/build/static/layout/Breadcrumb_cap_w.png

Blog Posts by scriptingninja

Ask a question

Follow Nick the Ninja on Twitter

Are you a system administrator or just interested in the latest and greatest in technology? If so, follow @NicktheITNinja. Nick has a wide range of interest as it relates to technology and who knows, he might even become an excellect source of IT Tips and Tricks! 
Be the first to comment

KACE Boot Kamp 2019

Classrooms in a city near you!

Don’t miss the fun and educational event that will enable you to not only extract maximum benefit from your KACE Appliance, but also gain advice for using KACE in your environment — directly from the experts. You'll also get to know your fellow users in the local KACE community, and in many cases- attendees benefit from minimal travel expenses and time away from the office.

We want you to learn all the latest tricks and tips for using your KACE Systems Management Appliance. That’s why we’re bringing our popular training to you. Register today for multiple days of instructor-led training that will refresh or enhance your skill set and empower you to save even more time and money with your KACE Systems Management Appliance.


Is Backyard Boot Kamp right for you?

Backyard Boot Kamp is designed specifically for new users, or those desiring a skills refresh. They are not generally intended for advanced KACE users. Backyard Boot Kamp training is usually best attended by:

  • New team members who did not attend their company's initial training
  • Customers seeking overall product knowledge
  • Customers who haven't used the appliance in some time
  • Customers that prefer to practice and learn in a non-production environment
  • Customers preparing to implement new features that were previously not in use
  • Customers seeking to gain new knowledge and experience


Training Topics:

  • Agent & Agentless Inventory
  • Label Management
  • Software Distribution
  • Patch & Update Management
  • Assets Management
  • Security
  • User Console
  • Service Desk
  • Scripting
  • Reporting
  • And More!


Backyard Boot Kamp Dates and Location:

Date

   Location

Address

March 5-8

  Austin

14205 North MoPac Express Way, Suite 500,
Austin, Texas 78728

April 9-12

  Atlanta

1000 Abernathy Road NE, Building 400, Suite 194,
Atlanta, Georgia 30328

May 21-24

  Phoenix

2200 North Central Avenue, Suite 400,
Phoenix, Arizona 85004

June 18-21

  Salt Lake City  

1148 West Legacy Crossing Blvd., Suite 200,
Centerville, Utah 84014

July 9-12 

  LA

222 North Pacific Coast Highway, Suite 1240,
El Segundo, California 90245

July 30-2

  Dallas

5430 Lyndon B Johnson Freeway, Three Lincoln Centre Tower, Suite 300,
Dallas, Texas 75240

August 20-23

  Boston

25 Burlington Mall Road, Suite 204,
Burlington, Massachusetts 01803


Interested in learning more?

Checkout http://www.kacebootkamp.com or contact your sales representative for more info.


Looking for something more focused, or on your appliance? Consulting and Remote Implementation can be remotely delivered and customized to fit your goals. For additional information, please email bootkamp@quest.com

 


Be the first to comment

Are you a physically fit ITNinja?

ITNinja's are you into cycling and or running for fitness or even find yourself competing on the weekends? If so, I have been giving the ok to make available for a limited time some ITNinja branded gear. I have already designed a cycling jersey and am working on a short sleeve running top. Cost will depend ultimately on how many people purchase. Below is roughly the cost per jersey at different quantities. 

3-5: $85.00

6-24: $79.00

25-49: $69.00

Cycling Jersey Design

Store Link: http://shop.jakroo.com/ITNINJA

Once again, at this time I only have the design finished for the cycling jersey but the running shirts should be available to order by 2/14/2014. So what are you waiting for, take advantage of the limited (ORDERING WILL CLOSE 2/28/2014) run of cycling jerseys and represent like the geeks we are!

Running shirt design!

View comments (9)

KACE on Bacon

Is everything better with bacon?

Be the first to comment

MS TechEd 2013 - Securing Windows 8 Clients and Resources from Threats

*WARNING* Now the definition of this session made me think that it was going to be a session going into how you can secure Windows 8 from threats however, it really was a sales pitch of what feature Windows 8 has added into in for increased security.

Microsoft has made the decision to invest in four core areas:

  • Malware Resistance
  • Protect Sensitive Data
  • Modern Access Control
  • Trustworthly Hardware

Presentor spoke to one sepcific Malware Challenges that MS is currently facing is that Malware has the ability to interact with the pc prior to the completion of loading windows. This is one main reasons why MS is putting so much efforts into UEFI. Now its important to understand that UEFI isn't a MS technology rather a industry standard. Key benefits of UEFI that were outlined are:

  • Architecture-Indendency
  • Enables the device initialization and operation (mouse, pre-os apps, and menus)
  • UEFI firmware cannot be rolled back unlike legacy system.

Microsoft has also made the decision that TPM will be a requiement for all hardware that has the Windows logo by end of year.

The speaker also spoke to the fact that although Windows 7 leveraged ASLR and DEP it wasn't widely leveraged in Windows 7. In Windows 8 however, this is not the case because now its more the standard than that of the exception. Addition Windows 8 help makes it harder than ever to create exploits.

Trusted and Measured Boot Feature is Windows 8

Trusted Boot

  • Hardens the end to end boot process
  • Protects all system boot compnents and the anti-malware driver (ELAM)
  • Ensures defenses are running before malware get the chance to start
  • Automatic remediation/self healing if compromised.

Measure Boot

  • Comprehensive set of integrity measurements
  • Measurements can be offered to a Remote Attestation Service for analysis

So a review of how this all works now with Windows 8. Basically with the use of UEFI, TPM, Truted Boot, and Measure Boort allows for protection from power up of the hardware.

Now what about sign-in sercurity features in Windows 8.

PIN vs Picture, both very secure but the important thing to remember is that picture passwords are very easily seen by nearby users.

Windows 8 Firewall

Microsoft feels like they have no need to make any changes to Win8 Firewall because they have kept up throughtout the years with windows firwall needs.

Attestation & Verification

Microsoft 8 is basically putting this on the shoulders of 3rd party vendors as of now. Why? The speaker spoke to it but didn't come right out and say it but, basically they aren't sold off on the fact that Windows 8 is going to be bought into. So they don't want to spend development time on the feature.

Current companies that help fill the gap currently:

Windows 8 Security Wrap-Up

To sum it up, Windows 8 is MS shinning new toy that has all of its new security functionality.

 

 

 

Be the first to comment
Showing 1 - 5 of 12 results

Top Contributors

Talk About Mac OS X