Author Archive | Ed Fisher

howto://fix the npf driver isn’t running

If you’ve ever launched Wireshark only to encounter an error “the npf driver isn’t running” then you probably have encountered a botched install. Have heart, we can fix this without having to reinstall. Here’s how. Click to close the error, and then close Wireshark. Open an administrative cmd prompt. Run this command sc start npf […]

Continue Reading

Who are you, and how do you prove it?

Usernames and passwords are not enough to authenticate users in today’s threat-filled environment. Two factor authentication is something that needs to be on your radar now, for internal, external, and cloud-based applications.

Continue Reading

you’re doing it wrong

alternate titles include -how to break cloud services -herding cats 101 Folks, I keep coming across a phenomenon from out of the late 90s that I really thought we, as an industry, left behind long ago, much like grunge music and Geocities. I have encountered it so many times in the past two weeks that […]

Continue Reading

howto://shape traffic on tmg 2010

TMG 2010 does a great job of securing your network, and can exercise very precise control of internal users’ access to the Internet when it comes to ports and protocols, file access, etc., but unfortunately it cannot do anything to control bandwidth consumption. Whether you call it traffic shaping, bandwidth restrictions, rate limiting, or speed […]

Continue Reading

…and then there’s complete paranoia

Here’s some common sense advice on how to implement your firewalls. These are some vendor’s best practices; these are words of wisdom from someone who’s been there, done that, and learned the hard way what works, and what doesn’t. It might make an auditor’s head spin; it might make paper-CISSP tsk-tsk, but it will also make your job a lot easier, and won’t violate any RFCs.

Continue Reading

Hey! You! Get off of my cloud!

Push any app or service you want out to the cloud, but keep your security close and require your service providers to use one of the standards based methods to authenticate your users against your Active Directory.

Continue Reading