Home > Authors

John Traenkenschuh

John Traenkenschuh is a Technology Specialist at a manufacturing company in the Fortune 50. His work with computing and networking stretches back to his 1975 experiences, during Upward Bound, a summer program for disadvantaged kids. As a high school teacher, he assembled the school district’s first word processing lab from discarded TRS Model 80’s. Now, a few companies and jobs later, he has earned the CISSP-ISSAP, with complementary Certified Check Point Security Administrator/Engineer (CCSA/CCSE) designations, useful when volunteering as Project Manager and primary author for the Center for Internet Security’s Check Point Firewall benchmark. Never far from teaching, John instructs Business and Finance majors on the beauties of Visual Basic .NET at a Midwest University, rated in the Top 10 by the U.S. News and World Report annual survey. This work has earned him the Most Valuable Professional designation from Microsoft itself. A dedicated, hyperactive Information Security and IT Professional, his goal is to improve integration between IT technologies and people, whose lives depend on them.

1.
Prevent an APT (Advanced Persistent Threat ) Attack Now!
Nov 25, 2013
2.
Secure Your Embedded Systems Now!
Oct 24, 2013
3.
Secure Your Android Kindle or Nook Tablet Now!
Oct 3, 2013
4.
VirtualBox: Making the Most of Any Operating System You Choose
Mar 7, 2012
5.
Making New Linux Workstations from Old Windows Machines
Feb 29, 2012
6.
Secure Your iPad 2 Now!
Dec 28, 2011
7.
Secure Your Linux Workstation Now!
Dec 12, 2011
8.
Secure Your Mac OS X System Now!
Nov 15, 2011
9.
Secure Your Windows 7 System Now!
Mar 9, 2011
10.
Secure Your Facebook Account Now!
Mar 2, 2011
11.
Secure Your Android" Phone Now!
Feb 23, 2011
12.
Passwords: So Important, Yet So Misused
May 1, 2009
13.
Creating Apps for New Markets: Exploring the PocketPC Platform
Dec 21, 2007
14.
Text File Operations in .NET
Dec 14, 2007
15.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
16.
Zune: Reflections on the First Generation
Oct 12, 2007
17.
Seven Steps to Improving Your VB Code
Aug 17, 2007
18.
Moka5: Virtualization in Your Pocket
Mar 16, 2007
19.
SSH Security Primer: Server Security Settings
Feb 23, 2007
20.
SSH Security Primer: Client Security
Feb 16, 2007
21.
Security on a Dime: Low-Cost Alternatives to SSH
Jan 5, 2007
22.
Windows Media Encoder: Quality Video Training Done on the Cheap
Sep 29, 2006
23.
Mitigating the Security Risks of SSH
Aug 25, 2006
24.
Virtual PC and VMware: A Comparative Review
Jun 16, 2006
25.
SSH Issues: Does Installing SSH Enable More Exploits Than it Solves?
May 26, 2006
26.
Learning Linux the Easy Way - With Cygwin
May 4, 2006
27.
Rsyncing to New Heights in Linux Lore
Apr 21, 2006
28.
Visual Basic 2005: Maximizing the VB Experience with New and Old Features
Oct 28, 2005
29.
Faster Coding with the "My" Object in Visual Basic 2005
Oct 6, 2005
30.
Design and Install the Perfect PC—On Your Mac
Aug 12, 2005
31.
Evaluating Your Firewall
Feb 11, 2005
32.
UNIX Key Security
Apr 30, 2004
33.
UNIX Security 101
Sep 26, 2003

RSS Feed   Subscribe     RSS details

Risk Management Versus Vulnerability Analysis
Oct 21, 2014 Comments
Topics: Software Security, Security, Network Security, General Security and Privacy
Thank you for catching up, iPhone and others
Sep 27, 2014 Comments
Topics: Upgrading & Repairing, Sales & Marketing, Personal Development, Management & Strategy, Information Management, Human Resources, Hardware, Global Business, General Business, Finance & Investing, Business Applications, Business & Management
Which new phone is best?
Sep 21, 2014 Comments
Topics: Windows Phone, Networking, Mobile Application Development & Programming, iOS, HTML5 & Web Standards, Data, Business Applications, Business & Management, Android
1830 wasn't so long ago
Sep 18, 2014 Comments
Topics: Information Technology, Global Business, Engineering, Data, Communications Engineering, Business & Management, Access
I’m ready, but the United State’s infrastructure is not.
Sep 17, 2014 Comments
Topics: Data, Access
Windows 9 When?
Sep 1, 2014 Comments
Topics: Windows Phone, Other Applications, Mobile Application Development & Programming, Microsoft Windows Vista & Home Server, Microsoft Windows Desktop, Microsoft Applications, Home & Office Computing
Ethical Hacker
Jul 29, 2014 Comments
Topics: Software Security, Security, Network Security, General Security and Privacy
How Long?
