Category Archives: technology

Symantec’s CleanWipe Removes AntiVirus

Symantec’s CleanWipe is a tool that is used to prepare or clean a Windows computer before you install Symantec Endpoint Protection, or to completely remove any instance of Syamantec Antivirus. The tool comes as a executable file that unzips its contents into a folder and then runs. The password for this self-extracting executable usually is “symantec” (no quotes, all lower case).If nothing else is working when trying to remove a stuck install of a Symantec Antivirus product, CleanWipe can usually get the job done. CleanWipe…


Read MOre »

Matlab Command Clips

Some matlab command clips from the notebook. Most also work in R and Octave datetick(‘x’,’HH:MM:SS’,’keepticks’) Normalizes display of time stamps to hour minute second hold all allows keeping graphed numbers on an exsiting display while adding more hold off starts a fresh graph axis square makes the size of the x and y axes the same clear all clear screen, varibales ,etc who lists all variables in the workspace CTRL-C Breaks current process, stops runaway processes clc clear command window

Read MOre »

Mgmt Info Sec Notes Week1

1. List and describe an organization’s three communities of interest that engage in efforts to solve InfoSec problems. Give two or three examples of who might be in each community. The three defined communities are decision makers in Information security, Information technology and non-technical staff. Examples of Information security professionals could include a risk manager or the CISO. The information technology group could include the CIO or a systems administrator. Some examples of Non-technical members could be the CEO or the Director of Human Resources.…

Read MOre »

Mgmt Info Sec Chap 5 Notes

1. What is an information security program? An information security program describes the structure and organization of the effort that strives to contain the risks to the information assets of a company. 2. What functions constitute a complete information security program? A complete information security program is unique to the company, and takes into account business goals and the overall strategic plan, but still balances the need for protecting the assets of the organization. 3. What organizational variables can influence the size and composition of…

Read MOre »

Mgmt InfoSec Notes ch 3

1. What is an information security framework? A framework is an outline of security controls that is part of creating or implementing a security model. The blueprint is based off of the framework, containing more detail on controls in place and controls that are needed. 3. What is a security model? A security model is a generic blueprint that assists in creating a working security plan. 5. What is access control? Access control enables an organization to define and regulate access to data, and is…

Read MOre »