October 31, 2016

Ransomware is becoming the largest threat to home and work computers.  Ransomware basically encrypts your files and presents you, the user, with the option of playing to decrypt your files.  Basically, your files are held hostage until you pay.  What can you do?...

October 28, 2016

Famous hacker Samy Kamkar shows how you can hack drones and take control of them.  His project called Drone strike can be viewed below.

Note: Hacking into a computer that you do not have permission to do so is a violation of law.  Depending what you do, it can range fro...

October 27, 2016

There are a number of projects people can build utilizing Raspberry Pi.  Windows 10 IoT can be installed on Raspberry Pi, check out some projects on https://www.adafruit.com

Matrix Creator is a Raspberry shield that has some sensors that can be programmed for various th...

CompTIA Certifications for Cyber Security

Discussion of the new CompTIA Cyber Security Certification and how it fits with the recommended pathway.  Presenters; Robert De Roeck from Indiana University and Donald Hester from Las Positas College.

October 26, 2016

Today two things people should concern themselves about is their online profile and online reputation.  Both to a large extent can be controlled by you.  However, at times, the information you might post may be shared by others and then it is out of your control and th...

October 26, 2016

When running network cable, it is important to evaluate the area you are running he cable in.  For example, running cable above a drop ceiling, like in the one pictured below, may require we use special cable.  If the area above the drop ceiling is used for active circ...

October 24, 2016

Here is a great demonstration of one theory of gravity and how it warps space-time.

A great book that explains this theory well, at least it did for me, is The Fourth Dimension by Rudy RuckerHe has another book titled The Fourth Dimension: Toward a Geometry of Higher...

October 21, 2016

Today there has been a major distributed denial of service (DDoS) attack on the internet.  Targeting specifically the DNS (domain naming service) servers that help route Internet traffic to various sites.  Specifically, Dyn a large DNS service provider.  You can read u...

October 21, 2016

This video is a recording of a keynote talk by Martin Fink the Executive Vice President, Chief Technology Officer, Hewlett-Packard Enterprise.  He describes the current state of threats in the world and current events.  The statistic he gives is not good.  His point is...

October 20, 2016

In a previous article I showed you how to install Windows 7 without a product key for evaluation and testing purposes.   However, with Windows 8 things are a bit different.  The standard packages of Windows 8 require users to put in a product key before they install....

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare