Home > Authors

John Traenkenschuh

John Traenkenschuh is a Technology Specialist at a manufacturing company in the Fortune 50. His work with computing and networking stretches back to his 1975 experiences, during Upward Bound, a summer program for disadvantaged kids. As a high school teacher, he assembled the school district’s first word processing lab from discarded TRS Model 80’s. Now, a few companies and jobs later, he has earned the CISSP-ISSAP, with complementary Certified Check Point Security Administrator/Engineer (CCSA/CCSE) designations, useful when volunteering as Project Manager and primary author for the Center for Internet Security’s Check Point Firewall benchmark. Never far from teaching, John instructs Business and Finance majors on the beauties of Visual Basic .NET at a Midwest University, rated in the Top 10 by the U.S. News and World Report annual survey. This work has earned him the Most Valuable Professional designation from Microsoft itself. A dedicated, hyperactive Information Security and IT Professional, his goal is to improve integration between IT technologies and people, whose lives depend on them.

1.
Prevent an APT (Advanced Persistent Threat ) Attack Now!
Nov 25, 2013
2.
Secure Your Embedded Systems Now!
Oct 24, 2013
3.
Secure Your Android Kindle or Nook Tablet Now!
Oct 3, 2013
4.
VirtualBox: Making the Most of Any Operating System You Choose
Mar 7, 2012
5.
Making New Linux Workstations from Old Windows Machines
Feb 29, 2012
6.
Secure Your iPad 2 Now!
Dec 28, 2011
7.
Secure Your Linux Workstation Now!
Dec 12, 2011
8.
Secure Your Mac OS X System Now!
Nov 15, 2011
9.
Secure Your Windows 7 System Now!
Mar 9, 2011
10.
Secure Your Facebook Account Now!
Mar 2, 2011
11.
Secure Your Android™ Phone Now!
Feb 23, 2011
12.
Passwords: So Important, Yet So Misused
May 1, 2009
13.
Creating Apps for New Markets: Exploring the PocketPC Platform
Dec 21, 2007
14.
Text File Operations in .NET
Dec 14, 2007
15.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
16.
Zune: Reflections on the First Generation
Oct 12, 2007
17.
Seven Steps to Improving Your VB Code
Aug 17, 2007
18.
Moka5: Virtualization in Your Pocket
Mar 16, 2007
19.
SSH Security Primer: Server Security Settings
Feb 23, 2007
20.
SSH Security Primer: Client Security
Feb 16, 2007
21.
Security on a Dime: Low-Cost Alternatives to SSH
Jan 5, 2007
22.
Windows Media Encoder: Quality Video Training Done on the Cheap
Sep 29, 2006
23.
Mitigating the Security Risks of SSH
Aug 25, 2006
24.
Virtual PC and VMware: A Comparative Review
Jun 16, 2006
25.
SSH Issues: Does Installing SSH Enable More Exploits Than it Solves?
May 26, 2006
26.
Learning Linux the Easy Way - With Cygwin
May 4, 2006
27.
Rsyncing to New Heights in Linux Lore
Apr 21, 2006
28.
Visual Basic 2005: Maximizing the VB Experience with New and Old Features
Oct 28, 2005
29.
Faster Coding with the "My" Object in Visual Basic 2005
Oct 6, 2005
30.
Design and Install the Perfect PC—On Your Mac
Aug 12, 2005
31.
Evaluating Your Firewall
Feb 11, 2005
32.
UNIX Key Security
Apr 30, 2004
33.
UNIX Security 101
Sep 26, 2003

RSS Feed Subscribe  RSS details

Heartbleed? You're too late.
April 11, 2014   Comments
Topics: The Web/Virtual Worlds/Social Networking, Home & Office Computing, Software Security, General Security and Privacy, Information Technology, Software Development & Management, Sales & Marketing, Programming, Open Source, Web Services, Networking, Network Security, Web Development, Network Administration & Management, Data, General Business, Architecture and Design, Security, Linux/UNIX/Open Source Operating Systems, HTML/CSS, Cloud Computing, Network Design & Architecture, Business & Management
Spot the Hacker (Part I)
March 25, 2014   Comments
Topics: Home & Office Computing, Software Security, General Security and Privacy, Information Technology, Information Management, Networking, Network Security, Management & Strategy, Global Business, Security, Business & Management
My iMovie is here, and it looks great!
