Tag Archives: apple

Bonjour, the chatty protocol

Although an older article, it is important for IT personnel to tackle network traffic and provide a fast, clean and efficient network. Bonjour is a chatty protocol, and with hundreds or thousands of Apple clients on a network, multicast traffic … Continue reading

Posted in Technology | Tagged , , , | Leave a comment

Configuring WDS to extend your wireless network

Want to extend your network and make it more reliable and robust?    Here’s what you will need – Two routers with the same firmware Preferably Tomato or DD-WRT Login to the first router.   In this example, the static … Continue reading

Posted in Apple, Computer hardware, Computers, Education, freeware, Home Networking, Information Technology, Internet, Linux, Mobile Computing, network, Networking, Software, Windows, Wireless | Tagged , , , , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Best IT Professional sites on the web

It’s hard to find great quality information that can be used by IT professionals.  One of the best sites on the web is GEGeek.  This site offers information that is updated often and covers a wide range of IT resources … Continue reading

Posted in Apple, Business, Computer hardware, Computer Security, Computers, Education, freeware, Home Networking, Information Technology, Internet, Linux, network, Networking, Software, Windows, Wireless | Tagged , , , , , , , , | 2 Comments

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

Visualization of Data Breaches

The site Information is Beautiful gives a visualization of data breaches and other information about hacking over the past several years.

Posted in Technology | Tagged , , , , , , , | Leave a comment

Great Networking tools to analyze your network

ICSI Netalyzer is an excellent online tool that measures over 100 areas of your internet connectivity.  Use this to troubleshoot your internet connectivity.  Hosted by the University of Berkeley, this online tool is a must have when optimizing your network.  http://netalyzr.icsi.berkeley.edu/ … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , | Leave a comment