Author: rwolf

DNS block lists & why you NEED to use them!

We all know about IPbl’s or “IP Block Lists” (a.k.a IP Blackhole Lists).  They’re great right?  What about applying the same logic to DNS? DNS works like this: On your computing device you browse to yahoo.com and your computing device says…hey, I don’t happen to know what yahoo.com is…hey DNS […]

Read More

Country Blocking & why you NEED to do it

Out of the box all of our Firewall-Z routers are configured to do country blocking.  Whether you use the embedded, install-able, virtual machine, rack mounted, etc versions…they’re all the same.  Country blocking is a pay for extra on many routers or you have to go above and beyond to hack […]

Read More

Fireball Malware and Malvertising

A new Malvertising attack is in the news…isn’t it always?  This time (June of 2017) it infected / affected 250 million hosts.  How does it work?  It works by leveraging the online advertising mechanisms that advertise to you!  This one is “new” in that it generates revenue by fake clicks […]

Read More

IP Block Lists

There are many ways to protect your network.  One of the many ways EITS works to protect their clients is with a “honey pot” the unsuspecting hacker or hacker bot finds.  They or their mechanisms try to hack any number of services (mail, ftp, ssh, etc) which we detect then […]

Read More

Programmatically block TOR networks easily

There are many reasons to block TOR networks. Unchecked anonymity of your staff to surf without accountability Hackers and the dregs of the Internet like to use it as a platform to do criminal acts online and potentially attack you anonymously It’s a potential vector for information leakage …and more. […]

Read More

Maximizing Network Bandwidth

We recently ran into issues with Broadcom (QLogic) network cards on a few servers.  Turning Jumbo Frames on to increase capacity allowing 9,000 bytes instead of the default 1,500 bytes actually caused us to experience a dramatic reduction in overall capacity and bandwidth.  I used a program called iperf to […]

Read More

Automated scrapper to gather email addresses

This is a two fold post about how we can leverage programming, scripting and other tools in our tool belt to automate tasks and make IT work look easy (although it isn’t always easy) and about IT security. Demonstrate an automated method to automatically download and parse email addresses from […]

Read More

De-Cloud from NuWave 360!

Without much help from NuWave Partners in Technology we managed to migrate EVERYTHING from a clients 360 Cloud deployment back to a hybrid on-premise and Office 365 configuration. Things we managed to grab making the transition easy for us and the client: The entire Active Directory infrastructure The entire DNS […]

Read More
N2000 Series Switcehs from Dell

Switch Fabric Upgrade: Savings of $5600

We did a switch fabric upgrade for a client.  They ordered a quantify of 4, Dell N2024 switches with two fiber SFP’s. They were using older HP Pro Curves, then they switched to Cisco Small Business switches but the throughput wasn’t good enough so we switched them to the Dell […]

Read More

Problem Solving

Solutions 24/7 including holidays!

Read More