March 20, 2014   Comments
Topics: Home & Office Computing, Video Editing, Apple, Microsoft Expression Studio, Graphics & Web Design, Information Management, Business & Management
Human Telematics v2
February 6, 2014   Comments
Topics: Software Security, General Security and Privacy, Information Technology, Information Management, Network Security, Information Management, Data, Security, Data Analytics and Visualization, Business Applications, Business & Management
Should You Share Your Fitness Information?
January 26, 2014   Comments
Topics: Access, General Security and Privacy, BusinessObjects/Crystal Reports, SQL Server, DB2, Web Services, Storage, Networking, FileMaker, Information Management, Virtualization, Data, Security, Data Analytics and Visualization, Cloud Computing
It was 20 years ago today: Data Migration Strategy II
December 26, 2013   Comments
Topics: Human Resources, MySQL, Software Security, Access, General Security and Privacy, SAP, Sales & Marketing, BusinessObjects/Crystal Reports, SQL Server, DB2, Information Management, Network Security, FileMaker, Information Management, Management & Strategy, Finance & Investing, Data, SQL, Global Business, General Business, Security, Data Analytics and Visualization, Personal Development, Business Applications, Oracle, Business & Management
And the People were Heard
December 15, 2013   Comments
Topics: Home & Office Computing, Microsoft Windows Vista & Home Server, Windows Phone, Microsoft Windows Desktop, Microsoft Windows Server, Mobile Application Development & Programming, Microsoft Applications
What is your data migration strategy?
November 13, 2013   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Video Editing, Mac OS X, Apple, Software Security, Access, General Security and Privacy, Dreamweaver & Flash, Microsoft Expression Studio, Web Services, Graphics & Web Design, Information Management, Network Security, Information Management, Management & Strategy, Data, Security, Hardware, Photoshop & Adobe, Personal Development, Business Applications, MAC OS X/Other, Cloud Computing, Operating Systems, Server, Business & Management
New Operating System Upgrades--And the winner is . . .
November 2, 2013   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Mac OS X, Microsoft Windows Desktop, Apple, Software Security, Microsoft Servers, Access, General Security and Privacy, Information Technology, Microsoft Windows Desktop, Home Networking, Networking, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows Server, Data, Security, Hardware, Microsoft Applications, MAC OS X/Other, Operating Systems, Server
Email Compromised; What Now?
October 29, 2013   Comments
Topics: Home & Office Computing, Software Security, Access, General Security and Privacy, Information Technology, eBay/Yahoo/Google, Network Security, Data, Security, Process Improvement
Windows 9 Final Ideas
September 11, 2013   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Microsoft Servers, Microsoft Windows Vista & Home Server, Hardware, Microsoft Applications, MAC OS X/Other, Operating Systems, Server, Process Improvement
More Compelling Windows 9 Features
August 16, 2013   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Software Security, Microsoft Servers, Information Technology, Software Development & Management, Programming, Windows Programming, Network Security, Microsoft Windows Vista & Home Server, Security, Hardware, Microsoft Applications, Operating Systems, Server, Process Improvement
Compelling Windows 9 features
August 12, 2013   Comments
Topics: Microsoft Certification, Graphic Programming, Software Security, Microsoft Servers, Software Development & Management, User Interface (UI), Programming, Network Security, Microsoft Windows Vista & Home Server, Certification, Security, Operating Systems, Server, Process Improvement
I'm done playing; can I have my real computer back?
August 9, 2013   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Information Technology, Hardware, Microsoft Applications
Computer Service is Car Service Part 3
August 3, 2013   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Software Security, Information Technology, Programming, Networking, Network Security, Engineering, Security, Hardware, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
Computer Service is Car Service Part 1
August 3, 2013   Comments
Topics: Information Technology, Software Development & Management, Hardware
Computer Service is Car Service Part 2
August 3, 2013   Comments
Topics: Upgrading & Repairing, Information Technology, Programming, Hardware, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server, Process Improvement
If a person steals a car and calls it Research?
July 9, 2013   Comments
Topics: Software Security, Network Security, Security
In the Nook of time...
June 23, 2013   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Hardware
Java--Then and Now
June 21, 2013   Comments
Topics: User Interface (UI), Programming, Java, Web Services/ XML/ SOA/ WebSphere/ WCF
Fake ID's--40 Years later
June 21, 2013   Comments
Topics: Software Security, Software Development & Management, Network Security, Other IT, Certification, Security
Google Wallet? For a motorhome?
June 10, 2013   Comments
Topics: Software Security, Network Security, Security
How do you respond to shutting down a botnet?
June 9, 2013   Comments
Topics: Software Security, Network Security, Security, Business & Management
Bring IT; I'm ready
April 6, 2013   Comments
Topics: Home & Office Computing, Information Technology, Network Security, Security, Process Improvement
Back on facebook--or is he?
January 27, 2013   Comments
Topics: Software Security, Network Security, Security
Bricks and Mortar--Still Compelling
January 24, 2013   Comments
Topics: Home & Office Computing, Information Technology, Open Source, Engineering, Certification, Business & Management
You can check out, but you cannot easily leave...
January 13, 2013   Comments
Topics: Software Security, Networking, Network Security, Security, Other Networking
Why we have current problems
January 8, 2013   Comments
Topics: Software Security, Network Security, Security
You have deactivated your facebook account
January 8, 2013   Comments
Topics: Software Security, Information Technology, Networking, Network Security, Data, Security
It's now a true race...
December 28, 2012   Comments
Topics: Information Technology
Warm Kindling
December 27, 2012   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Information Technology, Storage, Networking, Hardware
Want a Happy Holiday? Spend it with Donald Knuth...
December 24, 2012   Comments
Topics: Six Sigma and Process Improvement, General Engineering & Hardware, Information Technology, Engineering, Communications Engineering
Hacking and Attacks and Now What???
December 4, 2012   Comments
Topics: Software Security, Network Security, Security, Business & Management
Security Street Smarts
December 3, 2012   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Network Security, Security, Microsoft Applications
Sandy Aftermath
December 2, 2012   Comments
Topics: Software Security, Network Security, Security, Business & Management
I'm not supposed to like Windows 8.
November 21, 2012   Comments
Topics: Microsoft Servers, Microsoft Windows 7, Operating Systems, Server
Windows 8: The Best Is Yet To Come?
November 11, 2012   Comments
Topics: Graphic Programming, Software Security, Microsoft Servers, Microsoft Windows 7, Programming, Network Security, Microsoft Windows Vista & Home Server, Security, Operating Systems, Server, Process Improvement
Want to Help?
October 28, 2012   Comments
Topics: Microsoft Servers, Microsoft Windows 7, Microsoft Windows Vista & Home Server, Operating Systems, Server
What Have I Got To Lose?
October 27, 2012   Comments
Topics: Microsoft Servers, Microsoft Windows 7, Microsoft Windows Vista & Home Server, Operating Systems, Server
Windows 8: Are You Interested?
October 26, 2012   Comments
Topics: Microsoft Servers, Microsoft Windows 7, Microsoft Windows Vista & Home Server, Operating Systems, Server
Responsible disclosure
October 21, 2012   Comments
Topics: Software Security, Software Development & Management, Network Security, Security
Learning is Learning
October 21, 2012   Comments
Topics: Home & Office Computing, Information Technology, Engineering, Communications Engineering, Process Improvement
Cheating Vegas and Cheating America
September 8, 2012   Comments
Topics: Software Security, Network Security, Security
Ready for your Win 8 Experience?
September 8, 2012   Comments
Topics: Software Security, Microsoft Servers, Microsoft Windows 7, Network Security, Microsoft Windows Vista & Home Server, Security, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
Now you tell me...
August 26, 2012   Comments
Topics: Software Security, Programming, Network Security, Web Services/ XML/ SOA/ WebSphere/ WCF, Security, Business & Management
GAO viz. EPA
August 23, 2012   Comments
Topics: Software Security, Network Security, Security
Libre Office Update
August 18, 2012   Comments
Topics: Software Development & Management, Linux/UNIX/Open Source, Operating Systems, Server, Business & Management
It's not as complex as we might think
August 13, 2012   Comments
Topics: Software Security, Network Security, Security
It is time to support and less to debate
August 11, 2012   Comments
Topics: Software Security, Information Technology, Network Security, Security
How good are your products? The Internet Knows!!!
June 27, 2012   Comments
Topics: Information Technology, Networking, Engineering, Business & Management
Changes to an otherwise normal life
June 24, 2012   Comments
Topics: Information Technology, Networking, Process Improvement, Business & Management
Coming back, coming back home
June 23, 2012   Comments
Topics: Home & Office Computing, Microsoft Servers, Information Technology, Microsoft Windows 7, Programming, Open Source, Microsoft Windows Vista & Home Server, Microsoft Applications, Operating Systems, Server
What Apple and Every Apple Support Professional Must Do
April 14, 2012   Comments
Topics: Security, MAC OS X/Other, Operating Systems, Server
Information Technology Musings...
April 11, 2012   Comments
Topics: Information Technology, Certification, Process Improvement
Flashbacks On Your Mac?
April 9, 2012   Comments
Topics: Software Security, Network Security, Security, MAC OS X/Other, Operating Systems, Server
Post-PC Era--Really???
March 8, 2012   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Information Technology, Security, Hardware
Commodities
March 7, 2012   Comments
Topics: Software Security, Microsoft Servers, Microsoft Windows 7, Network Security, Microsoft Windows Vista & Home Server, Security, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server, Business & Management
Through the Looking Glass...
January 30, 2012   Comments
Topics: Software Security, Network Security, Security
SOPA, PIPA, & NOD
January 19, 2012   Comments
Topics: Software Security, Network Security, Security
Just thinking: Risk and Innovation and Governance and Security
January 15, 2012   Comments
Topics: Software Security, Network Security, Security
2012 Predictions: Big Brother Seems Smaller + Piranha Attacks
January 14, 2012   Comments
Topics: Software Security, Network Security, Security
2012: It's the end of the world and we know it
January 8, 2012   Comments
Topics: Software Security, Information Technology, Network Security, Security
2012: I Think I Am Whom?
January 8, 2012   Comments
Topics: Software Security, Network Security, Security
Day of the Expanding Man... 2012 Predictions
December 30, 2011   Comments
Topics: Other Applications, Home & Office Computing, Information Technology
Is It Really Here?
December 19, 2011   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Information Technology, Open Source, Security, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
iPad Accessories Bought Dirt Cheap
October 31, 2011   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Hardware
Dennis Ritchie--May He Rest in Peace...
October 16, 2011   Comments
Topics: Home & Office Computing, Software Security, Software Development & Management, Programming, Java, Open Source, Eclipse, Engineering, C/C++, Security, Linux/UNIX/Open Source, Communications Engineering, MAC OS X/Other, Operating Systems, Server, Business & Management
Remembering Steve Jobs...
October 6, 2011   Comments
Topics: General Engineering & Hardware, Information Technology, Engineering, Hardware
Linux Workstation--Where are you???
October 5, 2011   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Information Technology, Microsoft Windows 7, Open Source, Microsoft Windows Vista & Home Server, Hardware, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
I like ThinApp as a Way to Contain Stupid App Installations
October 5, 2011   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Information Technology, Software Development & Management, Microsoft Windows 7, Microsoft Windows Vista & Home Server, Security, Linux/UNIX/Open Source, Microsoft Applications, MAC OS X/Other, Operating Systems, Server, Process Improvement, Business & Management
The Ghost in the Machine
September 5, 2011   Comments
Topics: Business & Management
ThinApp: Applying a Thin Wrapper
September 5, 2011   Comments
Topics: Software Security, Software Development & Management, Programming, Network Security, Web Development, Security, Process Improvement
VMware's Thinapp gives Big Benefits
August 2, 2011   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Microsoft Servers, Software Development & Management, Microsoft Windows 7, Network Security, Security, Microsoft Applications, Operating Systems, Server
2011 07 31 The Weak InSecurity: Comglomerates, Attacks, and Minutia
July 31, 2011   Comments
Topics: Software Security, Network Security, Security
Who watches the Watchers?
July 30, 2011   Comments
Topics: Software Security, Information Technology, Network Security, Security, Business & Management
What it will be
July 25, 2011   Comments
Topics: Software Security, Network Security, Security
What is a sandbox and why do you want one?
July 6, 2011   Comments
Topics: Software Security, Network Security, Security
Data is Code, and Data--Code
July 6, 2011   Comments
Topics: Software Security, Network Security, Security
2011 06 18 The Weak InSecurity: Bad Tradedowns
June 18, 2011   Comments
Topics: Software Security, Network Security, Security
2011 06 12 The Weak InSecurity
June 12, 2011   Comments
Topics: Software Security, Network Security, Security
2011 06 05: The Weak InSecurity; One in 20 of you readers is a real loser...
June 5, 2011   Comments
Topics: Software Security, Network Security, Security
You're kidding me, right?
May 25, 2011   Comments
Topics: Software Security, Software Development & Management, Networking, Network Security, Web Development, Security, Other Networking
Time to change the old worn out artifacts of your online Life...
May 12, 2011   Comments
Topics: Software Security, Software Development & Management, User Interface (UI), Programming, Network Security, Web Development, Security
2011 05 08 The Weak InSecurity
May 8, 2011   Comments
Topics: Network Security, Security
Something Wicked This Way Comes
May 3, 2011   Comments
Topics: Software Security, Network Security, Security
2011 04 23 The Weak InSecurity
April 23, 2011   Comments
Topics: Software Security, Software Development & Management, Network Security, Security
2011 April 11 - The Weak InSecurity
April 16, 2011   Comments
Topics: Software Security, Information Technology, Network Security, Security
The weak in Security
April 8, 2011   Comments
Topics: Software Security, Network Security, Security
What happened to the Pocket PC?
April 8, 2011   Comments
Topics: Home & Office Computing, Software Development & Management, Programming, Windows Programming, Web Development, Microsoft Applications
Windows Security Improvements
April 2, 2011   Comments
Topics: Software Security, Programming, Windows Programming, Network Security, Security
Chrome Dome
April 2, 2011   Comments
Topics: Software Security, Network Security, Security
$100 Buys a lot of Mobile Workstation
April 2, 2011   Comments
Topics: Software Security, Security
Technology Butlers
March 27, 2011   Comments
Topics: Other Applications, Home & Office Computing, General Engineering & Hardware, Networking, Engineering, Hardware, Communications Engineering, Other Networking, Semiconductor Technologies
Are You An ISP or Phone Carrier?
March 26, 2011   Comments
Topics: Storage, Networking, Wireless/High Speed/Optical, Routing & Switching, Other Networking, Voice/IP Communications
Will This Work?
March 22, 2011   Comments
Topics: Home & Office Computing, General Engineering & Hardware, Information Technology, Engineering, Hardware
Are You Sick Yet Well Enough to Know IT?
March 20, 2011   Comments
Topics: Information Technology, Network Security, Security, Business & Management
Mobile Platforms: Safe or Risky?
February 27, 2011   Comments
Topics: Software Security, Software Development & Management, Networking, Network Security, Security
IT Misfits
February 27, 2011   Comments
Topics: Business & Management
Releasing the Hounds of War
February 14, 2011   Comments
Topics: Network Security, Security
Smart ways to hack a smartphone
January 30, 2011   Comments
Topics: Software Security, Network Security, Security
There's a new Highway in our land...
January 26, 2011   Comments
Topics: Engineering, Communications Engineering, Process Improvement, Business & Management
What's Google know about you that you don't?
January 8, 2011   Comments
Topics: SOA, Web Services, Network Security, Web Development, Security
What's your life's details worth to you?
January 1, 2011   Comments
Topics: Network Security, Security
Worthy Security Goal
December 30, 2010   Comments
Topics: Software Security, Network Security, Security
Application 'shielding'
December 22, 2010   Comments
Topics: Software Security, Microsoft Servers, Microsoft Windows 7, Network Security, Microsoft Windows Vista & Home Server, Security, Operating Systems, Server, Process Improvement
what you are missing...
December 22, 2010   Comments
Topics: Software Security, Network Security, Security
Let it snow, let it snow, let it snow...
December 4, 2010   Comments
Topics: Certification, Other Non-Technical, Process Improvement, Business & Management
It must work more simply than this
December 1, 2010   Comments
Topics: Upgrading & Repairing, General Engineering & Hardware, Information Technology, Software Development & Management, Engineering, Hardware
Misty water-color memories
November 30, 2010   Comments
Topics: Upgrading & Repairing, General Engineering & Hardware, Software Security, Information Technology, Network Security, Engineering, Security, Hardware
There are no secrets III
November 20, 2010   Comments
Topics: Upgrading & Repairing, Software Security, Networking, Network Security, Routing & Switching, Security, Hardware, Other Networking, Voice/IP Communications
There are no secrets II
October 30, 2010   Comments
Topics: Other Applications, Graphic Programming, Home & Office Computing, Software Security, SOA, User Interface (UI), Programming, Java, Web Services, Windows Programming, Eclipse, Network Security, C/C++, Web Development, Web Services/ XML/ SOA/ WebSphere/ WCF, Security, Microsoft Applications
There are no secrets...
October 27, 2010   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Software Security, Information Technology, Networking, Network Security, Web Development, Security, Hardware
Complexity Kills
October 26, 2010   Comments
Topics: Software Security, Software Development & Management, SOA, Web Services, Security
The security big picture
October 22, 2010   Comments
Topics: Network Security, Security
Great Leaders
October 11, 2010   Comments
Topics: Information Technology, Networking, Other Networking, Process Improvement, Business & Management
I Am The Cloud Vendor! Koo Koo Kachew!
