Categories
General IT Information Security

Password Management Guidance

The primary objective of a theoretically sound password formulation policy is password diversity – we want our identity system to contain lots of different, hard to guess passwords.

There are several ways to achieve this but unfortunately most of the common approaches in use today, such as length requirements, complexity requirements, and change requirements, are far from helpful.

Categories
General IT Information Security

The CIA Triad

The CIA triad is a model designed to guide policies and procedures for information security within an organisation. Read on to find out more about the CIA triad and some of the common methods organisations implement to meet CIA requirements.

Categories
General IT Information Security

What is IAAA?

How does security in systems actually work? Well, security generally works on a principle called IAAA; Identification, Authentication, Authorisation, Accountability. Read on to find out what this principle looks like in the real world.

Categories
General IT

Happy Birthday Windows 98!

This week marks the 20th birthday of Windows 98 – like its predecessor it was a hybrid 16-bit and 32-bit operating system based on MS-DOS.

Categories
General IT Tutorials

Creating a Windows Server 2012 Virtual Machine

Windows Server 2012 is the sixth release of Windows Server and succeeds Windows Server 2008 R2. At the time of writing, Windows Server 2012 R2 is the latest server operating system released by Microsoft, with Windows Server 2016 currently being available as a technical preview.

Categories
General IT Misc

Being a Great Playtester

A playtest involves playing through a game in order to find any bugs or design issues before the full release date. Playtesting involves various different stages and can be open or closed. In order to understand how playtesting can be useful, it is important to establish what makes a great playtester.

Categories
General IT Masters

Stages of an Incident Lifecycle

Forensic investigations normally take place within the framework of an incident and thus follow a common cycle of events. You suspect that an employee has found a way of intercepting emails from one of their colleagues. What would the incident lifecycle look like?

Categories
General IT Masters Tutorials

Producing and Analysing a Log File

You suspect somebody of secretly using your computer and you want to perform a forensic investigation to prove it. The event log in Windows is an extremely useful tool and records huge amounts of system data.