Category Archives: Computer Security

Going to take a certification that involves binary?

Going to take a certification that involves binary? Here’s a quick tutorial~ Let’s say you are given an IP address of 192.168.1.135 in an answer. What is this number in binary? Here’s what you do. Take a simple key to … Continue reading

Posted in Computer Security, Education, freeware, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

The easy way to subnet your network

Why?  The Golden Question All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet? Subnets … Continue reading

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , | 2 Comments

When engineers don’t think about the technicians

Recently my niece dropped her laptop and the hard drive stopped working.   Normally an easy fix, I looked for the access panel for the hard drive so that I could replace it.   What? No access panel?  Oh, easy fix, lets … Continue reading

Posted in Computer hardware, Computer Security, Computers, Information Technology, Mobile Computing, network, Networking, Windows | Tagged , , , , | 1 Comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

Using a GPS to perform a Wi-Fi survey

It is important to perform a wi-fi survey so that you can determine not only the perfect place to locate your access point or bridge but to gain an understanding of the channel co-existence challenge you may face.  With wireless … Continue reading

Posted in Computer hardware, Computer Security, Computers, Education, freeware, Home Networking, Information Technology, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , , , , , , | Leave a comment