October 10, 2010   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Information Technology, Network Security, Security, Business & Management
What's the real truth?
September 24, 2010   Comments
Topics: Software Security, Information Technology, Software Development & Management, Network Security, Web Development, Security
Did You Know 4.0
August 14, 2010   Comments
Topics: Networking, Certification, Security, Other Networking, Process Improvement, Business & Management
For the Summer...
August 8, 2010   Comments
Topics: Software Security, Information Technology, Networking, Network Security, Other IT, Certification, Security, Other Networking, Other Non-Technical
How Long?
May 28, 2010   Comments
Topics: Other Applications, Home & Office Computing, Web Services, Networking, Hardware, Microsoft Applications, Business & Management
50 times in a minute
May 2, 2010   Comments
Topics: Software Security, Network Security, Security
How much is your FaceBook account worth?
April 27, 2010   Comments
Topics: Software Security, Network Security, Security
Tenent 4: Storing Data? The 90's called...
April 25, 2010   Comments
Topics: Software Security, Network Security, Security
Slash & Burn Computing Tenent 3: Separate browsing from other work
April 24, 2010   Comments
Topics: Software Security, Security
Slash & Burn Computing Tenent Number 2: Staying Online Persistently Is like Buying a House in a Bad Neighborhood
April 5, 2010   Comments
Topics: Software Security, Network Security, Security
Slash & Burn Computing Tenent I: Anything Internet is Similar to Sharing a Toothbrush
April 4, 2010   Comments
Topics: Software Security, Network Security, Security
Traenk's new Security Design: Slash & Burn
April 3, 2010   Comments
Topics: Software Security, Security
Just how much compter do you really need?
March 20, 2010   Comments
Topics: Software Security, Security
Guess who isn't abusing our public information?
March 20, 2010   Comments
Topics: Security
Two Tier Fortressing
March 17, 2010   Comments
Topics: Software Security, Network Security, Certification, Security
It's Ba-ack!
March 13, 2010   Comments
Topics: Upgrading & Repairing, Hardware
Who can it be now?
March 3, 2010   Comments
Topics: Software Security, Network Security, Security
Steps You Might Take to Keep Your Laptop Running
March 3, 2010   Comments
Topics: Microsoft Windows 7, User Interface (UI), Programming, Operating Systems, Server
Good News; Surprising News
March 1, 2010   Comments
Topics: Other IT, Certification
Windows 7: Status Update at Month 1
February 24, 2010   Comments
Topics: Information Technology, Microsoft Windows 7, Operating Systems, Server
You know me--Right???
February 24, 2010   Comments
Topics: Software Security, Information Technology, Network Security, Security
So Far So Good
February 2, 2010   Comments
Topics: Upgrading & Repairing, Microsoft Windows 7, Hardware, Operating Systems, Server
Win 7, something to talk about.
January 31, 2010   Comments
Topics: Home & Office Computing, Microsoft Windows 7, Operating Systems, Server
Out with the Old; In with the New
January 3, 2010   Comments
Topics: Software Security, Information Technology, Open Source, Network Security, Other IT, Certification, Security
Facebook does an About Face--of sorts
December 15, 2009   Comments
Topics: Software Security, Networking, Network Security, Security, Other Networking
Sharing Information Can Bring a Share of Problems
December 10, 2009   Comments
Topics: Other Applications, Home & Office Computing, Information Technology, Networking, Network Security, Other IT, Certification, Security, Other Networking, Business & Management
You Can Check Out Any Time You Like, But You Can Never Leave
December 8, 2009   Comments
Topics: Software Development & Management, Web Services, Web Development, Security
Social Networking--Or Else!
