reddogcomputing.com reddogcomputing.com

reddogcomputing.com

RedDog Computing | Reasonably competent information security consulting

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Security B-Sides Coming to LA in August. Sun, 06/02/2013 - 20:06 vleveque. When: August 22 and 23, 2013. Getting users to understand phishing. Sun, 06/02/2013 - 19:56 vleveque. How do you keep your users from opening dubious emails, and worse, clicking on links or even entering their credentials? ISACA LA on Cloud Security - Feb 12. Wed, 01/30/2013 - 20:51 vleveque. The meeting place is:. The speaker, Todd Barnum, ...

http://www.reddogcomputing.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR REDDOGCOMPUTING.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

November

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.2 out of 5 with 9 reviews
5 star
0
4 star
4
3 star
4
2 star
0
1 star
1

Hey there! Start your review of reddogcomputing.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

2 seconds

FAVICON PREVIEW

  • reddogcomputing.com

    16x16

  • reddogcomputing.com

    32x32

  • reddogcomputing.com

    64x64

  • reddogcomputing.com

    128x128

CONTACTS AT REDDOGCOMPUTING.COM

LEVEQUE, VINCENT

444 N ●●●●●●H BLVD

LOS ●●●●ELES , CA, 90004-3002

US

1.32●●●●2927
1.32●●●●2859
vi●●●●●●●●●●●●●●●@gmail.com

View this contact

null

LEVEQUE, VINCENT

444 N ●●●●●●H BLVD

LOS ●●●●ELES , CA, 90004-3002

US

1.32●●●●2927
1.32●●●●2859
vi●●●●●●●●●●●●●●●@gmail.com

View this contact

Network Solutions, LLC.

Network Solutions, LLC.

13861 Sun●●●●●●●●●ley Drive

He●●on , VA, 20171

US

1.88●●●●9675
cu●●●●●●●●●●●●●@networksolutions.com

View this contact

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

DOMAIN REGISTRATION INFORMATION

REGISTERED
2000 December 01
UPDATED
2012 June 05
EXPIRATION
EXPIRED REGISTER THIS DOMAIN

BUY YOUR DOMAIN

Network Solutions®

DOMAIN AGE

  • 24

    YEARS

  • 6

    MONTHS

  • 5

    DAYS

NAME SERVERS

1
ns1.dreamhost.com
2
ns2.dreamhost.com
3
ns3.dreamhost.com

REGISTRAR

NETWORK SOLUTIONS, LLC.

NETWORK SOLUTIONS, LLC.

WHOIS : whois.networksolutions.com

REFERRED : http://networksolutions.com

CONTENT

SCORE

6.2

PAGE TITLE
RedDog Computing | Reasonably competent information security consulting | reddogcomputing.com Reviews
<META>
DESCRIPTION
Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Security B-Sides Coming to LA in August. Sun, 06/02/2013 - 20:06 vleveque. When: August 22 and 23, 2013. Getting users to understand phishing. Sun, 06/02/2013 - 19:56 vleveque. How do you keep your users from opening dubious emails, and worse, clicking on links or even entering their credentials? ISACA LA on Cloud Security - Feb 12. Wed, 01/30/2013 - 20:51 vleveque. The meeting place is:. The speaker, Todd Barnum, ...
<META>
KEYWORDS
1 reddog computing
2 lecture videos
3 my resume
4 publications
5 virtual machines
6 user login
7 what is openid
8 username
9 password
10 cancel openid login
CONTENT
Page content here
KEYWORDS ON
PAGE
reddog computing,lecture videos,my resume,publications,virtual machines,user login,what is openid,username *,password *,cancel openid login,request new password,more info,buy my book,what is bsides,vleveque's blog,to post comments,monterey hill restaurant
SERVER
Apache
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

RedDog Computing | Reasonably competent information security consulting | reddogcomputing.com Reviews

https://reddogcomputing.com

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Security B-Sides Coming to LA in August. Sun, 06/02/2013 - 20:06 vleveque. When: August 22 and 23, 2013. Getting users to understand phishing. Sun, 06/02/2013 - 19:56 vleveque. How do you keep your users from opening dubious emails, and worse, clicking on links or even entering their credentials? ISACA LA on Cloud Security - Feb 12. Wed, 01/30/2013 - 20:51 vleveque. The meeting place is:. The speaker, Todd Barnum, ...

INTERNAL PAGES

reddogcomputing.com reddogcomputing.com
1

Resume and Qualifications | RedDog Computing

http://www.reddogcomputing.com/drupal-6.26/resume

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). We offer a total of more than fifteen years experience in information technology, with emphasis on information security and network consulting. Detailed security procedure development, including user management, change control, and server configuration. Security assessments, including hands-on network penetration testing. Cisco routers, switches, ASA firewalls. UNIX, including Linux and OpenBSD. ISACA LA on Cloud S...

2

Security Virtual Machines | RedDog Computing

http://www.reddogcomputing.com/drupal-6.26/vmDownloads

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Virtual Machines for download. VMWare appliances used to provide many, many useful free security appliances for testing and development. Sadly, it has become more of a walled garden, requiring multiple registrations to obtain some very dubious offerings. Security B-Sides Coming to LA in August. Getting users to understand phishing. ISACA LA on Cloud Security - Feb 12. Cyber Watch West has some online classes.

3

ISACA LA on Cloud Security - Feb 12 | RedDog Computing

http://www.reddogcomputing.com/drupal-6.26/node/10

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). ISACA LA on Cloud Security - Feb 12. Wed, 01/30/2013 - 20:51 vleveque. ISACA LA's regular second Tuesday meeting (Feb 12 1013) will cover IT Security and Cloud Computing . The meeting place is:. 3700 W. Ramona Blvd, Monterey Park, California 91754. Right by the 10 and 710 Freeways. For more information, check out http:/ isacala.org/events/dinner-meetings/. So why does ISACA LA hold their meetings on "patch Tuesday"?

4

Lecture Videos | RedDog Computing

http://www.reddogcomputing.com/drupal-6.26/node/6

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Lecture videos for UCLA Extension 417.71 - Introduction to Information Security Concepts. From the course catalog description:. Week 1 - Overview of Information Systems and Security Concepts. Topics: Computer Systems; Data Networks; Security Risks and Policy; Security Standards; Certifications, professional organizations, and further resources. Unit 1A - Computer Overview. Unit 1B - Network Overview. Unit 8B - Proc...

5

NDSS coming up | RedDog Computing

http://www.reddogcomputing.com/drupal-6.26/node/3

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Sat, 12/15/2012 - 21:59 vleveque. The 20th Annual Network and Distributed System Security Symposium will be in San Diego February 24 - 27 2013. An excellent academically oriented conference and well worth the reasonable cost. A combined effort of the Internet Society and USENIX. See http:/ www.internetsociety.org/events/ndss-symposium-2013. For more details and to register. Security B-Sides Coming to LA in August.

UPGRADE TO PREMIUM TO VIEW 10 MORE

TOTAL PAGES IN THIS WEBSITE

15

LINKS TO THIS WEBSITE

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: November 2005

http://bloodsweatinfosec.blogspot.com/2005_11_01_archive.html

Blood, Sweat, and Information Security. Monday, November 07, 2005. Router brute force authentication program. I've written a perl script to perform a brute force login to network devices. It is mainly designed for use with Cisco routers, but works with other devices as well. I wrote it because I had a very difficult time getting Hydra. You can download a tarball of this script from:. Http:/ pages.sbcglobal.net/vleveque/brute-routers.tgz. Just type ./brute-routers -h for the help text. Generic attack meth...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: December 2005

http://bloodsweatinfosec.blogspot.com/2005_12_01_archive.html

Blood, Sweat, and Information Security. Thursday, December 29, 2005. Emerging Challenges in Information Security. I’m updating a client’s information strategy document. This requires that I identify emerging challenges in information security. This involves some prognostication regarding trends in the near future, and concise summaries of selected infosec pundits. Here are some topics I’ve found:. Information Security and Physical Security Convergence. Integrated Security Management Systems. The cost and...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: May 2006

http://bloodsweatinfosec.blogspot.com/2006_05_01_archive.html

Blood, Sweat, and Information Security. Friday, May 12, 2006. Layer 1 Security Conference, April 15, 2006. The hacker community holds periodic conferences or cons to share tricks and techniques, impart practical and theoretical knowledge, socialize, drink, and have a good time. The big, well-known cons include Defcon. Las Vegas), HOPE. New York City) and the European Chaos Computer Club (Berlin). Local and regional events are held on a smaller scale. Ken Caruso Seattle Wireless 6 years later. Use of a No...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: August 2005

http://bloodsweatinfosec.blogspot.com/2005_08_01_archive.html

Blood, Sweat, and Information Security. Monday, August 22, 2005. Scanning tools help build a network inventory. I was able to use some hacker tools legitimately, for purposes of developing a device inventory in a large distributed network. The point of the exercise was to figure out which IP addresses were live, and then to identify these live devices. The utility nmap was used for the initial scan. Two consecutive scans were performed, the first a ping scan:. Then a so-called TCP ping scan:. A more prec...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: April 2006

http://bloodsweatinfosec.blogspot.com/2006_04_01_archive.html

Blood, Sweat, and Information Security. Wednesday, April 19, 2006. Converging facility and information security. Convergence in this case refers to a coming together of physical and information security practices within organizations. This coming together is being driven by two trends: increasingly sophisticated network-based management of facility infrastructure and the increasing importance and sophistication of physical attacks against IT infrastructure. This merger is a difficult one, as faci...Infor...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: May 2005

http://bloodsweatinfosec.blogspot.com/2005_05_01_archive.html

Blood, Sweat, and Information Security. Saturday, May 14, 2005. Greetings, Blog World! I'm Vincent LeVeque, an information security consultant. I'm currently on assignment with a large local government entity. I do general network management stuff in addition to security tasks. I'm currently developing some security hardening documents for several operating environments: IBM AIX, Red Hat Enterprise Linux, Apache (Unix and Windows versions), and Windows 2000/2003 Server. Ensure that it is possible to audi...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: July 2005

http://bloodsweatinfosec.blogspot.com/2005_07_01_archive.html

Blood, Sweat, and Information Security. Sunday, July 17, 2005. Environmental devices provide several options for this monitoring. The building management industry has evolved communication schemes for monitoring and management independent of mainstream network management practices. These include ModBus and BACnet. ModBus is based on an underlying multipoint master/slave serial protocol (see http:/ www.modbus.org/default.htm. BACNet also supports BACNet over IP (see http:/ www.bacnet.org/. Vendor snmp imp...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: June 2006

http://bloodsweatinfosec.blogspot.com/2006_06_01_archive.html

Blood, Sweat, and Information Security. Wednesday, June 28, 2006. VoIP Security and Technology Maturity. Traditional telephony services, using Private Branch Exchange (PBX) systems and dedicated wiring are being supplanted by provision of telephony services over existing IP-based networks. Referred to as Voice over IP (VoIP), these services provide cost savings by using the same cable plant for both voice traffic and data traffic, and by permitting calls to be routed over lower cost IP networks. VoIP sec...

bloodsweatinfosec.blogspot.com bloodsweatinfosec.blogspot.com

Blood, Sweat, and Information Security: October 2005

http://bloodsweatinfosec.blogspot.com/2005_10_01_archive.html

Blood, Sweat, and Information Security. Saturday, October 22, 2005. Banks to require 2-factor authentication. By the end of 2006, the FFIEC will require banks to adopt 2-factor authentication for Internet customers. Quoting from the article:. BOSTON - Federal regulators will require banks to strengthen security for Internet customers through authentication that goes beyond mere user names and passwords, which have become too easy for criminals to exploit. See this yahoo news story. Also the FFIEC report.

UPGRADE TO PREMIUM TO VIEW 2 MORE

TOTAL LINKS TO THIS WEBSITE

11

OTHER SITES

reddogcommunications.co.uk reddogcommunications.co.uk

Red Dog

We Are Red Dog. Red Dog is a PR agency for the new environment. We are commercially astute, tenacious and culturally relevant. Working with brave and exciting clients, we build careers and make organisations famous. Tel: 020 7242 0777. Following 13 years of phenomenal success, The Vibe Bar which is part of the Old Truman Brewery, has chosen thriving Shoreditch-based PR agency, Red Dog Communications, to take it to the next level. The original DJ bar with the one … Continue reading →. Challenge – Pr...

