Roger Grimes

Roger
Grimes

Roger A. Grimes is a security consultant. He is a CPA, a CISSP, a CEH, a CHFI, a TICSA, and an MCSE: Security.

Articles
Hardware Protocol Analyzers
Learn about the benefits of hardware-based network protocol analyzers and know which questions to ask when evaluating these products.
A Small Consideration
Like any monitoring tool, honeypots potentially add liability that’s assumed by the administrator.
Honeypots for Windows 4
By offering a target too sweet to resist, you can help protect your Windows network.
Email Security Suites 1
Spam and viruses are creating an email security crisis. Find a solution to protect your email servers.
ISA Server VPN Protocols 2
Understand the protocols involved in ISA Server VPNs.
IPSec Tunneling with ISA Server
If you use ISA Server as a router or firewall, you already have everything you need to create an effective Internet VPN.
Certificate Authentication
ISA Server Internet VPNs require certificates for authentication.
NAT Transversal
If your network uses NAT-T, you'll need to take extra steps when setting up an ISA Server VPN.
IPSec Protocols and Modes 2
Understand the protocols that IPSec uses.
UDP vs. TCP 14
Discover the difference between two essential network protocols.
Trojan-Horse Port Resources
Here's a collection of good trojan-port lists.
11 Port Enumerators 30
Have you found an open port on your computer? Worried you might have a virus? Here's a look at 11 port enumerators that can help you track open ports to their source programs.
The Art of Interpreting Netstat 2
Here's how to use Netstat to perform port enumeration.
Assessing Vulnerability Assessment Tools 4
To outwit malicious intruders, you need a vulnerability assessment tool that tries all the tricks the crackers use. Here’s how to choose the best tool for your environment.
Executing Honeyd 2
Learn Honeyd's command-line parameters.

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×