December 6, 2009   Comments
Topics: Other Applications, Home & Office Computing, Information Technology, Networking, Other IT, Certification, Other Networking, Process Improvement
DeTwitting-UnSocial Networking Redux
November 29, 2009   Comments
Topics: Information Technology, Security, Process Improvement
Predictions and Predilections
November 23, 2009   Comments
Topics: Information Technology, Software Development & Management, Programming, Open Source, Web Services, Networking, Web Development, Certification, Security, Operating Systems, Server, Process Improvement, Business & Management
Social Networking for the Anti-Socialites
November 11, 2009   Comments
Topics: Home & Office Computing, Networking, Security, Other Networking
Out of Sight
August 29, 2009   Comments
Topics: Home & Office Computing, Information Technology, Storage, Networking, Network Security, Security, Other Networking
Great password information at a small price
June 13, 2009   Comments
Topics: Software Security, Access, Network Security, Data, Security
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part IV
May 27, 2009   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, Software Security, Microsoft Servers, Information Technology, Programming, Graphics & Web Design, Network Security, Microsoft Windows Vista & Home Server, Security, Hardware, Microsoft Applications, MAC OS X/Other, Operating Systems, Server
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part V
May 27, 2009   Comments
Topics: Other Applications, Upgrading & Repairing, Home & Office Computing, General Engineering & Hardware, Microsoft Servers, Information Technology, Programming, Engineering, Microsoft Windows Vista & Home Server, Hardware, Linux/UNIX/Open Source, Microsoft Applications, MAC OS X/Other, Operating Systems, Server
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part III
May 27, 2009   Comments
Topics: Upgrading & Repairing, Software Security, Microsoft Servers, Information Technology, Software Development & Management, Programming, Microsoft Windows Vista & Home Server, Security, Hardware, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part I
May 24, 2009   Comments
Topics: Other Applications, Graphic Programming, Home & Office Computing, Microsoft Servers, Information Technology, Programming, Windows Programming, Microsoft Windows Vista & Home Server, C/C++, Linux/UNIX/Open Source, Microsoft Applications, MAC OS X/Other, Operating Systems, Server
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part II
May 24, 2009   Comments
Topics: Home & Office Computing, Microsoft Servers, Information Technology, Programming, Windows Programming, Microsoft Windows Vista & Home Server, Microsoft Applications, MAC OS X/Other, Operating Systems, Server
Embedded finesse
May 24, 2009   Comments
Topics: Software Security, Security
Casting Out Daemons
February 9, 2009   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Software Security, Microsoft Windows Vista & Home Server, Security, Hardware, Operating Systems, Server
Step 1: Legislation
January 26, 2009   Comments
Topics: Software Security, Software Development & Management, Programming, Security
Approaching People Versus Technical Approaches: More 2009 Security Predictions
January 10, 2009   Comments
Topics: Software Security, Information Technology, Network Security, Security
Are Intrusion Studies Worth the Money? Still more 2009 predictions
January 10, 2009   Comments
Topics: Software Security, Network Security, Security
Browser Password Managers
January 4, 2009   Comments
Topics: Software Security, Programming, Network Security, Web Development, Web Services/ XML/ SOA/ WebSphere/ WCF, Security
2009 Security Predictions: Part II
January 4, 2009   Comments
Topics: Software Security, Information Technology, Network Security, Security, Business & Management
2009 Info Security Predictions: Part I
December 28, 2008   Comments
Topics: Other Applications, Home & Office Computing, Software Security, Software Development & Management, Programming, Java, Open Source, Windows Programming, Network Security, Microsoft Windows Vista & Home Server, C/C++, Data, Security, Linux/UNIX/Open Source, MAC OS X/Other, Operating Systems, Server
Year End Ideas
December 24, 2008   Comments
Topics: Software Security, Network Security, Security
Another semester done: Lessons Learned for me
December 14, 2008   Comments
Topics: Home & Office Computing, Programming, Windows Programming, Certification, Microsoft Applications
This Internet Thing! It's so Invasive!
December 14, 2008   Comments
Topics: Software Security, Information Technology, Networking, Network Security, Wireless/High Speed/Optical, Routing & Switching, Security, Other Networking
Embedded Woes part II
November 25, 2008   Comments
Topics: Software Security, Software Development & Management, Programming, Network Security, Security
Duty-Loaf designs and Security
November 15, 2008   Comments
Topics: Network Security, Security
The People Side
November 15, 2008   Comments
Topics: Security
Embedded Security Woes: Part 1
October 26, 2008   Comments
Topics: Software Security, Information Technology, Software Development & Management, Programming, Networking, Network Security, C/C++, Security, Hardware
NICE Security Site
October 12, 2008   Comments
Topics: Software Security, Network Security, Security
Learn Silverlight during Lunch
October 12, 2008   Comments
Topics: Graphic Programming, User Interface (UI), Programming, Windows Programming
Zune has finally arrived...None too soon
October 12, 2008   Comments
Topics: Software Development & Management, Programming, Windows Programming, Hardware
Nice features in Visual Studio 2008
October 4, 2008   Comments
Topics: Software Development & Management
More Embedded Basics
October 4, 2008   Comments
Topics: Software Security, Software Development & Management, Networking, Network Security, Security
Embedded? We don't need no stinkin' embedded devices
September 1, 2008   Comments
Topics: Upgrading & Repairing, General Engineering & Hardware, Engineering, Hardware, Communications Engineering, Semiconductor Technologies
The case for embedded anything
August 25, 2008   Comments
Topics: Software Security, Networking, Network Security, Engineering, Security, Communications Engineering, Semiconductor Technologies
One for All or All for one purpose?
August 10, 2008   Comments
Topics: Networking, Network Security, Wireless/High Speed/Optical, Security
New sparks for a smokin' good time
August 3, 2008   Comments
Topics: Programming, Windows Programming, Hardware
Appliances Equal Ready-Made Security Risks
July 27, 2008   Comments
Topics: Software Security, Networking, Network Security, Security, Linux/UNIX/Open Source, Operating Systems, Server
Vrtually Impossible
July 20, 2008   Comments
Topics: Upgrading & Repairing, Software Security, Network Security, Security, Hardware
Hacking as a Service (HaaS)
July 17, 2008   Comments
Topics: Software Security, Network Security, Security
Gary McGraw Does IT Again
July 9, 2008   Comments
Topics: Software Security, Information Technology, Programming, Open Source, Network Security, Security
P2P Piloting Your Car
July 9, 2008   Comments
Topics: General Engineering & Hardware, Software Security, Information Technology, Programming, Networking, Network Security, Engineering, Routing & Switching, Security, Communications Engineering, Other Networking, Semiconductor Technologies, Process Improvement
Computer Welt
June 28, 2008   Comments
Topics: Software Security, Information Technology, Software Development & Management, Programming, Open Source, Networking, Windows Programming, Network Security, Wireless/High Speed/Optical, C/C++, Web Development, Routing & Switching, Security, Linux/UNIX/Open Source, Other Networking, MAC OS X/Other, Operating Systems, Server, Process Improvement
Old technology and Nostalgia
June 24, 2008   Comments
Topics: Upgrading & Repairing, Home & Office Computing, Information Technology, Engineering, Hardware, Semiconductor Technologies, Process Improvement, Business & Management
Monitoring versus Privacy Rights?
June 24, 2008   Comments
Topics: Software Security, Information Technology, Networking, Network Security, Security, Voice/IP Communications
Independence from Clunky, Kludgy Forms of Input
June 22, 2008   Comments
Topics: Software Security, Information Technology, User Interface (UI), Programming, Windows Programming, Microsoft Windows Vista & Home Server, Security, Operating Systems, Server, Process Improvement
Need help from InformIT Readers
March 30, 2008   Comments
Topics: Hardware
guard your CISSP status
March 30, 2008   Comments
Topics: Other IT, Certification, Other Non-Technical
Application security--the new unknown
March 29, 2008   Comments
Topics: Software Security, Network Security, Security
Where is the computer?
March 29, 2008   Comments
Topics: Software Security, Network Security, Security
Hack a Mac: New Pressures @ CanSecWest
March 29, 2008   Comments
Topics: Software Security, Network Security, Security
Marcus Ranum has engaging security postings
March 29, 2008   Comments
Topics: Software Security, Network Security, Security
MVP again, with work, and Visual Studio 2008
January 16, 2008   Comments
Topics: Computer Science, Programming, Windows Programming
Physical security is Information Security
January 16, 2008   Comments
Topics: Software Security, Network Security, Security, Process Improvement
2008 Security predictions
January 2, 2008   Comments
Topics: Home & Office Computing, Software Security, Computer Science, Programming, Open Source, Network Security, Data, Security, Operating Systems, Server, Process Improvement, Business & Management
Compact Irony
December 24, 2007   Comments
Topics: Network Security, Security
Giving Back: Act II
December 24, 2007   Comments
Topics: Networking, Network Security, Other IT, Certification, Security, Other Networking
Closed goes Open?
October 6, 2007   Comments
Topics: Software Security, Programming, Windows Programming, Security
Giving Back
October 6, 2007   Comments
Topics: Network Security, Security
Open Source Security
August 21, 2007   Comments
Topics: Open Source
Are Certifications Worth It?
August 18, 2007   Comments
Topics: Other IT, Certification, Other Non-Technical
VB goodies
August 18, 2007   Comments
Topics: Programming, Windows Programming

John Traenkenschuh