View RSS Feed

JDMurray's Blog at www.TechExams.Net

A collection of IT certification-related articles created to aide the members and visitors of Added to at irregular intervals. Constructive comment always welcome.

  1. Making Hash Sets from VMware Virtual Machines

    by , 01-21-2011 at 05:22 PM (JDMurray's Blog at www.TechExams.Net)
    A hash set is a listing of cryptographic hashes made from specific sets of files found on an electronic storage system. A hash is a unique digital fingerprint of a file used to identify the file without the need of examining the file's contents. Hash sets are very useful for quickly identifying files that you wish to exclude (black listing), ignore (white listing), or determine to be unidentified and therefore require further investigation.

    Hash sets may be made from files found on ...
  2. Computer Forensics Certifications

    by , 12-18-2010 at 11:26 PM (JDMurray's Blog at www.TechExams.Net)
    Computer forensics (a.k.a., digital forensics ) is a very highly specialize area of Information Technology used to locate, copy, analyze, and document information present on electronic storage systems for presentation in a court of law. The computer forensic community has a high regard for certifications as a way to demonstrate knowledge and experience with forensic procedures and best practices, and with specific tools related to performing computer forensics investigations.

    Many ...
  3. IT Certifications and DoD Directive 8570.01-M

    by , 02-17-2010 at 07:56 PM (JDMurray's Blog at www.TechExams.Net)
    The United States Department of Defense (US DoD) Directive 8570.01-M is a set of guidelines and procedures for the training, certification, and management of the DoD Information Assurance (IA) workforce conducting Information Assurance (IA) functions.

    According to the DoD Directive 8570 IAT FAQ, the long-term goal of DoD 8570.01 is the creation of a sustained, professional Information Assurance workforce possessing the knowledge and skills to effectively prevent and respond to attacks ...
  4. CWTS Certified Wireless Technology Specialist Official Study Guide

    by , 11-14-2009 at 08:07 PM (JDMurray's Blog at www.TechExams.Net)
    The CWTS Certified Wireless Technology Specialist Official Study Guide by Robert Bartz and published by Sybex (1st Edition, June 2009, ISBN 0470438894) is the official study material designed to prepare the reader for passing the CWTS (PW0-070) exam and obtaining the CWTS® Certified Wireless Technology Specialist certification from CWNP. In this article, I have a look at this study guide, determine how comprehensive it is to the CWTS exam, and make a very subjective determination if it is, in fact, ...
  5. In Soviet Russia, TrueCrypt Encrypts You!

    by , 08-16-2009 at 09:15 PM (JDMurray's Blog at www.TechExams.Net)
    This is a “Don't let this happen to you!” blog article.

    TrueCrypt is a wonderful, free program for encrypting and password-protecting devices with file systems, such as hard drives and USB memory sticks. However, throw bad disk sectors and no data backups into this mix and you may experience much “wailing and gnashing of teeth.” Read on…

    I have several old Dell laptops that I use mostly for lab work, studying for IT certifications, and travel. I have a lot of stuff that ...
Page 4 of 10 First 1234 5678 ... Last