Jul 29, 2014 Comments
Topics: Software Security, Security, Network Security, General Security and Privacy
What would it take to sell you this Surface Pro 3 today?
Jun 29, 2014 Comments
Topics: Business Applications, Business & Management
Gone with the passwords
Jun 22, 2014 Comments
Topics: Web Services, The Web/Virtual Worlds/Social Networking, Storage, Software Security, Software Development & Management, SOA, Security, Process Improvement, Other Applications, Open Source, Networking, Network Security, Mobile Application Development & Programming, Management & Strategy, Information Technology, Information Management, Information Management, Home & Office Computing, Global Business, General Security and Privacy, DB2, Data Analytics and Visualization, Data, Cloud Computing, BusinessObjects/Crystal Reports, Business Applications, Business & Management, Access
OpenSSL: More Problems. Again.
Jun 6, 2014 Comments
Topics: Software Security, Security, Programming, Process Improvement, Open Source, Network Security, Linux/UNIX/Open Source Operating Systems, Information Technology, Information Management, General Security and Privacy, Finance & Investing, Business Applications, Business & Management
Everything You've Heard is True
Jun 3, 2014 Comments
Topics: Software Security, Security, Open Source, General Security and Privacy, Data, Business Applications, Business & Management, Access
Human Telematics II
May 15, 2014 Comments
Topics: Upgrading & Repairing, Mobile Application Development & Programming, Information Technology, Hardware, General Engineering & Hardware, Engineering, Communications Engineering
Heartbleed? You're too late.
Apr 11, 2014 Comments
Topics: Web Services, Web Development, The Web/Virtual Worlds/Social Networking, Software Security, Software Development & Management, Security, Sales & Marketing, Programming, Open Source, Networking, Network Security, Network Design & Architecture, Network Administration & Management, Linux/UNIX/Open Source Operating Systems, Information Technology, HTML/CSS, Home & Office Computing, General Security and Privacy, General Business, Data, Cloud Computing, Business & Management, Architecture and Design
Spot the Hacker (Part I)
Mar 25, 2014 Comments
Topics: Software Security, Security, Networking, Network Security, Management & Strategy, Information Technology, Information Management, Home & Office Computing, Global Business, General Security and Privacy, Business & Management
My iMovie is here, and it looks great!
Mar 20, 2014 Comments
Topics: Video Editing, Microsoft Expression Studio, Information Management, Home & Office Computing, Graphics & Web Design, Business & Management, Apple
Human Telematics v2
Feb 6, 2014 Comments
Topics: Software Security, Security, Network Security, Information Technology, Information Management, Information Management, General Security and Privacy, Data Analytics and Visualization, Data, Business Applications, Business & Management
Should You Share Your Fitness Information?
Jan 26, 2014 Comments
Topics: Web Services, Virtualization, Storage, SQL Server, Security, Networking, Information Management, General Security and Privacy, FileMaker, DB2, Data Analytics and Visualization, Data, Cloud Computing, BusinessObjects/Crystal Reports, Access
It was 20 years ago today: Data Migration Strategy II
Dec 26, 2013 Comments
Topics: SQL Server, SQL, Software Security, Security, SAP, Sales & Marketing, Personal Development, Oracle, Network Security, MySQL, Management & Strategy, Information Management, Information Management, Human Resources, Global Business, General Security and Privacy, General Business, Finance & Investing, FileMaker, DB2, Data Analytics and Visualization, Data, BusinessObjects/Crystal Reports, Business Applications, Business & Management, Access
And the People were Heard
Dec 15, 2013 Comments
Topics: Windows Phone, Mobile Application Development & Programming, Microsoft Windows Vista & Home Server, Microsoft Windows Server, Microsoft Windows Desktop, Microsoft Applications, Home & Office Computing
What is your data migration strategy?
Nov 13, 2013 Comments
Topics: Web Services, Video Editing, Upgrading & Repairing, Software Security, Security, Photoshop & Adobe, Personal Development, Operating Systems, Server, Network Security, Microsoft Expression Studio, Management & Strategy, MAC OS X/Other, Mac OS X, Information Management, Information Management, Home & Office Computing, Hardware, Graphics & Web Design, General Security and Privacy, Dreamweaver & Flash, Data, Cloud Computing, Business Applications, Business & Management, Apple, Access
New Operating System Upgrades--And the winner is . . .
Nov 2, 2013 Comments
Topics: Upgrading & Repairing, Software Security, Security, Operating Systems, Server, Networking, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows Server, Microsoft Windows Desktop, Microsoft Windows Desktop, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Mac OS X, Information Technology, Home Networking, Home & Office Computing, Hardware, General Security and Privacy, Data, Apple, Access
Email Compromised; What Now?
