Great read: a fascinating book about the battle for the North Atlantic during the Second World War

Book reviews Misc

Great read: a fascinating book about the battle for the North Atlantic during the Second World War

I have just finished reading A Game of Birds and Wolves: The Secret Game that Won the War by Simon Parkin. As it says on the dustcover: “1941. The battle of the Atlantic is a disaster. Thousands of supply ships ferrying vital food and fuel

Read More
VMware ‘Failed to connect pipe to virtual machine’ error

Misc Technical

VMware ‘Failed to connect pipe to virtual machine’ error

I had been running VMware Workstation version 14.1.7 on my Windows 10 laptop quite happily, until after a recent Windows update when I attempted to run a guest virtual machine I got an error ‘VMware Workstation cannot connect to the virtual machine. Make sure you

Read More
Setting up integration between Secret Server and IBM Security Identity Intelligence and Intelligence

IBM IBM Security Secret Server ISIGI Thycotic Secret Server

Setting up integration between Secret Server and IBM Security Identity Intelligence and Intelligence

I did some work recently setting up integration between IBM Security Secret Server and IBM Security Identity Intelligence and Intelligence (ISIGI) using the Adapter. This enables ISIGI to manage user accounts within Secret Server. In the process I made a few discoveries!

At the

Read More
Great book: a fascinating true story about spying in the time of the cold war

Book reviews Misc

Great book: a fascinating true story about spying in the time of the cold war

I recently read Ben MacIntyre’s latest book The Spy and the Traitor: The Greatest Espionage Story of the Cold War. I have read a number of his books and found them highly enjoyable, and this is no exception.  John Le Carre describes this as ‘The

Read More
IBM Policy Manager – implementing file blocking on Mac OS/X

IBM Privilege Manager Thycotic Privilege Manager

IBM Policy Manager – implementing file blocking on Mac OS/X

I’ve recently started working with IBM Privilege Manager (from Thycotic), which enables organisations to remove local administrative rights from endpoints, or ‘implement Least Privilege and Application Control. Among other things you can specify the name of an executable file which you want blocked. (In fact you

Read More
Privilege Manager configuration errors…

IBM Privilege Manager IBM Security Secret Server Thycotic Privilege Manager Thycotic Secret Server

Privilege Manager configuration errors…

As I wrote back in May, I’m delighted that IBM Security is OEMing Thycotic’s Privileged Identity Management Technology. IBM Security Secret Server is a brilliant product, and I’m still getting my head around it. One little ‘gotcha’ I discovered: I had all the software installed, or so

Read More
IBM Security to OEM Thycotic’s Privileged Identity Management Technology

IBM IBM Privilege Manager IBM Security Secret Server Thycotic Privilege Manager Thycotic Secret Server

IBM Security to OEM Thycotic’s Privileged Identity Management Technology

I’m delighted that IBM Security is to OEM Thycotic’s Privileged Identity Management Technology. As part of this agreement, IBM Security will now offer a new privileged access management solution, IBM Security Secret Server, powered by Thycotic’s technology.
There’s more information about this at https://thycotic.com/company/blog/2018/05/15/thycotic-announces-ibm-security-oem-privileged-identity-management-technology/ and https://www.ibm.com/us-en/marketplace/secret-server

Read More
My iPhone Sudoku Solver is now available from App Store…

Misc Technical

My iPhone Sudoku Solver is now available from App Store…

I recently succeeded in putting my Sudoku Solver iPhone app on the Apple App Store, so if anyone’s interested you can find it just by searching for ‘Vaughan Harper’ in the App Store app on an iPhone. It does include the capability to solve Sudoku

Read More
A gotcha when installing IBM Security Directory Server on Windows 2012 R2…

ISDS

A gotcha when installing IBM Security Directory Server on Windows 2012 R2…

If you are installing IBM Security Directory Server on Windows 2012 R2 then ensure you disable User Account Control (UAC) by doing the following:
1. Go to Control Panel -> User Accounts -> User Accounts, click Change User Account Control settings, then select Never notify.
Read More

ISIGI virtual appliance – handy command line tools for uploading, deleting and tailing files…

ISIGI

ISIGI virtual appliance – handy command line tools for uploading, deleting and tailing files…

I recently discovered some useful command line tools available for uploading, deleting and tailing files on the IBM Security Identity Governance and Intelligence (ISIGI) virtual appliance:
1. Transferring connector files to the virtual appliance using scp
As described in the ISIGI documentation it is possible to upload connector

Read More
PHP Code Snippets Powered By : XYZScripts.com