyurl.com/nybh8n&quot; target=&quot;_blank&quot;&gt;continuous process of audit and remediation&lt;/a&gt;.&quot;&lt;br /&gt;&lt;br /&gt;As one who has worked in change control, I can appreciate the fact that quite a number of PCI requirements pertain to this area.&lt;br /&gt;&lt;br /&gt;Perhaps the most important command you can use on a router is &quot;wri mem&quot; - to save any changes you have made. It is nice to see the importance of this concept (saving your work) memorialized in &lt;a href=&quot;https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml&quot; target=&quot;_blank&quot;&gt;PCI DSS&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;PCI DSS Requirements &lt;/b&gt;&lt;br /&gt;&lt;i&gt;1.2.2 Secure and synchronize router configuration files. &lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Testing Procedures &lt;/b&gt;&lt;br /&gt;&lt;i&gt;Verify that router configuration files are secure and synchronized—for example, running configuration files (used for normal running of the routers) and start-up configuration files (used when machines are re-booted), have the same, secure configurations.  &lt;/i&gt;                         &lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/09/thoughts-on-pci-dss_2811.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-521341960337934213</guid><pubDate>Sat, 08 Aug 2009 19:52:00 +0000</pubDate><atom:updated>2009-08-08T15:59:10.610-04:00</atom:updated><title>How to Audit your Network - FOR FREE!</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;Quality expert Philip Crosby talked of the price of nonconformance and its related expenses. Too, he talked of the price of conformance and the savings that would result from such conformance. But how do you achieve these savings and to what are you conforming?&lt;br /&gt;&lt;br /&gt;Well, when it comes to your data network, you need to make sure it is secure and configured per corporate and any other applicable standards (e.g. HIPAA, SOX, PCI, etc.).&lt;br /&gt;&lt;br /&gt;How do I know if my network is secure? How do I know if it is standards compliant? Good questions!&lt;br /&gt;&lt;br /&gt;Before you can begin to correct and, subsequently, prevent problems in your network you need to &lt;i&gt;detect &lt;/i&gt;them. One such detection tool is &lt;a href=&quot;http://nipper.titania.co.uk/index.php&quot; target=&quot;_blank&quot;&gt;Nipper&lt;/a&gt;. Nipper is an open source tool that allows you to perform security audits of your network from the command line. Nipper works on multiple platforms (Windows, Mac) as well as reads configuration files from a variety of different vendors (Cisco, Juniper, Nokia, etc.)&lt;br /&gt;&lt;br /&gt;Nipper&#39;s HTML reports are excellent (note: you can customize Nipper and have it output to other formats such as CSV if you prefer) and they make spotting problems in your network easy and understandable.&lt;br /&gt;&lt;br /&gt;Anyone looking to audit their own network (or someone else&#39;s) can&#39;t go wrong with &lt;a href=&quot;http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1332336,00.html&quot; target=&quot;_blank&quot;&gt;Nipper&lt;/a&gt;.&lt;br /&gt;&lt;div class=&quot;zemanta-pixie&quot;&gt;&lt;img src=&quot;http://img.zemanta.com/pixy.gif?x-id=bc4d9195-b189-8fb1-8b2a-a1d340476d52&quot; alt=&quot;&quot; class=&quot;zemanta-pixie-img&quot; /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/08/how-to-audit-your-network-for-free_4952.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-713406092739497039</guid><pubDate>Mon, 26 Jan 2009 20:25:00 +0000</pubDate><atom:updated>2009-01-26T15:25:03.235-05:00</atom:updated><title>Through the Looking Glass: How to Brush Up on BGP</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;As someone who himself is looking for employment, I can&#39;t stress the importance of keeping your skill set sharp. Of course, unless you are working for a Tier-1 service provider, it may not be possible to keep skills such as BGP as sharp as they need to be for today&#39;s job market. &lt;br/&gt;&lt;br/&gt;Fortunately, as is usually the case, there is a solution in &lt;a href=&#39;http://www.traceroute.org/#Looking%20Glass&#39;&gt;looking-glass &lt;/a&gt;and &lt;a href=&#39;http://www.traceroute.org/#Route%20Servers&#39;&gt;route servers&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Just do a search for &quot;looking-glass server&quot; and you will come across sites such as &lt;a href=&#39;http://www.traceroute.org/&#39;&gt;traceroute.org&lt;/a&gt;, which will provide you with a list of servers to which you can connect.&lt;br/&gt;&lt;br/&gt;For example, choosing the route server &lt;b&gt;CerfNet Route Server (AS1838)&lt;/b&gt; will open a Terminal session on a Mac (on a PC, however, it will open whatever telnet program you are using). Once you click on the link to open the route server, Terminal (or your telnet program) will open with the following prompt:&lt;br/&gt;&lt;br/&gt;route-server&amp;gt;&lt;br/&gt;&lt;br/&gt;From this prompt, you can now begin to look at the BGP configuration of this device:&lt;br/&gt;&lt;br/&gt;route-server&amp;gt;sho ip bgp summ&lt;br/&gt;BGP router identifier 12.129.193.235, local AS number 1838&lt;br/&gt;BGP table version is 1, main routing table version 1&lt;br/&gt;&lt;br/&gt;Neighbor        V    AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd&lt;br/&gt;12.129.192.1    4 17233       0       0        0    0    0 never    Active&lt;br/&gt;12.129.192.2    4 17233       0       0        0    0    0 never    Active&lt;br/&gt;134.24.13.2     4 64512 1287988 1287776        1    0    0 11w1d           0&lt;br/&gt;134.24.13.3     4 64512 1287990 1287784        1    0    0 16w4d           0&lt;br/&gt;route-server&amp;gt;&lt;br/&gt;&lt;br/&gt;You can try different commands, either from the route servers or the looking glass servers and KEEP YOUR BGP SKILLS SHARP!&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/01/through-looking-glass-how-to-brush-up_26.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-4731358693623007389</guid><pubDate>Sun, 11 Jan 2009 05:40:00 +0000</pubDate><atom:updated>2009-01-11T00:40:04.296-05:00</atom:updated><title>How to Backup and Restore your Mac</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;For many people, having a hard disk failure on their Mac is tantamount to Armageddon; indeed, should such a tragedy occur without the protection of backup it would truly be the End of Days! &lt;br/&gt;&lt;br/&gt;I have spoken in the &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007_03_01_archive.html&#39; target=&#39;_blank&#39;&gt;past&lt;/a&gt; about routine backups and you should, at minimum, back up your data monthly regardless of whether your own a Mac or PC.&lt;br/&gt;&lt;br/&gt;If you are looking for a good backup solution for your Mac, I strongly recommend the &lt;a href=&#39;http://www.lacie.com/us/products/range.htm?id=10036&#39; target=&#39;_blank&#39;&gt;LaCie Rugged&lt;/a&gt; drives. The LaCie drives are small, portable, external drives, which, as their name implies, can withstand some wear and tear and moving around. The LaCie drives are Time Machine compatible and support multiple interfaces (USB 2.0, FireWire) as well as speeds up to 500GB.&lt;br/&gt;&lt;br/&gt;While I would recommend using Time Machine for your backups, I will make mention that the software that comes with the LaCie drives, SilverKeeper, works pretty well. Of course, for those looking for alternatives to Time Machine and who may want a more robust backup solution than SilverKeeper, you can&#39;t go wrong with &lt;a href=&#39;http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html&#39; target=&#39;_blank&#39;&gt;SuperDuper!&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;I know Time Capsule is a popular option for many; however, it would not easily fit into my current environment so I have not had the opportunity to test it out and provide any feedback. Of course, I would like to do so at some point. (Apple, are you listening?)&lt;br/&gt;&lt;br/&gt;My best recommendation to you is to do your monthly (at least) backups with an external drive (such as the LaCie) using Time Machine (again, since I have not used Time Capsule I can&#39;t comment one way or the other about it). But, before you even do your first backup, the FIRST thing you need to do is make your external drive &lt;a href=&#39;http://thegraphicmac.com/create-bootable-time-machine-backup-drive&#39; target=&#39;_blank&#39;&gt;BOOTABLE&lt;/a&gt; by installing the Mac OS X installation DVD onto the drive. &lt;br/&gt;&lt;br/&gt;When you are setting up the drive in Disk Utility, you need to make sure that you format the drive as &quot;Mac OS Extended (Journaled)&quot; Make sure you choose the option with &quot;Journaled.&quot; Also, you need to make sure you go into &quot;Options&quot; and choose GUID Partition scheme.&lt;br/&gt;&lt;br/&gt;Once the drive is formatted and partitioned, you can verify the drive is bootable by restarting your Mac and then holding down the Option key as it boots. What this will do is present you with two (2) boot options, one being your current hard disk and the other being your external disk. Choose the external disk for your test. &lt;br/&gt;&lt;br/&gt;You should now be prompted to choose a language, as this is the Mac OS X installation DVD. From here, you can now restore from a previous backup, such as a Time Machine backup stored on your external drive.&lt;br/&gt;&lt;br/&gt;Depending on how often you do your backups, the amount of data you lose will be minimized proportionally. Of course, you may be that lucky person who does monthly backups and has their Mac crash the day after having done a backup, thus losing not even a day&#39;s worth of data. Or, you could be the one who does weekly backups and has their Mac crash the day before their next backup, thus losing 6 days of data! From what I have read about Time Capsule it does appear to be the &quot;perfect&quot; solution - after one really long, monstrous backup, your Mac is incrementally backed up every time it is on, wirelessly, seamlessly - without thinking about it! In practice, however, Time Capsule is not just a backup device it is a full-fledged wireless router and needs to be the PRIMARY wireless device in your environment for backups to work effectively. Further, while it does have 10/100/1000 ports to connect your LAN devices, it only has 3. You need to have 4 ports. If I get the chance to try Time Capsule I will write more.&lt;br/&gt;&lt;br/&gt;Good luck with your backups!&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2009/01/how-to-backup-and-restore-your-mac.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8140961529524828554</guid><pubDate>Fri, 05 Dec 2008 14:40:00 +0000</pubDate><atom:updated>2008-12-05T09:41:00.277-05:00</atom:updated><title>Apple pulls antivirus advice from its Web site</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;After much brouhaha, Apple has &lt;a href=&#39;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9122359&amp;amp;intsrc=hm_list&#39;&gt;pulled&lt;/a&gt; the 2007 81-word document which advised:&lt;br/&gt;&lt;br/&gt;&quot;Apple encourages the widespread use of multiple antivirus utilities so that virus programmers have more than one application to circumvent, thus making the whole virus-writing process more difficult,&quot;&lt;br/&gt;&lt;br/&gt;Apple, in the same document, recommended antivirus programs from McAfee, Symantec and Intego.&lt;br/&gt;&lt;br/&gt;According to an Apple spokesman, &quot;The Mac is designed with built-in technologies that provide protection against malicious software and security threats right out of the box,&quot;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/12/apple-pulls-antivirus-advice-from-its.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8124430029388311256</guid><pubDate>Wed, 03 Dec 2008 15:38:00 +0000</pubDate><atom:updated>2008-12-03T10:38:10.895-05:00</atom:updated><title>What is the best Smartphone?</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;What is the best smartphone? I am probably one of the only people, if not the only one, in NYC who doesn&#39;t own a smartphone. Still, when conformity finally sinks in I want to ensure I make the best decision. To wit, what is the best smartphone?&lt;br/&gt;&lt;br/&gt;Is it any of these major players?&lt;br/&gt;&lt;br/&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#39;http://tech-on-tech.blogspot.com/2008/02/roboform-for-iphone-and-itouch.html&#39;&gt;iPhone&lt;/a&gt; (do I even need to say 3G?)&lt;/li&gt;&lt;li&gt;BlackBerry Storm (or, perhaps, the Pearl, Curve or Bold?)&lt;/li&gt;&lt;li&gt;Treo (yes, they are still around!)&lt;/li&gt;&lt;li&gt;HTC G1 (AKA, the Google phone)&lt;/li&gt;&lt;li&gt;Nokia E71&lt;/li&gt;&lt;li&gt;AT&amp;amp;T Tilt&lt;/li&gt;&lt;li&gt;Samsung Omnia&lt;/li&gt;&lt;/ul&gt;What is the best smartphone?&lt;br/&gt;Did I miss any?&lt;br/&gt;Should I even bother with a smartphone?&lt;br/&gt;&lt;br/&gt;What do you think?&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/12/what-is-best-smartphone_03.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-2107122491721897149</guid><pubDate>Tue, 25 Nov 2008 20:32:00 +0000</pubDate><atom:updated>2008-11-25T15:32:20.792-05:00</atom:updated><title>RoboForm for Mac and iPhone</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Along with the quite popular 3G iPhones, Apple&#39;s newly designed Macbooks are making quick exits off store shelves. As many of these purchases will be by &quot;first-timers,&quot; it is a good time to &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39;&gt;re-visit&lt;/a&gt; &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt; is a &quot;&lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39;&gt;RoboForm&lt;/a&gt; for the Mac and the iPhone.&quot; Indeed, it is a password-manager (and lots more!), which can be used on both the Mac and the &lt;a href=&#39;http://tech-on-tech.blogspot.com/2008/02/roboform-for-iphone-and-itouch.html&#39;&gt;iPhone&lt;/a&gt; (and iTouch, even). If you are familiar with &lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39;&gt;RoboForm&lt;/a&gt; on the PC, you will know that it is a program you really can&#39;t live without once you have started to use it. Similarly, once you have used &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt; for the Mac or the &lt;a href=&#39;http://tech-on-tech.blogspot.com/2008/02/roboform-for-iphone-and-itouch.html&#39;&gt;iPhone&lt;/a&gt; you will see that &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt; is really more than just a &quot;&lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39;&gt;RoboForm&lt;/a&gt; for the Mac&quot; or a &quot;&lt;a href=&#39;http://tech-on-tech.blogspot.com/2007/02/roboform-for-mac_12.html&#39;&gt;RoboForm&lt;/a&gt; for the &lt;a href=&#39;http://tech-on-tech.blogspot.com/2008/02/roboform-for-iphone-and-itouch.html&#39;&gt;iPhone&lt;/a&gt;.&quot; Instead, it is truly a unique program that has no peer either in Mac OS or Windows.&lt;br/&gt;&lt;br/&gt;You can download &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt; for &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;FREE&lt;/a&gt; to see if this is something you might like - what have you got to lose?&lt;br/&gt;&lt;br/&gt;Still not sure? Check out the short 3-minute &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;movie&lt;/a&gt; to see &lt;a href=&#39;http://www.shareasale.com/r.cfm?b=142977&amp;amp;u=306778&amp;amp;m=19222&amp;amp;urllink=&amp;amp;afftrack=&#39;&gt;1Password&lt;/a&gt; in action!&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/11/roboform-for-mac-and-iphone_9433.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-3564834138767557135</guid><pubDate>Sun, 04 May 2008 05:20:00 +0000</pubDate><atom:updated>2008-05-04T01:20:26.440-04:00</atom:updated><title>Microsoft drops bid for Yahoo</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Microsoft &lt;a href=&#39;http://www.usatoday.com/tech/techinvestor/2008-05-03-microsoftyahoo_N.htm&#39;&gt;dropped its bid&lt;/a&gt; for Yahoo just after increasing its offer to $33 per share. &lt;br/&gt;&lt;br/&gt;Don&#39;t count out Microsoft. Indeed, third time may be the charm for Microsoft if Yahoo&#39;s stock tanks.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/05/microsoft-drops-bid-for-yahoo.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-25804865501064921</guid><pubDate>Sat, 12 Apr 2008 13:40:00 +0000</pubDate><atom:updated>2008-04-12T09:40:16.860-04:00</atom:updated><title>Top 5 Gadgets You Shouldn&amp;#39;t Buy</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Check out this &lt;a href=&#39;http://money.aol.com/top5/general/gadgets&#39;&gt;article&lt;/a&gt;; I can&#39;t argue with #5.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/04/top-5-gadgets-you-shouldn-buy.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-8858577069152737192</guid><pubDate>Fri, 11 Apr 2008 12:19:00 +0000</pubDate><atom:updated>2008-04-11T08:19:33.352-04:00</atom:updated><title>Walt Mossberg: Laptop Buyer&amp;#39;s Guide</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Fresh off the presses, &lt;a href=&#39;http://online.wsj.com/article/personal_technology.html&#39;&gt;Walt Mossberg&#39;s Laptop Buyer&#39;s Guide&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/04/walt-mossberg-laptop-buyer-guide_11.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36718294.post-1646764602276577041</guid><pubDate>Fri, 04 Apr 2008 14:59:00 +0000</pubDate><atom:updated>2008-04-04T10:59:07.798-04:00</atom:updated><title>Best CCNP Study Guide: Hop On Board This Train!</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;My last post on this &lt;a href=&#39;http://tech-on-tech.blogspot.com/2006/11/best-study-guides-for-ccna-ccnp_12.html&#39;&gt;subject&lt;/a&gt; was almost a year and a half ago. And, in that time, I have not found a better choice for Cisco instruction than Chris Bryant. In fact, things have only gotten better for those with aspirations of becoming certified networking professionals. Indeed, Chris Bryant has partnered with &lt;a href=&#39;http://www.trainsignal.com/index.asp?PageAction=Custom&amp;amp;ID=28&#39;&gt;Train Signal&lt;/a&gt; to produce, in my opinion, the best Cisco training available today. Period. &lt;br/&gt;&lt;br/&gt;The CCNP training, for example, consists of 3 separate courses: BSCI, BCMSN &amp;amp; ONT. Each course contains 2 DVDs, which provide you with both the theory and application of that theory. From the moment you play that first DVD, you are instantly engaged by Chris Bryant&#39;s warmth and &quot;Southern Hospitality.&quot; The whiteboard lessons are clear, concise and to-the-point; printing them out makes for an excellent guide. &lt;br/&gt;&lt;br/&gt;Perhaps the most enjoyable aspect of the training is the feeling that Chris Bryant is actually in the room with you at that very moment. During the lab sections of the video, where Chris Bryant connects into real switches to demonstrate the concepts he has just discussed, you can actually hear him typing away at the keyboard in the background. And, further emphasizing my point above that you feel as though Chris Bryant is there with you, he occasionally &quot;fat fingers&quot; a command and has to backspace - this is what happens in the real world and you are watching it live!&lt;br/&gt;&lt;br/&gt;Whether you need to brush up your Cisco skills to study for certifications, or to help you get a better understanding of what you are doing at work day-to-day, &lt;a href=&#39;http://www.trainsignal.com/index.asp?PageAction=Custom&amp;amp;ID=28&#39;&gt;Train Signal&lt;/a&gt; will get you to your destination.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</description><link>http://tech-on-tech.blogspot.com/2008/04/best-ccnp-study-guide-hop-on-board-this_04.html</link><author>noreply@blogger.com (rdauman)</author><thr:total>0</thr:total></item></channel></rss>