Dell BIOS Reporting Tool

Mick's IT Blog

Recently, we ran into a problem when we discovered some of the newer laptops were not automatically disabling the WiFi when connected to ethernet. What made the task even more difficult was that all of our Dell Latitude 7480 systems were already deployed.

Dell 98

Local Administrators Automated Reporting Tool

Mick's IT Blog

Back in November 2016, I posted the blog entry on reporting local administrators on machines. That script is deployed to machines via an SCCM package that reports the local administrators back to SCCM to be able to be queried into a report.

Tools 105

Trending Sources

Event 51 Drive Failure Reporting Tool

Mick's IT Blog

I decided to write a reporting tool for this event so that IT professionals will be aware of this error before a complete failure occurs and there is data loss along with losses in production time. Last year, we had a high level executive that started having slowness and extended drive usage.

Tools 88

MDT Build Reporting Tool

Mick's IT Blog

I used their information and function to expand the process into a full fledged reporting tool. This tool will email the appropriate IT staff when a build successfully completes, fails, unknown error, or continues running over a designated time frame.

Tools 63

RSAT tools for Windows 10

CanITPro

Hello Folks, It’s now expected that soon after the release of a new client OS, we release a new set of server management tools. Well, wait no more the Remote Server Administration Tools for Windows 10 have been released. These tools includes.(

7 free tools every network needs

Network World

Fortunately, many good tools, both commercial and open source, are available to shine much-needed light into your environment. Because good and free always beat good and costly, I've compiled a list of my favorite open source tools that prove their worth day in and day out in networks of any size. In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility.

RiskIQ: Tools to Improve Cyber- Situational Understanding in DoD

CTOvision

Bob Gourley. Operating, securing and defending the Department of Defense Information Network (DoDIN) network and the data traversing through it is inherently a governmental function for the Armed Forces.

Tools 67

Morpheus – Man-in-the-Middle Security tool

Doctor Chaos

Introducing Morpheus Morpheus is a new tool that provides you with the ability to simulate automated Man-in-the-Middle attacks. Hacking Tools hacking toolsMorpheus can be found at https://github.com/r00t-3xp10it/morpheus. The Morpheus application consists of a suite allowing users to manipulate TCP and UDP data packets using a few applications in the background such as ettercap, urlsnarf, msgsnarf and tcpkill. The […].

Tools 27

Machine Learning Tools are Coming to the Data Center

Data Center Knowledge

New breed of tools use machine learning techniques to add human knowledge to sensor data Read More. DCIM Design Featured Internet of Things Machine Learning Manage Power and Cooling

Tools 43

Truly Useful Artificial Intelligence Tools You Can Use Today

CTOvision

We know you, dear readers, have been tracking the megatrend of artificial intelligence. There are many issues in this trend that should inform your day-to-day decision-making (we examine AI issues as part of our CAMBRIC construct to help put the trend in the context of other major thrusts in the tech world). Most AI solutions today are fielded by the big players in IT.

Assessing the FFIEC Cybersecurity Assessment Tool

CTOvision

On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool. This tool is intended to help financial organizations large and small better assess and understand risk and also the organization's maturity in cyber defense. Here are more thoughts: The tool has two parts.

Tools 67

Analysts, Tools, and Complexity

CTOvision

By AdamElkus CTOs and analysts of all stripes know that understanding the problem they are trying to solve should precede selecting analytical tools. Page has a useful distinction between all of these that can help us match tool to problem.

Tools 47

10 advanced endpoint protection tools

Network World

Endpoint protection The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection.

Tools 32

Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture

CTOvision

On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool. This tool is intended to help financial organizations large and small better assess and understand risk and also the organization's maturity in cyber defense. Here are more thoughts: The tool has two parts.

Windows Updates Reporting Tool

Mick's IT Blog

My firm uses MDT to build all of our computers. The windows updates are setup as packages so they can be applied to the OS before it is laid down on the PC. MDT will then download any new updates and apply them to the PC after the OS has been laid down.

Tools 33

Variety in collaboration tools is not a curse!

