Roger Grimes

Roger
Grimes

Roger A. Grimes is a security consultant. He is a CPA, a CISSP, a CEH, a CHFI, a TICSA, and an MCSE: Security.

Articles
Hardware Protocol Analyzers
Learn about the benefits of hardware-based network protocol analyzers and know which questions to ask when evaluating these products.
A Small Consideration
Like any monitoring tool, honeypots potentially add liability that’s assumed by the administrator.
Honeypots for Windows 4
By offering a target too sweet to resist, you can help protect your Windows network.
Email Security Suites 1
Spam and viruses are creating an email security crisis. Find a solution to protect your email servers.
ISA Server VPN Protocols 2
Understand the protocols involved in ISA Server VPNs.
IPSec Tunneling with ISA Server
If you use ISA Server as a router or firewall, you already have everything you need to create an effective Internet VPN.
Certificate Authentication
ISA Server Internet VPNs require certificates for authentication.
NAT Transversal
If your network uses NAT-T, you'll need to take extra steps when setting up an ISA Server VPN.
IPSec Protocols and Modes 2
Understand the protocols that IPSec uses.
UDP vs. TCP 14
Discover the difference between two essential network protocols.
Trojan-Horse Port Resources
Here's a collection of good trojan-port lists.
11 Port Enumerators 30
Have you found an open port on your computer? Worried you might have a virus? Here's a look at 11 port enumerators that can help you track open ports to their source programs.
The Art of Interpreting Netstat 2
Here's how to use Netstat to perform port enumeration.
Assessing Vulnerability Assessment Tools 4
To outwit malicious intruders, you need a vulnerability assessment tool that tries all the tricks the crackers use. Here’s how to choose the best tool for your environment.
Executing Honeyd 2
Learn Honeyd's command-line parameters.
Master-Level Microsoft Stack Training with John Savill

Get 30 hours of comprehensive training covering the complete Microsoft solution stack. Invest a few hours each week and become the #1 Microsoft expert in your organization.

Past Sessions Available for Instant Access!
Semester 2: January 22nd to February 19th
Access to Recordings through May 20, 2015

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks
* PLUS a preview of Windows 10

 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×