Radical Development

Technical Without the Technicalities

Microsoft Assessment and Planning Toolkit Explained

| 0 comments

What does the MAP toolkit do? The Microsoft Assessment and Planning (MAP) Toolkit 8.0 is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs. The MAP toolkit uses Windows Management Instrumentation (WMI), Active Directory Domain Services (AD DS), SMS Provider, and other technologies to collect data in your environment and inventories computer hardware, software, and operating systems in small or large IT environments without installing any agent software on the target computers. The download is free, but it has a laundry list of prerequisites: .Net … Continue reading

Encrypting File System in Windows

| 1 Comment

Did you know that you can encrypt and decrypt files and folders within Windows without the need of any third party software? Encrypting File System (EFS) is a feature within New Technology File System (NTFS) where the individual who is currently logged into the operating system (OS) has the ability to perform encryption. If you encrypt a folder then any files that you move or copy into this folder also become encrypted and this all happens on the fly. The beauty of this is if you have a computer that is shared by multiple individuals this is a good way … Continue reading

Open Source and Commericial Security Tools

| 0 comments

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools available. Toolkits Network Security Toolkit: This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in … Continue reading

A Look At Microsoft SQL Server Database Security

| 0 comments

Security and web applications is something that I speak and write about often and I believe one aspect of overlooked security is the database itself. For the purpose of this article I am focusing on Microsoft SQL Server. I am by no means a database administrator therefore this article is from the point of view of a developer and general in nature. Since web applications typically have an interface to the database the best way to think about security is the fact that the web application is the key to the database and for this reason you must take a … Continue reading

Business Contingency Operations

| 0 comments

The idea of a Business Contingency Plan (BCP) is the act of preparation and adapting to any contingency either manmade or natural. Examples include hurricanes, earthquakes, sabotage, and even war. Upon beginning the BCP questions much be answered and these questions include subjects of what is a disaster, what are available options, how much can be endured, and what is the cost connected with the BCP. Arguably most important is the fact of exercising the BCP in order to understand if the plan results in the expected outcome. In addition, it is imperative that this plan not become stagnate. In … Continue reading

Basic Linux Commands

| 0 comments

Since I am on a mission to learn Linux and I am clearly a late comer to this operating system I wanted to document commands that I have begun to learn or in the process of learning. This post really is self serving and if you find value in it then I am clad to have helped. I also intend to update this post over time with the hopes of gathering a fairly comprehensive list of commands. This may seem basic to some, but again the intent is to start with basics and build up, therefore if you have any … Continue reading

Data Recovery The Easy Way With TestDisk

| 0 comments

There are many solutions on the market that are free, open source, and commercial. While many may argue that commericial solutions provide both ease of use and work well, I present to you that open source solutions are often a better solution. This being said, I wanted to share my experiences with TestDisk from CGSecurity, which is primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy … Continue reading