Author: rwolf

Why the hackers are winning reason #1

Here’s a reason the hackers are winning: Reason #1:  Stupid TLD registrars who make it nigh impossible to report abuse (#ISPidiots). Our honeypot detected a brute force attempt from IP address:  91.191.19.58 Well lets do some looking into this abusive host / IP. The first thing we do is a […]

Read More

Petya Ransomware

Petya’s been in the news lately so I thought I’d take a lookielou at it.  I found an interesting GitHub post about the topic here.  Here are my notes on the matter. * Our Whackers For Hackers IPBL blocked the distribution points for the most part (our firewalls would have […]

Read More

What Microsoft says about BSD (and thus PFSense)

Ignorance is bliss right?  Not when it comes to budgets, your health, relationships, that wart developing on your face…well, maybe in a lot of things ignorance isn’t bliss now that I think about it but certainly not when it comes to your corporate edge which is our topic of discussion.  […]

Read More

LEAN IT

LEAN is a manufacturing term often used to describe process improvement that minimizes waste.  <– That’s a LEAN sentence!  With respect to IT and IT solutions, waste in our view is over spending.  There are certainly other factors like under-skilled staff wheel spinning turning small tasks into mammoth undertakings but […]

Read More

DNS block lists & why you NEED to use them!

We all know about IPBL’s or “IP Block Lists” (a.k.a IP Blackhole Lists).  They’re great right?  What about applying the same logic to DNS? DNS works like this: On your computing device you browse to yahoo.com and your computing device says…hey, I don’t happen to know what yahoo.com is…hey DNS […]

Read More

Country Blocking & why you NEED to do it

Out of the box all of our Firewall-Z routers are configured to do country blocking.  Whether you use the embedded, install-able, virtual machine, rack mounted, etc versions…they’re all the same.  Country blocking is a pay for extra on many routers or you have to go above and beyond to hack […]

Read More

Fireball Malware and Malvertising

A new Malvertising attack is in the news…isn’t it always?  This time (June of 2017) it infected / affected 250 million hosts.  How does it work?  It works by leveraging the online advertising mechanisms that advertise to you!  This one is “new” in that it generates revenue by fake clicks […]

Read More

IP Block Lists

There are many ways to protect your network.  One of the many ways EITS works to protect their clients is with a “honey pot” the unsuspecting hacker or hacker bot finds.  They or their mechanisms try to hack any number of services (mail, ftp, ssh, etc) which we detect then […]

Read More

Programmatically block TOR networks easily

There are many reasons to block TOR networks. Unchecked anonymity of your staff to surf without accountability Hackers and the dregs of the Internet like to use it as a platform to do criminal acts online and potentially attack you anonymously It’s a potential vector for information leakage …and more. […]

Read More

Maximizing Network Bandwidth

We recently ran into issues with Broadcom (QLogic) network cards on a few servers.  Turning Jumbo Frames on to increase capacity allowing 9,000 bytes instead of the default 1,500 bytes actually caused us to experience a dramatic reduction in overall capacity and bandwidth.  I used a program called iperf to […]

Read More

Automated scrapper to gather email addresses

This is a two fold post about how we can leverage programming, scripting and other tools in our tool belt to automate tasks and make IT work look easy (although it isn’t always easy) and about IT security. Demonstrate an automated method to automatically download and parse email addresses from […]

Read More

De-Cloud from NuWave 360!

Without much help from NuWave Partners in Technology we managed to migrate EVERYTHING from a clients 360 Cloud deployment back to a hybrid on-premise and Office 365 configuration. Things we managed to grab making the transition easy for us and the client: The entire Active Directory infrastructure The entire DNS […]

Read More
N2000 Series Switcehs from Dell

Switch Fabric Upgrade: Savings of $5600

We did a switch fabric upgrade for a client.  They ordered a quantify of 4, Dell N2024 switches with two fiber SFP’s. They were using older HP Pro Curves, then they switched to Cisco Small Business switches but the throughput wasn’t good enough so we switched them to the Dell […]

Read More

Problem Solving

Solutions 24/7 including holidays!

Read More

Web Design and Hosting

Creative content and security

Read More