
Ransomware
Ransomware is becoming the largest threat to home and work computers. Ransomware basically encrypts your files and presents you, the user, with the option of playing to decrypt your files. Basically, your files are held hostage until you pay. What can you do? An ounce of prevention is worth a pound of cure. Many of the anti-virus / anti-malware software packages now come with some sort of anti-ransomware protection now.However, it is important to make sure the feature is t


Hacking Drones - SkyJacked
Famous hacker Samy Kamkar shows how you can hack drones and take control of them. His project called Drone strike can be viewed below. Note: Hacking into a computer that you do not have permission to do so is a violation of law. Depending what you do, it can range from a misdemeanor to a felony. NCSL #IoT #MakerFaire #Aircrack #RaspberryPi #Hack #Drone


Raspberry Pi Projects
There are a number of projects people can build utilizing Raspberry Pi. Windows 10 IoT can be installed on Raspberry Pi, check out some projects on https://www.adafruit.com Matrix Creator is a Raspberry shield that has some sensors that can be programmed for various things. There are competitors to Raspberry Pi such as the Orange Pi and Banana Pi. One of the coolest project I have seen so far. Open a door with facial recognition. Websites https://www.raspberrypi.org/ http:/


CompTIA Certifications for Cyber Security
CompTIA Certifications for Cyber Security Discussion of the new CompTIA Cyber Security Certification and how it fits with the recommended pathway. Presenters; Robert De Roeck from Indiana University and Donald Hester from Las Positas College. #CompTIA #Security #Network #A #CASP #CSA #ITFundamentals #Career #Certification #secureIT #Exams #CNT #SocialMedia #DoD #8570 #CPE #TU

Online Reputation
Today two things people should concern themselves about is their online profile and online reputation. Both to a large extent can be controlled by you. However, at times, the information you might post may be shared by others and then it is out of your control and there may be little to nothing you can do about it once it is in the “wild.” Your "online profile" is the sum of online content about you that you've created and content about you created by others. Items include:


Plenum Cable
When running network cable, it is important to evaluate the area you are running he cable in. For example, running cable above a drop ceiling, like in the one pictured below, may require we use special cable. If the area above the drop ceiling is used for active circulation of air it is known as a plenum space. For all plenum spaces we are required, by fire code, to use plenum rated cables. Plenum rated cable uses a low smoke plastic sheath. That way if the cable is melti


Gravity Demonstration
Here is a great demonstration of one theory of gravity and how it warps space-time. A great book that explains this theory well, at least it did for me, is The Fourth Dimension by Rudy Rucker. He has another book titled The Fourth Dimension: Toward a Geometry of Higher Reality that cover the topic as well. He often cites a class science fiction book Flat Land by Edwin Abbott Abbott that is a must read as well. (Free on Kindle) #Physics #Math #Hyperspace #Gravity #ScienceFict

What is a Distributed Denial of Service (DDoS) Attack
Today there has been a major distributed denial of service (DDoS) attack on the internet. Targeting specifically the DNS (domain naming service) servers that help route Internet traffic to various sites. Specifically, Dyn a large DNS service provider. You can read updates on their site at https://www.dynstatus.com/incidents/nlr4yrr162t8 “Starting at 11:10 UTC on October 21st-Friday 2016 we began monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastruc


Radical New Approaches to Security Analytics
This video is a recording of a keynote talk by Martin Fink the Executive Vice President, Chief Technology Officer, Hewlett-Packard Enterprise. He describes the current state of threats in the world and current events. The statistic he gives is not good. His point is that we need to turn the tide. Otherwise, we will lose. He also goes into the new level of SIEM (security information and event management) service. Oh and about halfway through the talk, he is going to show B

How to Install Windows 8 without a Product Key
In a previous article I showed you how to install Windows 7 without a product key for evaluation and testing purposes. However, with Windows 8 things are a bit different. The standard packages of Windows 8 require users to put in a product key before they install. Not sure why Microsoft made the change, they just did, and now you need to burn a product key just to do testing. Here is an article I found on how to install Windows 8 without a product key. It will require so