Roger Grimes

Roger
Grimes

Roger A. Grimes is a security consultant. He is a CPA, a CISSP, a CEH, a CHFI, a TICSA, and an MCSE: Security.

Articles
Hardware Protocol Analyzers
Learn about the benefits of hardware-based network protocol analyzers and know which questions to ask when evaluating these products.
A Small Consideration
Like any monitoring tool, honeypots potentially add liability that’s assumed by the administrator.
Honeypots for Windows 4
By offering a target too sweet to resist, you can help protect your Windows network.
Email Security Suites 1
Spam and viruses are creating an email security crisis. Find a solution to protect your email servers.
ISA Server VPN Protocols 2
Understand the protocols involved in ISA Server VPNs.
IPSec Tunneling with ISA Server
If you use ISA Server as a router or firewall, you already have everything you need to create an effective Internet VPN.
Certificate Authentication
ISA Server Internet VPNs require certificates for authentication.
NAT Transversal
If your network uses NAT-T, you'll need to take extra steps when setting up an ISA Server VPN.
IPSec Protocols and Modes 2
Understand the protocols that IPSec uses.
UDP vs. TCP 14
Discover the difference between two essential network protocols.
Trojan-Horse Port Resources
Here's a collection of good trojan-port lists.
11 Port Enumerators 30
Have you found an open port on your computer? Worried you might have a virus? Here's a look at 11 port enumerators that can help you track open ports to their source programs.
The Art of Interpreting Netstat 2
Here's how to use Netstat to perform port enumeration.
Assessing Vulnerability Assessment Tools 4
To outwit malicious intruders, you need a vulnerability assessment tool that tries all the tricks the crackers use. Here’s how to choose the best tool for your environment.
Executing Honeyd 2
Learn Honeyd's command-line parameters.
Hyper-V Master Class

Hyper-V Master Class with John Savill
Live Online Training: Thursdays, April 27th to May 18th
Register by April 20th and Save 20%!

John Savill provides 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment covering both capabilities in Windows Server 2012 R2 and Windows Server 2016. John will walk attendees through resource allocation and architecture, storage, networking (including Network Virtualization), clustering, migration technologies, replication, private cloud, session virtualization, migration from other technologies, integration with Microsoft Azure, and more. At the end of this class, attendees will be able to architect and manage an enterprise-level Hyper-V environment.

 

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×