Roger Grimes

Roger
Grimes

Roger A. Grimes is a security consultant. He is a CPA, a CISSP, a CEH, a CHFI, a TICSA, and an MCSE: Security.

Articles
Hardware Protocol Analyzers
Learn about the benefits of hardware-based network protocol analyzers and know which questions to ask when evaluating these products.
A Small Consideration
Like any monitoring tool, honeypots potentially add liability that’s assumed by the administrator.
Honeypots for Windows 4
By offering a target too sweet to resist, you can help protect your Windows network.
Email Security Suites 1
Spam and viruses are creating an email security crisis. Find a solution to protect your email servers.
ISA Server VPN Protocols 2
Understand the protocols involved in ISA Server VPNs.
IPSec Tunneling with ISA Server
If you use ISA Server as a router or firewall, you already have everything you need to create an effective Internet VPN.
Certificate Authentication
ISA Server Internet VPNs require certificates for authentication.
NAT Transversal
If your network uses NAT-T, you'll need to take extra steps when setting up an ISA Server VPN.
IPSec Protocols and Modes 2
Understand the protocols that IPSec uses.
UDP vs. TCP 14
Discover the difference between two essential network protocols.
Trojan-Horse Port Resources
Here's a collection of good trojan-port lists.
11 Port Enumerators 30
Have you found an open port on your computer? Worried you might have a virus? Here's a look at 11 port enumerators that can help you track open ports to their source programs.
The Art of Interpreting Netstat 2
Here's how to use Netstat to perform port enumeration.
Assessing Vulnerability Assessment Tools 4
To outwit malicious intruders, you need a vulnerability assessment tool that tries all the tricks the crackers use. Here’s how to choose the best tool for your environment.
Executing Honeyd 2
Learn Honeyd's command-line parameters.
John Savill's PowerShell Master Class

Join John Savill for the ALL NEW PowerShell Master Class!

In this master-level training course, you get 9 hours of technical training that will make you a PowerShell Master!

Thursdays, February 11th through 25th

By the end of the course, you will understanding how to create custom modules to achieve amazing results in your environment, in non-Microsoft environments and in Azure.

Topics covered will include:

* PowerShell Fundamentals
* Remote Management
* Connecting Commands and Mastering Objects
* Scripting and Custom Modules
* State Configuration
* PowerShell Workflows, Orchestrator SMA, and Azure Automation
* And much more!

 

Join the Conversation

Get answers to questions, share tips, and engage with the IT professional community at myITforum. Are you a data center professional? Join AFCOM for the best data center insights.

Sponsored Introduction Continue on to (or wait seconds) ×