Category Archives: Computer Security

Are your IoT devices visible from the internet?

BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet.  Here’s the link to see if you have something that … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Hardware, higher ed, higher education, Information Technology, Internet, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft Windows, Mobile Computing, network, Networking, Technology | Tagged , , , , , | Leave a comment

Cipher /w:C securely erasing unused space

The Cipher program can be used to remove any erased data from unused disk space.  The command, Ciper /w:C is used to perform this action and can securely erase data that you once had on your computer.  While this command … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, higher ed, higher education, Home Networking, malware, Uncategorized, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1 | Tagged , , , , , , | Leave a comment

An interview with Shannon Morse, Internet Media Host & Producer

Image Source Over the next several months we plan on interviewing technical experts and leaders across the globe to find out how they got started in the technology industry, what their favorite operating systems are, information security trends and more. This … Continue reading

Rate this:

Posted in Computer hardware, Computer Security, Computers, Hacking, Information Technology, internet security;, Linux, Microsoft, Technology | Tagged , , , | Leave a comment

When engineers don’t think about the technicians

Recently my niece dropped her laptop and the hard drive stopped working.   Normally an easy fix, I looked for the access panel for the hard drive so that I could replace it.   What? No access panel?  Oh, easy fix, lets … Continue reading

Rate this:

Posted in Computer hardware, Computer Security, Computers, Information Technology, Mobile Computing, network, Networking, Windows | Tagged , , , , | 1 Comment

Watch hackers break into the US power grid

Read more: http://www.techinsider.io/

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , | Leave a comment

Microsoft Attack Surface Analyzer test your system’s security

Microsoft’s Attack Surface Analyzer will take a quick snapshot of your computer’s state before and after the installation of software.   IT Professionals can asses their organization’s applications.  Other IT personnel can use this to look at the risk of … Continue reading

Rate this:

Posted in Computer Security, Computers, freeware, Information Technology, Software, Windows | Tagged , , , , , | Leave a comment

How fast can a credit card skimmer go in place?

Less than a minute…

Rate this:

Posted in Business, Computer Security, Education, Industry, Law, Technology | Tagged , , , | Leave a comment

900+ Technical Blogs

Need information about anything technical?  Here’s a site ran by Rick over at What’s On My PC.   The site BookMark4Techs is the largest resource for Technical Blogs.

Rate this:

Posted in Apple, Computer hardware, Computer Security, Computer Software, Computers, Free Software, freeware, Home Networking, Information Technology, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Software, Technology, troubleshooting, Windows, Windows 7, Windows 8, Windows Security | Tagged , , , , , | 2 Comments

Virus and Malware removal tools

Often we remember Malwarebytes, Adwcleaner, ComboFix, RKill , Junkware Removal Tool (JRT) or Adware Removal Tool/TSA and forget about tools offered by Anti-virus software manufacturers.  Here’s a few links. Kaspersky – Tools McAfee – Tools AVG – Tools BitDefender – Tools Panda Tools/Online Scan … Continue reading

Rate this:

Posted in Computer Security, Computer Software, computer troubleshooting, Education, Free Software, freeware, Software, Technology | Tagged , , , , | 1 Comment

Best Malware/Spyware Removal Tools

Have a Windows computer with malware or spyware?  Here’s three of the best malware and spyware removal tools that are free. Adwcleaner is light weight and removes browser redirects, malware and spyware. Webpage – https://toolslib.net/downloads/finish/1/ Approximate size- 1.7 mb TSA … Continue reading

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , , | Leave a comment

Enhanced Mitigation Experience Toolkit 5.2

“The Enhanced Mitigation Experience Toolkit (EMET) helps raise the bar against attackers gaining access to computer systems. EMET anticipates the most common actions and techniques adversaries might use in compromising a computer, and helps protect by diverting, terminating, blocking, and … Continue reading

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged | Leave a comment

Remove Viruses with Boot Utility

If you work on computers, you need to be aware of SARDU and its ability to download recovery ISOs.   This utility can create a boot DVD or USB to remove viruses, recover Windows or break passwords (legally if the … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Information Technology, Networking, Software, Technology, Windows | Tagged , , , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Best Free Wi-Fi Tools

One of the best wi-fi tools you have on your Windows based computer is netsh.   Netsh can be used to find out information about wi-fi. Open a command prompt and you can use these tools… netsh wlan show networks … Continue reading

Rate this:

Posted in Computer Security, Computers, freeware, Information Technology, Networking, Technology | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Technology, Computers, Information Technology, Computer Security, Hacking | Tagged , , , , , , , | Leave a comment

Slow SQL Connection or Network in Windows 10 – Update

Finally found a small problem with Windows 7, 8, 8.1 and 10.  After upgrading, we have discovered that Windows  was responding slow to our SQL Server 2008.  What we discovered is below. Slow response times in Windows to a SQL … Continue reading

Rate this:

Posted in Computer Security, Computers, freeware, Information Technology, network, Technology, Windows 10 Quick Tips, Wireless | Tagged , , , , , , , , , , , , , , , | 14 Comments

Diagnose your network and view network packets with Microsoft’s Message Analyzer

Microsoft’s Message Analyzer enables you to capture, display, and analyze network traffic.   This software even allows payload rendering in order to see pictures and other data. Download Here

Rate this:

Posted in Computer Security, freeware, Information Technology, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , , , | Leave a comment

Going to take a certification that involves binary?

Going to take a certification that involves binary? Here’s a quick tutorial~ Let’s say you are given an IP address of 192.168.1.135 in an answer. What is this number in binary? Here’s what you do. Take a simple key to … Continue reading

Rate this:

Posted in Computer Security, Education, freeware, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

The easy way to subnet your network

Why?  The Golden Question All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet? Subnets … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , | 2 Comments

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments