- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,682,835 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
- Are your IoT devices visible from the internet?
- Windows Update – You may want to use IE and the Catalog to download the massive 760.6mb update …Updates again? This may be the update that fixes updates…for awhile…
- Cipher /w:C securely erasing unused space
- Slow USB Transfer rate? Try this
- IEEE Cybersecurity Project a Weapon Against Cyberattacks – IEEE – The Institute
Category Archives: Law
Less than a minute…
Your Location has been Shared 5,398 Times in Last 14 Days.
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
The life of a file… 8:00 a.m. The executive secretary begins writing a credit memo for several clients. The file has sensitive data. 8:15 a.m. The file is saved to the documents folder on the secretary’s desktop. The … Continue reading
Secure your devices. Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices). Change the default passwords and update software/firmware when it is available. Disable UPNP and look for … Continue reading
2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, … Continue reading
Mandiant, which worked with the New York Times shows Chinese hackers.
Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat Date: May 7 and 8 Location: MTSU New Student Union Building Registration: March 1, 2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the … Continue reading
“Penetration testing is only the first step of self-inspection— ask internal auditors to scrutinize IT practices beyond compliance to take risk management to the next level – Read More
Dead drops are usb drives hidden usually on private property and could possibly involve vandalism and illegal activities. Dead drops can possibly contain viruses, illegal music, documents and other information that can be considered illegal or malicious. Dead drops are used … Continue reading
WASHINGTON, D.C. — The U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) and the Federal Communications Commission (FCC) will conduct the first nationwide test of the Emergency Alert System (EAS). The nationwide test will occur on Wednesday, November … Continue reading
You cannot effectively protect corporate data and intellectual property. It takes skilled IT professionals to protect your data. A new survey by DELL Kace revealed 87 percent of companies have employees that use some kind of personal device for work … Continue reading
Here’s an example of fake checks that may come to you through responding to emails, online auctions or just out of the blue…don’t cash these type of checks if you receive them…examples of phishing are listed in previous posts. If … Continue reading
Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)
This sort of information should be useful to forensics investigators, folks trying to cover their tracks, folks trying to uncover people’s track….Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics). This article is … Continue reading
Names and Social Security numbers of some 43,000 people that were affiliated with Yale University back in 1999 have been accessible to users of the Google search engine for the past ten months, reports the Yale Daily News Yale confirms 10-month-long data … Continue reading
Here’s some great links for Office 2010’s Resource Kit and books. Office 2010 Resource Kit Technical Library in Compiled Help format Technical diagrams for Office 2010 Downloadable book: Getting started with Office 2010 Downloadable book: Planning guide for Office … Continue reading
In the case of Anonymous and their spin off groups, I have observed a shift in personalities that could be termed an evolution in motivations and thought. Generally though, the game plan seems to be just a general way for … Continue reading
EC-Council Featured in CNN | The Wolf Blitzer Show Aug 4, 2011 | Albuquerque, NM – Jay Bavisi, president of EC-Council, was earlier interviewed by CNN, to comment on the massive cyber spying incident which targeted agencies and groups in … Continue reading
Anonymous Claims Network Breach of FBI Security Contractor ManTech – Security – News & Reviews – eWeek.com
Anonymous Claims Network Breach of FBI Security Contractor ManTech – Security Anonymous continued with its string of attacks designed to embarrass the FBI, this time claiming to have breached the network of ManTech International, the FBI’s cyber-security contractor…
Major ISPs agree to “six strikes” copyright enforcement plan via ARS Technica