reddogcommunications.com reddogcommunications.com

RedDogCommunications.com is for Sale! @ DomainMarket.com

Search Premium Domain Names. What's in a Domain Name? Building your online presence starts with a top quality domain name from DomainMarket.com. At DomainMarket.com you'll find thousands of the very best .Com domain names waiting to be developed into first rate brands. We have been in business over 10 years and have sold more of our premium domains than any competitors. At DomainMarket.com we offer simple, safe and secure transactions for premium domain names. Your branding efforts will be much m...A pre...

reddogcompany.blogspot.com reddogcompany.blogspot.com

Red Dog Theatre Company

reddogcompany.eu reddogcompany.eu

Untitled Page

Leht on loomisel . Page is under construction . The Red Dog Company Llc. Artelli 8c, 10621 Tallinn, Estland. Tel: 372 668 1210. Reg nr. 11949523. VAT Nr. EE101527945.

reddogcomputers.com reddogcomputers.com

Red Dog Computers

Coming Soon – A Daily Post. Coming Soon – A Daily Post. On April 23rd, 2012. You will forgive the mess. We are planning on having a daily post on security and internet issues by the end of this week. May 1st is the target date for being fully functional. We hope you will stop by daily. There will be articles – and each week, we will try to offer a saving for our visitors with a good discount on something interesting.

reddogcomputing.com reddogcomputing.com

RedDog Computing | Reasonably competent information security consulting

Log in using OpenID:. Log in using OpenID. Blood, Sweat, and Infosec Blog (my older blog). Security B-Sides Coming to LA in August. Sun, 06/02/2013 - 20:06 vleveque. When: August 22 and 23, 2013. Getting users to understand phishing. Sun, 06/02/2013 - 19:56 vleveque. How do you keep your users from opening dubious emails, and worse, clicking on links or even entering their credentials? ISACA LA on Cloud Security - Feb 12. Wed, 01/30/2013 - 20:51 vleveque. The meeting place is:. The speaker, Todd Barnum, ...

reddogconnects.blogspot.com reddogconnects.blogspot.com

Red Dog Communications

Friday, July 15, 2011. SUP Adventures and Eats. After attending the Midwest Standup Paddle Festiva. L in Madison, WI last weekend, my husband and I were pretty stoked. We met industry legends, tried out all kinds of paddleboards, and competed in the six and three-mile races, respectively. The festival, put on by Paddleboard Specialist. S, also included a special showing of the film Destination 3 Degrees. Midwest SUP Festival - Lake Mendota, Madison, WI. Lucky for me, lunch wasn't far away. Tin Fish.

reddogconnects.com reddogconnects.com

Welcome

Red Dog Communications provides professional writing services to help you create. Your story, share. Your news and connect. Tel: 612.812.1131. Blog: www.reddogconnects.blogspot.com.

reddogconsortium.com reddogconsortium.com

Red Dog Consortium

HOVER OVER IMAGE FOR A CLOSER LOOK. Click on corresponding gallery number for more images. Quality exhibit design, construction and interpretation.

reddogconstruction.com reddogconstruction.com

Red Dog Construction | Oklahoma's leading commercial contractor.

We're Proud to Serve You. We can help with all your design, function and build solutions. We're there when you need us. Red Dog Construction is a team that cares about the community. We strive to earn long-lasting clients by treating them fair, transparent and by doing what we say we will do. Of past work so that you can gain ideas and create and craft your own vision at your business. Sherwin Miller Museum of Jewish Art. Dr Gary Kuenning, DDS. Get in touch with us. 116 S 1st Street. Jenks, OK 74037.

reddogconstruction.com.au reddogconstruction.com.au

New Home, Residential & Commercial Construction and Development Companies in Brisbane, Queensland, Australia

Construction Companies Brisbane, New Home Constructions Queensland. For an immediate response contact ( 61) 07 5529 8621. For an immediate response call. 61) 07 5529 8621. Off the Shelf Home & Furniture Solutions. Insurance, Maintenence & Disaster Control. Construction and Development Company Australia. Our journey began with James Elliott who set up the Red Dog Group following extensive travel across the UK and Australia. Red Dog is now a leading Construction and Development Company in Australia&#46...