Oct 29, 2013 Comments
Topics: Software Security, Security, Process Improvement, Network Security, Information Technology, Home & Office Computing, General Security and Privacy, eBay/Yahoo/Google, Data, Access
Windows 9 Final Ideas
Sep 11, 2013 Comments
Topics: Upgrading & Repairing, Process Improvement, Other Applications, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Home & Office Computing, Hardware
More Compelling Windows 9 Features
Aug 16, 2013 Comments
Topics: Windows Programming, Upgrading & Repairing, Software Security, Software Development & Management, Security, Programming, Process Improvement, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, Information Technology, Home & Office Computing, Hardware
Compelling Windows 9 features
Aug 12, 2013 Comments
Topics: User Interface (UI), Software Security, Software Development & Management, Security, Programming, Process Improvement, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Certification, Graphic Programming, Certification
I'm done playing; can I have my real computer back?
Aug 9, 2013 Comments
Topics: Upgrading & Repairing, Other Applications, Microsoft Applications, Information Technology, Home & Office Computing, Hardware
Computer Service is Car Service Part 3
Aug 3, 2013 Comments
Topics: Upgrading & Repairing, Software Security, Security, Programming, Operating Systems, Server, Networking, Network Security, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing, Hardware, Engineering
Computer Service is Car Service Part 1
Aug 3, 2013 Comments
Topics: Software Development & Management, Information Technology, Hardware
Computer Service is Car Service Part 2
Aug 3, 2013 Comments
Topics: Upgrading & Repairing, Programming, Process Improvement, Operating Systems, Server, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Hardware
If a person steals a car and calls it Research?
Jul 9, 2013 Comments
Topics: Software Security, Security, Network Security
In the Nook of time...
Jun 23, 2013 Comments
Topics: Upgrading & Repairing, Home & Office Computing, Hardware
Java--Then and Now
Jun 21, 2013 Comments
Topics: Web Services/ XML/ SOA/ WebSphere/ WCF, User Interface (UI), Programming, Java
Fake ID's--40 Years later
Jun 21, 2013 Comments
Topics: Software Security, Software Development & Management, Security, Other IT, Network Security, Certification
Google Wallet? For a motorhome?
Jun 10, 2013 Comments
Topics: Software Security, Security, Network Security
How do you respond to shutting down a botnet?
Jun 9, 2013 Comments
Topics: Software Security, Security, Network Security, Business & Management
Bring IT; I'm ready
Apr 6, 2013 Comments
Topics: Security, Process Improvement, Network Security, Information Technology, Home & Office Computing
Back on facebook--or is he?
Jan 27, 2013 Comments
Topics: Software Security, Security, Network Security
Bricks and Mortar--Still Compelling
Jan 24, 2013 Comments
Topics: Open Source, Information Technology, Home & Office Computing, Engineering, Certification, Business & Management
You can check out, but you cannot easily leave...
Jan 13, 2013 Comments
Topics: Software Security, Security, Other Networking, Networking, Network Security
Why we have current problems
Jan 8, 2013 Comments
Topics: Software Security, Security, Network Security
You have deactivated your facebook account
Jan 8, 2013 Comments
Topics: Software Security, Security, Networking, Network Security, Information Technology, Data
It's now a true race...
Dec 28, 2012 Comments
Topics: Information Technology
Warm Kindling
Dec 27, 2012 Comments
Topics: Upgrading & Repairing, Storage, Other Applications, Networking, Information Technology, Home & Office Computing, Hardware
Want a Happy Holiday? Spend it with Donald Knuth...
Dec 24, 2012 Comments
Topics: Six Sigma and Process Improvement, Information Technology, General Engineering & Hardware, Engineering, Communications Engineering
Hacking and Attacks and Now What???
Dec 4, 2012 Comments
Topics: Software Security, Security, Network Security, Business & Management
Security Street Smarts
Dec 3, 2012 Comments
Topics: Software Security, Security, Other Applications, Network Security, Microsoft Applications, Home & Office Computing
Sandy Aftermath
Dec 2, 2012 Comments
Topics: Software Security, Security, Network Security, Business & Management
I'm not supposed to like Windows 8.
Nov 21, 2012 Comments
Topics: Operating Systems, Server, Microsoft Windows 7, Microsoft Servers
Windows 8: The Best Is Yet To Come?
Nov 11, 2012 Comments
Topics: Software Security, Security, Programming, Process Improvement, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers, Graphic Programming
Want to Help?
Oct 28, 2012 Comments
Topics: Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers
What Have I Got To Lose?
Oct 27, 2012 Comments
Topics: Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers
Windows 8: Are You Interested?
Oct 26, 2012 Comments
Topics: Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers
Responsible disclosure
Oct 21, 2012 Comments
Topics: Software Security, Software Development & Management, Security, Network Security
Learning is Learning
Oct 21, 2012 Comments
Topics: Process Improvement, Information Technology, Home & Office Computing, Engineering, Communications Engineering
Cheating Vegas and Cheating America
Sep 8, 2012 Comments
Topics: Software Security, Security, Network Security
Ready for your Win 8 Experience?
