
TechIgnite Cyber Security Conference
March 21 - 22, 2017 | San Francisco, CA Get Insights Discover how to tackle today’s most disruptive technologies - Blockchain, Machine Learning, AI, VR, AR, IoT. Google, Uber, CISCO, Homeland Security, GE, Amgen and 24 other C-level execs share their secrets.
TechIgnite Spotlight Keynote speakers include world-renowned technology leaders: Steve Wozniak, Co-Founder of Apple Computer, Chief Scientist, Primary Data, and Grady Booch, Chief Scientist of Software Engineering, IBM


Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough to reduce the risk of cyber threats? Cyber-security is more than compliance with credit card processing. What risks does your organization have? Cyber-security is a prime concern today and in this session we will cover what local governments can do to reduce risk. Presenter Donald E. Hester, CISA, CISSP, Director #Cybersecurity #LocalGo


Can you "See" Binary
The binary numbering system is the way most computers talk. Understanding binary is necessary for planning and understanding network segmentation with subnets for IPv4. Cisco has a game you can play to help you learn binary. This game helps some students “see” binary—not sure why, but it seems to work for some. “A fun way to learn the binary number system. Before long, you will be converting eight-digit binary numbers to decimals in your head! The Cisco Binary game has


Starting a Cyber Security Career
People often ask, “What do I need to do to get into cyber security?” The requests are continuing to come in now that Obama says the Federal Government will need something like 200,000 more cybersecurity professionals in the next few years and ISACA says there is a global need for 2 million cyber security professionals by 2019! It is no wonder so many people in Information Technology roles and others, are looking to get into cyber security. This means many people are going t


People & Cyber Security
Cyber attacks are on the rise, affecting companies, government agencies and millions of people. Headlines are filled with stories about companies being hacked for customer information, government agencies secured information being leaked and identify theft. People are losing trust that data cannot be secured. Even though companies and government may spend millions of dollars on security hardware and software, this is not enough to prevent these losses. There are many facto


Installing Android as VM
There are a number of ways to install Android OS onto a PC. Normally Android is installed on tablets and smart phones, however if you are a developer, or just super cool geek, you may want to install it on your PC. The most popular is to use BlueStacks, however some people complain that it isn’t very stable. Then there is the Android developer kit, which is designed for developers to test out their applications. However, complaints about performance abound. The typical re


Installing Windows 7 without a Product Key
Often it is necessary to install an Operating system on to a computer either to troubleshoot or test out something. It can be costly to burn (use) a product key for a temporary install of the OS. Here are some step-by-step instructions on how to install Windows 7 without a product key. This will install Windows 7 and allow you to use it for free for 30 days before it we require you to enter a product license key. You can then extend the 30-day trial by rearming the operati

Discount Certification Exams
Discount exams are available for CompTIA's A+, Network+, and Security+ and Microsoft Office Specialist certification exams. Las Positas is all set up in the Xvoucher system, and students can purchase vouchers through the portal here: https://www.xvoucher.com/buy/CCC/. The student portal can also be accessed from our sector site here: http://ict-dm.net/xvoucher. No login information is needed, so it’s easy! The exams are discounted from the normal retail price. #CNT #A #Networ


Star War hidden on the Internet
Here is an old trace route that you could have run to see the Star Wars Episode IV beginning scroll show up in trace route by naming routers. Check it out. Below is the test and a new IP version 6 one. Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Donald>tracert -h 100 216.81.59.173
Tracing route to FIN [216.81.59.173]
over a maximum of 100 hops:
1 3 ms 4 ms 4 ms homeportal [192.168.1.254]


TU RMF Roles and Responsibilities (Part 1)
TU RMF Roles and Responsibilities (Part 1) People are a critical factor in any cyber security imitative. In this session we will cover the roles and responsibilities defined by NIST for the Risk Management Framework (RMF). This is third in a series on NIST’s Risk Management Framework (RMF). This session covers topics in (ISC)2 CAP certification, FISMA, Certification and Accreditation, DIACAP, and DIARMF. #CAP #Cybersecurity #RMF #ISC2 #NIST #FISMA