Category Archives: Computer Security

Best Free Wi-Fi Tools

One of the best wi-fi tools you have on your Windows based computer is netsh.   Netsh can be used to find out information about wi-fi. Open a command prompt and you can use these tools… netsh wlan show networks … Continue reading

Posted in Computer Security, Computers, freeware, Information Technology, Networking, Technology | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

Slow SQL Connection or Network in Windows 10 – Update

Finally found a small problem with Windows 7, 8, 8.1 and 10.  After upgrading, we have discovered that Windows  was responding slow to our SQL Server 2008.  What we discovered is below. Slow response times in Windows to a SQL … Continue reading

Posted in Computer Security, Computers, freeware, Information Technology, network, Technology, Windows 10 Quick Tips, Wireless | Tagged , , , , , , , , , , , , , , , | 13 Comments

Diagnose your network and view network packets with Microsoft’s Message Analyzer

Microsoft’s Message Analyzer enables you to capture, display, and analyze network traffic.   This software even allows payload rendering in order to see pictures and other data. Download Here

Posted in Computer Security, freeware, Information Technology, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , , , | Leave a comment

Going to take a certification that involves binary?

Going to take a certification that involves binary? Here’s a quick tutorial~ Let’s say you are given an IP address of 192.168.1.135 in an answer. What is this number in binary? Here’s what you do. Take a simple key to … Continue reading

Posted in Computer Security, Education, freeware, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

The easy way to subnet your network

Why?  The Golden Question All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet? Subnets … Continue reading

Posted in Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , | 2 Comments

When engineers don’t think about the technicians

Recently my niece dropped her laptop and the hard drive stopped working.   Normally an easy fix, I looked for the access panel for the hard drive so that I could replace it.   What? No access panel?  Oh, easy fix, lets … Continue reading

Posted in Computer hardware, Computer Security, Computers, Information Technology, Mobile Computing, network, Networking, Windows | Tagged , , , , | 1 Comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

Using a GPS to perform a Wi-Fi survey

It is important to perform a wi-fi survey so that you can determine not only the perfect place to locate your access point or bridge but to gain an understanding of the channel co-existence challenge you may face.  With wireless … Continue reading

Posted in Computer hardware, Computer Security, Computers, Education, freeware, Home Networking, Information Technology, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , , , , , , | Leave a comment

Updates and HotFixes you may miss in Windows

Microsoft Windows has a great update feature built in.  You may not know it but Microsoft also releases HotFixes and other items that are needed for security, networking, features and other functionality. How do you find Hotfixes and other items … Continue reading

Posted in Business, Computer Security, Computers, Information Technology, Technology, Windows | Tagged , , , , , , | Leave a comment

See who’s on your wireless network – SoftPerfect WiFi Guard

Want to see who is on your wireless?  SoftPerfect’s  WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading

Posted in Apple, Computer hardware, Computer Security, Computers, freeware, Hacking, Home Networking, Information Technology, Linux, network, Networking, Software, Technology, Windows | Tagged , , , , , , | Leave a comment

The Ultimate Toolkit for IT Professionals – GE Geek Toolkit

I discovered GE Geek through Rick at What’s On My PC.  GE Geek is a resource like no other.  The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable. The best feature by far … Continue reading

Posted in Apple, Business, Computer hardware, Computer Security, Computers, Education, freeware, Home Networking, Information Technology, Linux, Mobile Computing, network, Networking, Software, Technology, Windows, Wireless | Tagged , , , , , , | Leave a comment

OPSWAT Gears – Manage your devices’ security remotely

Have mobile devices, servers and need to monitor these devices remotely?  OPSWAT Gears allows you to monitor your computers remotely – update antivirus software, discover compromised devices, manage threats and more.

Posted in Computer Security, Computers, freeware, Software, Windows | Tagged , | Leave a comment

150 FREE Microsoft eBooks – largest collection ever

150 FREE Microsoft eBooks – largest collection ever Thanks to Jonathan for remembering to email me the latest Microsoft Blog link about free ebooks. EBoooks link Given the amount my readers enjoy these posts and these free resources, I am … Continue reading

Posted in Business, Computer hardware, Computer Security, Computers, Education, Information Technology, Networking, Organizations, Technology, Windows | Tagged , , , | 1 Comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Free-Windows Server 2012 R2 Technet Document -7970 pages

Want to know how to be an administrator of Windows Server 2012 R2?  This 7900+ page document has everything you want to know about Microsoft’s latest server.  Included in this massive manual is- Technical Scenarios Install and Deploy Windows Server … Continue reading

Posted in Computer Security, Computers, Education, freeware, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

How to audit a folder in Windows

When networking shared resources, you should audit the individual folders you are sharing out.  This allows you to ‘see’ who is using the folders and how files are being manipulated. How to Audit User Access of Files, Folders, and Printers … Continue reading

Posted in Business, Computer Security, Information Technology, network, Networking, Technology | Tagged , , , , | 2 Comments

Security Onion- IDS, NSM, and log management

What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network?  And what if you want an easy setup that provides you with information that … Continue reading

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Industry, Information Technology, Linux, Manufacturing, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , | Leave a comment

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

Defending your network with Snort for Windows

When you hear about Snort, the De facto of Intrusion Detection Systems, you think of Linux.  Snort offers a Windows setup and signatures that can be used with any operating system. Snort should be a dedicated computer in your network. … Continue reading

Posted in Computer Security, Computers, Education, freeware, Hacking, Information Technology, network, Networking, Software, Windows | Tagged , , , , , | 1 Comment