Author Archives: Patrick Botz

A popular password cracking tool was recently updated to handle passwords up to 55 characters in length. The tool, ocl-HashCat-Plus, was previously limited to passwords up to 15 characters long.

Posted in Biometrics, Botz Blog, IBM i Security, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

Thanks everyone that provided feedback on the whitepaper!  An updated version of the whitepaper is now available on the website under “Downloads”.  If you find/found it useful or interesting please send a link to your friends and colleagues!  Thanks again.

Posted in Announcement, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment

Over the summer I’ve helped a number of our customers to implement SSO who, not surprisingly, had a number of users running Windows 7.  I ran into problems with Netserver authentication apparently failing.  But the problems were very perplexing.

Posted in Botz Blog, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

The ongoing NSA snooping saga illustrates an important concept in security; regardless of whether or not the behavior by our government concerns you. Everyone has probably heard the adage that there is no such thing as perfect security. And you … Continue reading

Posted in Botz Blog, Info Security Mgmt, Information Security | Tagged , | Leave a comment

I have a relatively final draft of a whitepaper, A Practical Approach to SSO, for which I am looking for feedback on before officially publishing it.  If you’re interested, you can find it here: http://botzandassociates.com/practical-sso-guide. Thanks for your help!

Posted in Announcement, Botz Blog, Info Security Mgmt, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

I’m psyched that one of my own security idols, Carol Woodbury, has asked me to squash some common Single Sign-On FUD* for once and for all as guest host onher popular “Coffee with Carol” webcast series next week. Gladly!   The … Continue reading

Posted in Announcement, IBM i Security, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

“Former Hostgator employee arrested, charged with rooting 2,700 servers” was the headline of an April 19, 2013 article published by Ars Technica website.  Rooting refers to providing the attacker a way to gain superuser access on a computer system. Doing … Continue reading

Posted in Cloud Security, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , | Leave a comment

This from a LinkedIn group post published on SecurityInfoWatch.com: “In the ever evolving threat landscape that is IT security, some security executives have become so focused on taking an approach that meets compliance requirements that their attention has become diverted … Continue reading

Posted in Compliance, Info Security Mgmt | Tagged , | Leave a comment

How many times have you heard someone say “Nobody would want to attack my computer.”?  I’ve heard it too many times to count. I even hear it from some of the businesses I work with. Well Brian Krebs, author of … Continue reading

Posted in Info Security Mgmt, Information Security, Social Engineering | Tagged , , , , , | Leave a comment

Recently I did a Google search for Kerberos-related problems on V7R1 for IBM i. The results should be useful for lots of IBM i customers using SSO. The first one, SI43918, is in a CUM package. However, some of the … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , | Leave a comment