

TechIgnite Cyber Security Conference
March 21 - 22, 2017 | San Francisco, CA Get Insights Discover how to tackle today’s most disruptive technologies - Blockchain, Machine...


Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough...


Can you "See" Binary
The binary numbering system is the way most computers talk. Understanding binary is necessary for planning and understanding network...


Starting a Cyber Security Career
People often ask, “What do I need to do to get into cyber security?” The requests are continuing to come in now that Obama says the...


People & Cyber Security
Cyber attacks are on the rise, affecting companies, government agencies and millions of people. Headlines are filled with stories about...


Installing Android as VM
There are a number of ways to install Android OS onto a PC. Normally Android is installed on tablets and smart phones, however if you...


Installing Windows 7 without a Product Key
Often it is necessary to install an Operating system on to a computer either to troubleshoot or test out something. It can be costly to...


Discount Certification Exams
Discount exams are available for CompTIA's A+, Network+, and Security+ and Microsoft Office Specialist certification exams. Las Positas...


Star War hidden on the Internet
Here is an old trace route that you could have run to see the Star Wars Episode IV beginning scroll show up in trace route by naming...


TU RMF Roles and Responsibilities (Part 1)
TU RMF Roles and Responsibilities (Part 1) People are a critical factor in any cyber security imitative. In this session we will cover...