Sep 8, 2012 Comments
Topics: Software Security, Security, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers, MAC OS X/Other, Linux/UNIX/Open Source
Now you tell me...
Aug 26, 2012 Comments
Topics: Web Services/ XML/ SOA/ WebSphere/ WCF, Software Security, Security, Programming, Network Security, Business & Management
GAO viz. EPA
Aug 23, 2012 Comments
Topics: Software Security, Security, Network Security
Libre Office Update
Aug 18, 2012 Comments
Topics: Software Development & Management, Operating Systems, Server, Linux/UNIX/Open Source, Business & Management
It's not as complex as we might think
Aug 13, 2012 Comments
Topics: Software Security, Security, Network Security
It is time to support and less to debate
Aug 11, 2012 Comments
Topics: Software Security, Security, Network Security, Information Technology
How good are your products? The Internet Knows!!!
Jun 27, 2012 Comments
Topics: Networking, Information Technology, Engineering, Business & Management
Changes to an otherwise normal life
Jun 24, 2012 Comments
Topics: Process Improvement, Networking, Information Technology, Business & Management
Coming back, coming back home
Jun 23, 2012 Comments
Topics: Programming, Operating Systems, Server, Open Source, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers, Microsoft Applications, Information Technology, Home & Office Computing
What Apple and Every Apple Support Professional Must Do
Apr 14, 2012 Comments
Topics: Security, Operating Systems, Server, MAC OS X/Other
Information Technology Musings...
Apr 11, 2012 Comments
Topics: Process Improvement, Information Technology, Certification
Flashbacks On Your Mac?
Apr 9, 2012 Comments
Topics: Software Security, Security, Operating Systems, Server, Network Security, MAC OS X/Other
Post-PC Era--Really???
Mar 8, 2012 Comments
Topics: Upgrading & Repairing, Security, Information Technology, Home & Office Computing, Hardware
Commodities
Mar 7, 2012 Comments
Topics: Software Security, Security, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers, MAC OS X/Other, Linux/UNIX/Open Source, Business & Management
Through the Looking Glass...
Jan 30, 2012 Comments
Topics: Software Security, Security, Network Security
SOPA, PIPA, & NOD
Jan 19, 2012 Comments
Topics: Software Security, Security, Network Security
Just thinking: Risk and Innovation and Governance and Security
Jan 15, 2012 Comments
Topics: Software Security, Security, Network Security
2012 Predictions: Big Brother Seems Smaller + Piranha Attacks
Jan 14, 2012 Comments
Topics: Software Security, Security, Network Security
2012: It's the end of the world and we know it
Jan 8, 2012 Comments
Topics: Software Security, Security, Network Security, Information Technology
2012: I Think I Am Whom?
Jan 8, 2012 Comments
Topics: Software Security, Security, Network Security
Day of the Expanding Man... 2012 Predictions
Dec 30, 2011 Comments
Topics: Other Applications, Information Technology, Home & Office Computing
Is It Really Here?
Dec 19, 2011 Comments
Topics: Software Security, Security, Other Applications, Operating Systems, Server, Open Source, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing
iPad Accessories Bought Dirt Cheap
Oct 31, 2011 Comments
Topics: Upgrading & Repairing, Other Applications, Home & Office Computing, Hardware
Dennis Ritchie--May He Rest in Peace...
Oct 16, 2011 Comments
Topics: Software Security, Software Development & Management, Security, Programming, Operating Systems, Server, Open Source, MAC OS X/Other, Linux/UNIX/Open Source, Java, Home & Office Computing, Engineering, Eclipse, Communications Engineering, C/C++, Business & Management
Remembering Steve Jobs...
Oct 6, 2011 Comments
Topics: Information Technology, Hardware, General Engineering & Hardware, Engineering
Linux Workstation--Where are you???
Oct 5, 2011 Comments
Topics: Upgrading & Repairing, Other Applications, Operating Systems, Server, Open Source, Microsoft Windows Vista & Home Server, Microsoft Windows 7, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing, Hardware
I like ThinApp as a Way to Contain Stupid App Installations
Oct 5, 2011 Comments
Topics: Software Security, Software Development & Management, Security, Process Improvement, Other Applications, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Applications, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing, Business & Management
The Ghost in the Machine
Sep 5, 2011 Comments
Topics: Business & Management
ThinApp: Applying a Thin Wrapper
Sep 5, 2011 Comments
Topics: Web Development, Software Security, Software Development & Management, Security, Programming, Process Improvement, Network Security
VMware's Thinapp gives Big Benefits
Aug 2, 2011 Comments
Topics: Software Security, Software Development & Management, Security, Other Applications, Operating Systems, Server, Network Security, Microsoft Windows 7, Microsoft Servers, Microsoft Applications, Home & Office Computing
2011 07 31 The Weak InSecurity: Comglomerates, Attacks, and Minutia
Jul 31, 2011 Comments
Topics: Software Security, Security, Network Security
Who watches the Watchers?
Jul 30, 2011 Comments
Topics: Software Security, Security, Network Security, Information Technology, Business & Management
What it will be
Jul 25, 2011 Comments
Topics: Software Security, Security, Network Security
Data is Code, and Data--Code
Jul 6, 2011 Comments
Topics: Software Security, Security, Network Security
What is a sandbox and why do you want one?
Jul 6, 2011 Comments
Topics: Software Security, Security, Network Security
2011 06 18 The Weak InSecurity: Bad Tradedowns
Jun 18, 2011 Comments
Topics: Software Security, Security, Network Security
2011 06 12 The Weak InSecurity
Jun 12, 2011 Comments
Topics: Software Security, Security, Network Security
2011 06 05: The Weak InSecurity; One in 20 of you readers is a real loser...
Jun 5, 2011 Comments
Topics: Software Security, Security, Network Security
You're kidding me, right?
May 25, 2011 Comments
Topics: Web Development, Software Security, Software Development & Management, Security, Other Networking, Networking, Network Security
Time to change the old worn out artifacts of your online Life...
May 12, 2011 Comments
Topics: Web Development, User Interface (UI), Software Security, Software Development & Management, Security, Programming, Network Security
2011 05 08 The Weak InSecurity
May 8, 2011 Comments
Topics: Security, Network Security
Something Wicked This Way Comes
May 3, 2011 Comments
Topics: Software Security, Security, Network Security
2011 04 23 The Weak InSecurity
Apr 23, 2011 Comments
Topics: Software Security, Software Development & Management, Security, Network Security
2011 April 11 - The Weak InSecurity
Apr 16, 2011 Comments
Topics: Software Security, Security, Network Security, Information Technology
The weak in Security
Apr 8, 2011 Comments
Topics: Software Security, Security, Network Security
What happened to the Pocket PC?
Apr 8, 2011 Comments
Topics: Windows Programming, Web Development, Software Development & Management, Programming, Microsoft Applications, Home & Office Computing
Windows Security Improvements
Apr 2, 2011 Comments
Topics: Windows Programming, Software Security, Security, Programming, Network Security
Chrome Dome
Apr 2, 2011 Comments
Topics: Software Security, Security, Network Security
$100 Buys a lot of Mobile Workstation
Apr 2, 2011 Comments
Topics: Software Security, Security
Technology Butlers
Mar 27, 2011 Comments
Topics: Semiconductor Technologies, Other Networking, Other Applications, Networking, Home & Office Computing, Hardware, General Engineering & Hardware, Engineering, Communications Engineering
Are You An ISP or Phone Carrier?
Mar 26, 2011 Comments
Topics: Wireless/High Speed/Optical, Voice/IP Communications, Storage, Routing & Switching, Other Networking, Networking
Will This Work?
Mar 22, 2011 Comments
Topics: Information Technology, Home & Office Computing, Hardware, General Engineering & Hardware, Engineering
Are You Sick Yet Well Enough to Know IT?
Mar 20, 2011 Comments
Topics: Security, Network Security, Information Technology, Business & Management
Mobile Platforms: Safe or Risky?
Feb 27, 2011 Comments
Topics: Software Security, Software Development & Management, Security, Networking, Network Security
IT Misfits
Feb 27, 2011 Comments
Topics: Business & Management
Releasing the Hounds of War
Feb 14, 2011 Comments
Topics: Security, Network Security
Smart ways to hack a smartphone
Jan 30, 2011 Comments
Topics: Software Security, Security, Network Security
There's a new Highway in our land...
Jan 26, 2011 Comments
Topics: Process Improvement, Engineering, Communications Engineering, Business & Management
What's Google know about you that you don't?
Jan 8, 2011 Comments
Topics: Web Services, Web Development, SOA, Security, Network Security
What's your life's details worth to you?
Jan 1, 2011 Comments
Topics: Security, Network Security
Worthy Security Goal
Dec 30, 2010 Comments
Topics: Software Security, Security, Network Security
Application 'shielding'
Dec 22, 2010 Comments
Topics: Software Security, Security, Process Improvement, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Windows 7, Microsoft Servers
what you are missing...
Dec 22, 2010 Comments
Topics: Software Security, Security, Network Security
Let it snow, let it snow, let it snow...
Dec 4, 2010 Comments
Topics: Process Improvement, Other Non-Technical, Certification, Business & Management
It must work more simply than this
Dec 1, 2010 Comments
Topics: Upgrading & Repairing, Software Development & Management, Information Technology, Hardware, General Engineering & Hardware, Engineering
Misty water-color memories
Nov 30, 2010 Comments
Topics: Upgrading & Repairing, Software Security, Security, Network Security, Information Technology, Hardware, General Engineering & Hardware, Engineering
There are no secrets III
Nov 20, 2010 Comments
Topics: Voice/IP Communications, Upgrading & Repairing, Software Security, Security, Routing & Switching, Other Networking, Networking, Network Security, Hardware
There are no secrets II
Oct 30, 2010 Comments
Topics: Windows Programming, Web Services/ XML/ SOA/ WebSphere/ WCF, Web Services, Web Development, User Interface (UI), Software Security, SOA, Security, Programming, Other Applications, Network Security, Microsoft Applications, Java, Home & Office Computing, Graphic Programming, Eclipse, C/C++
There are no secrets...
Oct 27, 2010 Comments
Topics: Web Development, Upgrading & Repairing, Software Security, Security, Networking, Network Security, Information Technology, Home & Office Computing, Hardware
Complexity Kills
Oct 26, 2010 Comments
Topics: Web Services, Software Security, Software Development & Management, SOA, Security
The security big picture
Oct 22, 2010 Comments
Topics: Security, Network Security
Great Leaders
Oct 11, 2010 Comments
Topics: Process Improvement, Other Networking, Networking, Information Technology, Business & Management
I Am The Cloud Vendor! Koo Koo Kachew!
Oct 10, 2010 Comments
Topics: Software Security, Security, Other Applications, Network Security, Information Technology, Home & Office Computing, Business & Management
What's the real truth?
Sep 24, 2010 Comments
Topics: Web Development, Software Security, Software Development & Management, Security, Network Security, Information Technology
Did You Know 4.0
Aug 14, 2010 Comments
Topics: Security, Process Improvement, Other Networking, Networking, Certification, Business & Management
For the Summer...
Aug 8, 2010 Comments
Topics: Software Security, Security, Other Non-Technical, Other Networking, Other IT, Networking, Network Security, Information Technology, Certification
How Long?
May 28, 2010 Comments
Topics: Web Services, Other Applications, Networking, Microsoft Applications, Home & Office Computing, Hardware, Business & Management
50 times in a minute
May 2, 2010 Comments
Topics: Software Security, Security, Network Security
How much is your FaceBook account worth?
Apr 27, 2010 Comments
Topics: Software Security, Security, Network Security
Tenent 4: Storing Data? The 90's called...
Apr 25, 2010 Comments
Topics: Software Security, Security, Network Security
Slash & Burn Computing Tenent 3: Separate browsing from other work
Apr 24, 2010 Comments
Topics: Software Security, Security
Slash & Burn Computing Tenent Number 2: Staying Online Persistently Is like Buying a House in a Bad Neighborhood
Apr 5, 2010 Comments
Topics: Software Security, Security, Network Security
Slash & Burn Computing Tenent I: Anything Internet is Similar to Sharing a Toothbrush
Apr 4, 2010 Comments
Topics: Software Security, Security, Network Security
Traenk's new Security Design: Slash & Burn
Apr 3, 2010 Comments
Topics: Software Security, Security
Just how much compter do you really need?
Mar 20, 2010 Comments
Topics: Software Security, Security
Guess who isn't abusing our public information?
Mar 20, 2010 Comments
Topics: Security
Two Tier Fortressing
Mar 17, 2010 Comments
Topics: Software Security, Security, Network Security, Certification
It's Ba-ack!
Mar 13, 2010 Comments
Topics: Upgrading & Repairing, Hardware
Who can it be now?
Mar 3, 2010 Comments
Topics: Software Security, Security, Network Security
Steps You Might Take to Keep Your Laptop Running
Mar 3, 2010 Comments
Topics: User Interface (UI), Programming, Operating Systems, Server, Microsoft Windows 7
Good News; Surprising News
Mar 1, 2010 Comments
Topics: Other IT, Certification
You know me--Right???
Feb 24, 2010 Comments
Topics: Software Security, Security, Network Security, Information Technology
Windows 7: Status Update at Month 1
Feb 24, 2010 Comments
Topics: Operating Systems, Server, Microsoft Windows 7, Information Technology
So Far So Good
Feb 2, 2010 Comments
Topics: Upgrading & Repairing, Operating Systems, Server, Microsoft Windows 7, Hardware
Win 7, something to talk about.
Jan 31, 2010 Comments
Topics: Operating Systems, Server, Microsoft Windows 7, Home & Office Computing
Out with the Old; In with the New
Jan 3, 2010 Comments
Topics: Software Security, Security, Other IT, Open Source, Network Security, Information Technology, Certification
Facebook does an About Face--of sorts
Dec 15, 2009 Comments
Topics: Software Security, Security, Other Networking, Networking, Network Security
Sharing Information Can Bring a Share of Problems
Dec 10, 2009 Comments
Topics: Security, Other Networking, Other IT, Other Applications, Networking, Network Security, Information Technology, Home & Office Computing, Certification, Business & Management
You Can Check Out Any Time You Like, But You Can Never Leave
Dec 8, 2009 Comments
Topics: Web Services, Web Development, Software Development & Management, Security
Social Networking--Or Else!
Dec 6, 2009 Comments
Topics: Process Improvement, Other Networking, Other IT, Other Applications, Networking, Information Technology, Home & Office Computing, Certification
DeTwitting-UnSocial Networking Redux
Nov 29, 2009 Comments
Topics: Security, Process Improvement, Information Technology
Predictions and Predilections
Nov 23, 2009 Comments
Topics: Web Services, Web Development, Software Development & Management, Security, Programming, Process Improvement, Operating Systems, Server, Open Source, Networking, Information Technology, Certification, Business & Management
Social Networking for the Anti-Socialites
Nov 11, 2009 Comments
Topics: Security, Other Networking, Networking, Home & Office Computing
Out of Sight
Aug 29, 2009 Comments
Topics: Storage, Security, Other Networking, Networking, Network Security, Information Technology, Home & Office Computing
Great password information at a small price
Jun 13, 2009 Comments
Topics: Software Security, Security, Network Security, Data, Access
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part V
May 27, 2009 Comments
Topics: Upgrading & Repairing, Programming, Other Applications, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing, Hardware, General Engineering & Hardware, Engineering
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part IV
May 27, 2009 Comments
Topics: Upgrading & Repairing, Software Security, Security, Programming, Other Applications, Operating Systems, Server, Network Security, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Information Technology, Home & Office Computing, Hardware, Graphics & Web Design
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part III
May 27, 2009 Comments
Topics: Upgrading & Repairing, Software Security, Software Development & Management, Security, Programming, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Servers, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Hardware
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part I
May 24, 2009 Comments
Topics: Windows Programming, Programming, Other Applications, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, Home & Office Computing, Graphic Programming, C/C++
It's Here; Put Away Your Pre-Conceptions on What an OS Must Be: Part II
May 24, 2009 Comments
Topics: Windows Programming, Programming, Operating Systems, Server, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Information Technology, Home & Office Computing
Embedded finesse
May 24, 2009 Comments
Topics: Software Security, Security
Casting Out Daemons
Feb 9, 2009 Comments
Topics: Upgrading & Repairing, Software Security, Security, Operating Systems, Server, Microsoft Windows Vista & Home Server, Home & Office Computing, Hardware
Step 1: Legislation
Jan 26, 2009 Comments
Topics: Software Security, Software Development & Management, Security, Programming
Approaching People Versus Technical Approaches: More 2009 Security Predictions
Jan 10, 2009 Comments
Topics: Software Security, Security, Network Security, Information Technology
Are Intrusion Studies Worth the Money? Still more 2009 predictions
Jan 10, 2009 Comments
Topics: Software Security, Security, Network Security
Browser Password Managers
Jan 4, 2009 Comments
Topics: Web Services/ XML/ SOA/ WebSphere/ WCF, Web Development, Software Security, Security, Programming, Network Security
2009 Security Predictions: Part II
Jan 4, 2009 Comments
Topics: Software Security, Security, Network Security, Information Technology, Business & Management
2009 Info Security Predictions: Part I
Dec 28, 2008 Comments
Topics: Windows Programming, Software Security, Software Development & Management, Security, Programming, Other Applications, Operating Systems, Server, Open Source, Network Security, Microsoft Windows Vista & Home Server, MAC OS X/Other, Linux/UNIX/Open Source, Java, Home & Office Computing, Data, C/C++
Year End Ideas
Dec 24, 2008 Comments
Topics: Software Security, Security, Network Security
This Internet Thing! It's so Invasive!
Dec 14, 2008 Comments
Topics: Wireless/High Speed/Optical, Software Security, Security, Routing & Switching, Other Networking, Networking, Network Security, Information Technology
Another semester done: Lessons Learned for me
Dec 14, 2008 Comments
Topics: Windows Programming, Programming, Microsoft Applications, Home & Office Computing, Certification
Embedded Woes part II
Nov 25, 2008 Comments
Topics: Software Security, Software Development & Management, Security, Programming, Network Security
Duty-Loaf designs and Security
Nov 15, 2008 Comments
Topics: Security, Network Security
The People Side
Nov 15, 2008 Comments
Topics: Security
Embedded Security Woes: Part 1
Oct 26, 2008 Comments
Topics: Software Security, Software Development & Management, Security, Programming, Networking, Network Security, Information Technology, Hardware, C/C++
NICE Security Site
Oct 12, 2008 Comments
Topics: Software Security, Security, Network Security
Learn Silverlight during Lunch
Oct 12, 2008 Comments
Topics: Windows Programming, User Interface (UI), Programming, Graphic Programming
Zune has finally arrived...None too soon
Oct 12, 2008 Comments
Topics: Windows Programming, Software Development & Management, Programming, Hardware
Nice features in Visual Studio 2008
Oct 4, 2008 Comments
Topics: Software Development & Management
More Embedded Basics
Oct 4, 2008 Comments
Topics: Software Security, Software Development & Management, Security, Networking, Network Security
Embedded? We don't need no stinkin' embedded devices
Sep 1, 2008 Comments
Topics: Upgrading & Repairing, Semiconductor Technologies, Hardware, General Engineering & Hardware, Engineering, Communications Engineering
The case for embedded anything
Aug 25, 2008 Comments
Topics: Software Security, Semiconductor Technologies, Security, Networking, Network Security, Engineering, Communications Engineering
One for All or All for one purpose?