CTOvision

New collaboration tools come with apps that simplify integration with other enterprise systems. Collaboration tools are proliferating and this complicates adoption of a universal enterprise collaboration platform. Add to the above the need for internal groups to collaborate with external groups and it's understandable why a fallback tool for collaboration continues to be good old email -- which everyone agrees is pretty much an awful tool for collaboration. Dennis D.

Tools 22

Top 5 Business Intelligence Tools of 2017

IT Toolbox

This post looks at a few of the top BI tools for 2017

5 must-have security tools

Network World

New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.

Jihadists’ digital tools revealed

Computer Weekly

A report by dark web intelligence firm Flashpoint reveals how jihadist groups use common security and other tools to hide their digital communications from national security forces

Server and Storage I/O Benchmark Tools: Microsoft Diskspd (Part I)

Storage IO Blog

benchmark) tool that runs on various Windows systems as an alternative to Iometer, vdbench, iozone, iorate, fio, sqlio among other tools. Diskspd is a command line tool which means it can easily be scripted to do reads and writes of various I/O size including random as well as sequential activity. Microsoft Diskspd is a synthetic workload generation (e.g.

Tools 34

CIA hacking tools for Mac OS and Linux exposed by WikiLeaks

Computer Weekly

WikiLeaks has exposed hacking tools targeting the Mac and Linux operating systems in the latest of its series of leaks allegedly from the US Central Intelligence Agency

Carbanak shows how attackers hijack legitimate tools

Computer Weekly

Criminal gang’s abuse of Google services highlights the trend of attackers using legitimate tools to launch and manage attacks

Inside 3 top threat hunting tools

Network World

Taking down the threat Image by Thinkstock Advanced Persistent Threats (APT) are able to slip past even the most cutting-edge security defenses thanks to a diabolically clever strategy. Hackers may try to breach your defenses thousands of times until they finally get in.

Tools 31

4 Tools That Make it Easier to Be an Entrepreneur

IT Toolbox

Modern entrepreneurs are afforded with a myriad of robust hardware and software tools that make it easier, more efficient, and cheaper to start, maintain, and scale a business

EternalRocks network worm uses 7 NSA hacking tools

Network World

At least one person is leveraging seven leaked NSA hacking tools for a new EternalRocks network worm. While you won’t be forgetting the WannaCry ransomware attack, it is likely you will be hearing a lot more about the alleged NSA-linked EternalBlue exploit and DoublePulsar backdoor as it seems a wide range of bad guys have them in their toyboxes.

SMB 27

EternalRocks worm combines seven leaked NSA attack tools

Computer Weekly

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Are Your Agency’s Management Tools Defeating Your Efforts?

CTOvision

Poor employee performance might be a result of poor choice of tools. Most frequently, a poor choice of project management tools is to blame. There are too many tools out there that serve only to obfuscate workflows - I am going to tell you how to recognize and avoid them. Seek out the tools that most closely match your requirements. AJ Morris. Here are a few signs it might be time to look for some new ones. What does your agency’s workflow look like?

Hitachi Tools Use Big Data for Data Center Automation

Data Center Knowledge

HDS launches series of management tools for IT ops, expands hardware lineup Read More. Blades

How to assess security automation tools

Network World

His insight is worth repeating for anyone looking to add automation tools to their security toolset. This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer , co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference.

Step-by-Step: Microsoft Azure Virtual Machine Readiness Assessment Tool

CanITPro

virtual machine Azure Virtualization tool Assessment how-toMoving to the cloud can be a daunting task, and sometimes it is hard to know where to start. You may have questions like w hat workloads can be moved? W hat workloads can't? W hat can be moved after some modifications? The Azure Virtual Machine.( read more ).

Tools 24

9 essential tools for the security-conscious mobile worker

Network World

Have security gadgets, will travel Image by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all.

Entrepreneur or Startup? Succeed with FREE access to Cloud Services, Software and Tools

IT Pros Rock!

Microsoft BizSpark helps qualifying software startups succeed by providing free access to Microsoft cloud services, software and tools for three (3) years.

How to Select the Right Cloud Management Tools

Data Center Knowledge

Without the right management tools your go-to-market strategy can suffer. Your infrastructure, including your data center and your cloud, are the heart of your business. Read More. Cloud Computing Enterprise cloud management