- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
15th Year2007-2021
Top 50 Higher-Ed Blogs 2016 -
Join 520 other subscribers
TCAT Shelbyville Tech Blog
Hits | SV (NI)
- 4,050,172 visits
Steve’s Favorites
ARS Technica' Blog
Brickhouse Labs
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
Gegeek
gHacks
How-to Geek
Lifehacker
MakeUseOf
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
Security Net
Techworm Security
The Windows Club
Cybersecurity Ventures-
Recent Posts
Top Posts
Archives
Unknown Feed
- An error has occurred; the feed is probably down. Try again later.
Krebs on Security
- Patch Tuesday, May 2024 Edition
- How Did Authorities Identify the Alleged Lockbit Boss?
- U.S. Charges Russian Man as Boss of LockBit Ransomware Group
- Why Your VPN May Not Be As Secure As It Claims
- Man Who Mass-Extorted Psychotherapy Patients Gets Six Years
- FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data
- Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme
- Who Stole 3.6M Tax Records from South Carolina?
- Crickets from Chirp Systems in Smart Lock Key Leak
- Why CISA is Warning CISOs About a Breach at Sisense
Monthly Archives: July 2012
Delete Empty Folders
So you have installed and uninstalled programs over the years. Did you know you could have dozens or even hundreds of empty folders on your computer. Delete these Folders with Empty Folder Nuker. Empty Folder Nuker deletes … Continue reading
Posted in Computers
Tagged freeware, Software, windows 7, windows freeware, windows utilities
2 Comments
Free Microsoft Digital Literacy classes -earn a certificate
If you are new to computing, the internet or if you have some experience with technology, Microsoft offers an excellent online FREE curriculum to pick up basic online certificates along with two more advanced levels. Their courses teach many … Continue reading
An Introduction to Android Forensics | DFI News
An Introduction to Android Forensics | DFI News.
Posted in Computers
Leave a comment
Steganography and Smart Phones | DFI News
Over the course of the past year, a new crop of data hiding and steganography programs have emerged…Steganography and Smart Phones | DFI News.
Posted in Computers
Leave a comment
Windows 7 Registry Forensics: Intrusion Related Activities | DFI News
Windows 7 Registry Forensics: Intrusion Related Activities | DFI News. Two possible situations arise when forensically examining a system for evidence of an intrusion: performing live incident response and/or conducting a post mortem examination of hard drives. (Read more – … Continue reading
Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News
Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News. It’s early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night’s tequila and file … Continue reading
We Choose the Moon – Interactive Website
We Choose the Moon is an excellent website that offers interactive features of NASA’s Apollo program.
Find and set your optimal MTU setting to improve your connectivity
MTU Ping Test Want to determine the optimal MTU for your ISP connection? Go to Search or Run (Windows 7 vs. XP) Type in cmd. Hit the enter. A Command prompt window will open. Type ping http://www.speedtest.net -f -l 1500 and hit Enter (or … Continue reading
Posted in Computers
Tagged Internet, Internet speed, internet speed test, optimize internet, windows network, windows networking
1 Comment
Originally posted on TCAT Shelbyville – ITIM:
NTCore has an excellent little program that will patch .exe files of applications letting them use 4gb of RAM. Typically these applications will use far less than the 4gb of RAM in a…
Posted in Computers
Leave a comment
Innovation and leadership in IT at the Tennessee Technology Center at Shelbyville
The IT team at TTC Shelbyville offers innovation and leadership recognized nationally in magazines1 and in education. Under Ivan Jones, Director of the educational facility, the team consist of three personnel who teach and also maintain a complex and diverse network. … Continue reading
Posted in Computers
Tagged Computer classes, TBR, Tennessee Technology Center at Shelbyville, ttc shelbyville
Leave a comment
Kingsoft Antivirus 2012 cloud antivirus
Kingsoft Antivius 2012 is in the top 100 of vb100 and they are also a Microsoft VIA member (Virus Information Alliance). This cloud based software named Cheetah is fast and its slick design takes very little bandwidth when connected to … Continue reading
Posted in Computers
Tagged antivirus, Cloud antivirus, freeware, Kingsoft, Software, Viruses, Windows, Windows Antivirus
Leave a comment
College Courses – Free online
Coursera offers online courses that are collegiate level. Take course in Biology and Life Sciences Business and Management Computer Science: Aritificial Intelligence, Robotics, Vision Computer Science: Programming and Software Engineering Computer Science: Systems, Security, Networking Computer Science: Theory Economics and … Continue reading
Dns jumper v1.0.4
I originally saw this Freeware over at What’s On My PC. Dns jumper v1.0.4 is a great piece of software to speed up your internet connection. A lways take IPv6 into consideration over the upcoming year.
US departments gain emergency control over internet- IT News
US President Barack Obama has signed an executive order giving government agencies unprecedented powers to control communications networks during emergencies, according to a privacy lobby group. The order — titled ‘Assignment of National Security and Emergency Preparedness Communications Functions’ — gives the US … Continue reading
4 Reasons Why IT Security Needs Risk Management – Dark Reading
“If IT security departments want to truly meet the risks posed by today’s advanced threats, they need to get more scientific with how they develop their strategies. Because based on the breach statistics and malware infection rates, the old methods … Continue reading
Posted in Computer Security
Tagged black hat, computer defense, Dark Reading, Firewalls, Hacking, IT security
Leave a comment
Use MAC Filtering and hide your SSID on your wireless for security- but not against a wardriver
MAC address filtering is found in your router’s settings and can be effective against the standard user that knows your password to your wireless router. A great example of this is your children’s friends. They may learn the … Continue reading
Posted in Computers
Tagged computer networks, networking, networks, Wireless, wireless security
Leave a comment
Web100 based Network Diagnostic Tool
Web100 based Network Diagnostic Tool This java applet was developed to test the reliablity and operational status of your desktop computer and network connection. It does this by sending data between your computer and this remote NDT server. These tests … Continue reading
Posted in Computers
Tagged apple, Linux, mac, network, Network test, networking, networking test, Web100 NDT, Windows
Leave a comment
Testing your IPv6 security
With IPv6, your computer may be exposed to the internet. Here’s a link that test your connection with NMap. Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security. Note … Continue reading
Honoring the Space Shuttle
[vimeo http://vimeo.com/27505192] The maker of this video did an excellent job.