Aug 10, 2008 Comments
Topics: Wireless/High Speed/Optical, Security, Networking, Network Security
New sparks for a smokin' good time
Aug 3, 2008 Comments
Topics: Windows Programming, Programming, Hardware
Appliances Equal Ready-Made Security Risks
Jul 27, 2008 Comments
Topics: Software Security, Security, Operating Systems, Server, Networking, Network Security, Linux/UNIX/Open Source
Vrtually Impossible
Jul 20, 2008 Comments
Topics: Upgrading & Repairing, Software Security, Security, Network Security, Hardware
Hacking as a Service (HaaS)
Jul 17, 2008 Comments
Topics: Software Security, Security, Network Security
Gary McGraw Does IT Again
Jul 9, 2008 Comments
Topics: Software Security, Security, Programming, Open Source, Network Security, Information Technology
P2P Piloting Your Car
Jul 9, 2008 Comments
Topics: Software Security, Semiconductor Technologies, Security, Routing & Switching, Programming, Process Improvement, Other Networking, Networking, Network Security, Information Technology, General Engineering & Hardware, Engineering, Communications Engineering
Computer Welt
Jun 28, 2008 Comments
Topics: Wireless/High Speed/Optical, Windows Programming, Web Development, Software Security, Software Development & Management, Security, Routing & Switching, Programming, Process Improvement, Other Networking, Operating Systems, Server, Open Source, Networking, Network Security, MAC OS X/Other, Linux/UNIX/Open Source, Information Technology, C/C++
Old technology and Nostalgia
Jun 24, 2008 Comments
Topics: Upgrading & Repairing, Semiconductor Technologies, Process Improvement, Information Technology, Home & Office Computing, Hardware, Engineering, Business & Management
Monitoring versus Privacy Rights?
Jun 24, 2008 Comments
Topics: Voice/IP Communications, Software Security, Security, Networking, Network Security, Information Technology
Independence from Clunky, Kludgy Forms of Input
Jun 22, 2008 Comments
Topics: Windows Programming, User Interface (UI), Software Security, Security, Programming, Process Improvement, Operating Systems, Server, Microsoft Windows Vista & Home Server, Information Technology
Need help from InformIT Readers
Mar 30, 2008 Comments
Topics: Hardware
guard your CISSP status
Mar 30, 2008 Comments
Topics: Other Non-Technical, Other IT, Certification
Application security--the new unknown
Mar 29, 2008 Comments
Topics: Software Security, Security, Network Security
Where is the computer?
Mar 29, 2008 Comments
Topics: Software Security, Security, Network Security
Hack a Mac: New Pressures @ CanSecWest
Mar 29, 2008 Comments
Topics: Software Security, Security, Network Security
Marcus Ranum has engaging security postings
Mar 29, 2008 Comments
Topics: Software Security, Security, Network Security
MVP again, with work, and Visual Studio 2008
Jan 16, 2008 Comments
Topics: Windows Programming, Programming, Computer Science
Physical security is Information Security
Jan 16, 2008 Comments
Topics: Software Security, Security, Process Improvement, Network Security
2008 Security predictions
Jan 2, 2008 Comments
Topics: Software Security, Security, Programming, Process Improvement, Operating Systems, Server, Open Source, Network Security, Home & Office Computing, Data, Computer Science, Business & Management
Compact Irony
Dec 24, 2007 Comments
Topics: Security, Network Security
Giving Back: Act II
Dec 24, 2007 Comments
Topics: Security, Other Networking, Other IT, Networking, Network Security, Certification
Closed goes Open?
Oct 6, 2007 Comments
Topics: Windows Programming, Software Security, Security, Programming
Giving Back
Oct 6, 2007 Comments
Topics: Security, Network Security
Open Source Security
Aug 21, 2007 Comments
Topics: Open Source
Are Certifications Worth It?
Aug 18, 2007 Comments
Topics: Other Non-Technical, Other IT, Certification
VB goodies
Aug 18, 2007 Comments
Topics: Windows Programming, Programming
John Traenkenschuh

John Traenkenschuh