<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Syrinx Technologies - FAQ Blog]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog]]></link><description><![CDATA[FAQ Blog]]></description><pubDate>Wed, 04 Mar 2026 11:04:32 -0500</pubDate><generator>Weebly</generator><item><title><![CDATA[Q: What's the difference between a vulnerability assessment and a penetration test?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-a-vulnerability-assessment-and-a-penetration-test]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-a-vulnerability-assessment-and-a-penetration-test#comments]]></comments><pubDate>Thu, 24 Jan 2013 00:40:24 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-a-vulnerability-assessment-and-a-penetration-test</guid><description><![CDATA[A: From "www.darknet.org":Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. The system being studied could be a physical facility like a nuclear power plant, a computer system, or a larger system (for example the communications infrastructure or water infrastructure of a region).A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious hacker. The process involves an active an [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:justify;"><font size="3">A: From "www.darknet.org":<br /></font><br /><font size="3">Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. The system being studied could be a physical facility like a nuclear power plant, a computer system, or a larger system (for example the communications infrastructure or water infrastructure of a region).</font><br /><br /><br /><font size="3">A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution.</font></div>]]></content:encoded></item><item><title><![CDATA[Q: How do you pronounce "Syrinx"?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-how-do-you-pronounce-syrinx]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-how-do-you-pronounce-syrinx#comments]]></comments><pubDate>Wed, 23 Jan 2013 00:42:16 GMT</pubDate><category><![CDATA[syrinx technologies]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-how-do-you-pronounce-syrinx</guid><description><![CDATA[A: sir-i?(k)s or perhaps sear-inks [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="4">A: sir-i?(k)s or perhaps sear-inks</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: What are the implications to PCI?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-are-the-implications-to-pci]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-are-the-implications-to-pci#comments]]></comments><pubDate>Tue, 22 Jan 2013 01:03:12 GMT</pubDate><category><![CDATA[pci]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-what-are-the-implications-to-pci</guid><description><![CDATA[A: The PCI DSS released an document in June of 2011 addressing virtualization. You can download this document by clicking&nbsp;here.&nbsp; [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:justify;"><font size="3">A: The PCI DSS released an document in June of 2011 addressing virtualization. You can download this document by clicking&nbsp;<a href="https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf" target="_blank">here</a>.&nbsp;</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: What are the normal billing terms for services?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-are-the-normal-billing-terms-for-services]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-are-the-normal-billing-terms-for-services#comments]]></comments><pubDate>Tue, 22 Jan 2013 00:43:00 GMT</pubDate><category><![CDATA[syrinx technologies]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-what-are-the-normal-billing-terms-for-services</guid><description><![CDATA[A: All services performed by Syrinx Technologies are billed as fixed price projects. The normal terms are Net 15. Unless the project is large enough to be broken into sections with milestones the invoice is submitted with the draft reports. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: All services performed by Syrinx Technologies are billed as fixed price projects. The normal terms are Net 15. Unless the project is large enough to be broken into sections with milestones the invoice is submitted with the draft reports.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: Does Syrinx Technologies have an RSS feed?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-an-rss-feed]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-an-rss-feed#comments]]></comments><pubDate>Mon, 21 Jan 2013 00:43:31 GMT</pubDate><category><![CDATA[syrinx technologies]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-an-rss-feed</guid><description><![CDATA[A: Yes, you can subscribe to the Syrinx Technologies RSS feed&nbsp;here. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: Yes, you can subscribe to the Syrinx Technologies RSS feed&nbsp;<a href="http://www.syrinxtech.com/podcasts/rss.xml" target="_blank" style="">here</a>.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: Does Syrinx Technologies have a blog?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-a-blog]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-a-blog#comments]]></comments><pubDate>Sun, 20 Jan 2013 00:43:59 GMT</pubDate><category><![CDATA[syrinx technologies]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-does-syrinx-technologies-have-a-blog</guid><description><![CDATA[A: Yes, you can read the blog at&nbsp;http://syrinxtech.blogspot.com. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: Yes, you can read the blog at&nbsp;<a href="http://syrinxtech.blogspot.com/" target="_blank" style="">http://syrinxtech.blogspot.com</a>.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: What's the difference between external and internal penetration testing?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-external-and-internal-penetration-testing]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-external-and-internal-penetration-testing#comments]]></comments><pubDate>Sat, 19 Jan 2013 00:44:57 GMT</pubDate><category><![CDATA[general topics]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-whats-the-difference-between-external-and-internal-penetration-testing</guid><description><![CDATA[A: An "external" penetration test will examine the various resources available from anyone outside the security perimeter (i.e., the firewall). This testing could include the web/email servers, dial-in, wireless and VPN access. The "internal" penetration test will examine resources available to anyone inside the security perimeter. This could include employees, contractors, temporary employees, partners and attackers who manage to break through the external security perimeter. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: An "external" penetration test will examine the various resources available from anyone outside the security perimeter (i.e., the firewall). This testing could include the web/email servers, dial-in, wireless and VPN access. The "internal" penetration test will examine resources available to anyone inside the security perimeter. This could include employees, contractors, temporary employees, partners and attackers who manage to break through the external security perimeter.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: What's the average length of an external and internal penetration test?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-average-length-of-an-external-and-internal-penetration-test]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-whats-the-average-length-of-an-external-and-internal-penetration-test#comments]]></comments><pubDate>Fri, 18 Jan 2013 00:45:27 GMT</pubDate><category><![CDATA[general topics]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-whats-the-average-length-of-an-external-and-internal-penetration-test</guid><description><![CDATA[A: The average external test is about 16-24 man hours, while the average internal test is 24-40 man hours. Factors that influence the external testing includes number of Internet-facing devices, the number of IP domains owned by the client and whether there is wireless or dial-in testing to be performed. Factors influencing the internal testing includes the number of servers, network users and remote locations. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: The average external test is about 16-24 man hours, while the average internal test is 24-40 man hours. Factors that influence the external testing includes number of Internet-facing devices, the number of IP domains owned by the client and whether there is wireless or dial-in testing to be performed. Factors influencing the internal testing includes the number of servers, network users and remote locations.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: Does it make sense to routinely test my networks?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-it-make-sense-to-routinely-test-my-networks]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-does-it-make-sense-to-routinely-test-my-networks#comments]]></comments><pubDate>Thu, 17 Jan 2013 00:45:51 GMT</pubDate><category><![CDATA[general topics]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-does-it-make-sense-to-routinely-test-my-networks</guid><description><![CDATA[A: Absolutely! Like any regular health checkup, network security audits should be performed annually. Some clients choose to alternate internal and external testing each year. Others perform quarterly testing to ensure that any problems can be quickly discovered and fixed. On a related note, some clients choose to routinely swap among their vendors who perform security audits. This provides the client a fresh set of eyes, toolsets and methodologies every 2-3 years. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:justify;"><font size="3">A: Absolutely! Like any regular health checkup, network security audits should be performed annually. Some clients choose to alternate internal and external testing each year. Others perform quarterly testing to ensure that any problems can be quickly discovered and fixed. On a related note, some clients choose to routinely swap among their vendors who perform security audits. This provides the client a fresh set of eyes, toolsets and methodologies every 2-3 years.</font><br /></div>]]></content:encoded></item><item><title><![CDATA[Q: What is an RSS feed?]]></title><link><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-is-an-rss-feed]]></link><comments><![CDATA[https://www.syrinxtech.com/faq-blog/q-what-is-an-rss-feed#comments]]></comments><pubDate>Wed, 16 Jan 2013 00:46:20 GMT</pubDate><category><![CDATA[syrinx technologies]]></category><guid isPermaLink="false">https://www.syrinxtech.com/faq-blog/q-what-is-an-rss-feed</guid><description><![CDATA[A: You can get more information&nbsp;here. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><font size="3">A: You can get more information&nbsp;<a href="http://rss.softwaregarden.com/aboutrss.html" target="_blank" style="">here</a>.</font><br /></div>]]></content:encoded></item></channel></rss>