Tag Archives: Information Technology

2019 Middle Tennessee Cyber Conference Agenda

The TN Department of Safety and Homeland Security along with TCAT Shelbyville and the Cyber Conference committee are working on the 2019 Middle TN Cyber Conference agenda.  Look for speakers such as Jayson E. Street (http://jaysonestreet.com/), Brent White of We … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, higher ed, higher education, Information Technology, internet security;, Technology | Tagged , , , , , , , , , , , | Leave a comment

Microsoft Research TCP Analyzer – Check Out Your Network

Microsoft Research TCP Analyzer (Link) is a network analyzer that allows you to analyze network traces of Transmission Control Protocol (TCP) connections. Given a Microsoft Network Monitor trace, the analyzer provides various performance statistics and visualizations for the captured TCP … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , | 1 Comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

Watch hackers break into the US power grid

Read more: http://www.techinsider.io/

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

BSides – If you missed an event, catch the next one

BSides has been in more than 16 countries and 74+ cities.  If you missed an event, you should make sure you catch the next one.  Learn security from the best.

Rate this:

Posted in Technology | Tagged , , | Leave a comment

How leaving location services on your smartphone can give away your location

Location services can give away your location when you take pictures.  Pictures may contain EXIF info that includes GPS information. Don’t want the GPS data on your pictures?  Have Windows?  Right-click on your picture and choose properties.  Next, open the details tab and … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , | Leave a comment

The miracle server

What happens when you are in a hurry and you have to replace a server motherboard?   You run the server with the protective plastic shield for three years without incident.    Three years ago we had to replace a motherboard on … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , | 1 Comment

How long will you be on help desk?

Three former students recently contacted me to update me on their careers.  There’s always a question before they leave college.  How long will I work help desk?  We wrote an article several years ago – “It takes time in the trenches … Continue reading

Rate this:

Posted in help desk, higher ed, higher education | Tagged , , , , | Leave a comment

Network Access Protection

Windows 2008 Server has Network Access Protection which is also known as NAP or NPS. This tool serves an administrative purpose to help organizations compare the security level in a computer on the network to the Server 2008’s policies. This … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , | Leave a comment

Why the Value of Certifications Can Drop

In a technology driven world, IT Professionals are defined by certifications, skill and worker ethics.  Certifications are designed to give ranking to IT Professionals.  With a collection of simulated exams that are too close to the real exam, the real … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Vista SP1 Cleanup Tool – Yes, someone is still using Vista

Vista’s SP1 uses a ton of space after its initial install.  The Vista Service Pack removal tool (Hey, I didn’t hear about it either) removes archived files returning a ton of space.  Remember, you cannot uninstall SP1 after this.  Hopefully … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , | Leave a comment

TCAT Shelbyville’s CIT Program is a member of the National Center for Women and Information Technology

Dawn Babian, System Analyst is the representative for NCWIT. “NCWIT works to correct the imbalance of gender diversity in technology and computing because gender diversity positively correlates with a larger workforce, better innovation, and increased business performance. Increasing the number … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

Vista, 7 and 8 Networking Woes – Fixed

These tips work on Snap Servers and NAS devices that say they are NOT Vista, 7 and 8 capable and XP workstations that will not connect. Option 1 When connecting Vista, 7  or 8 to XP, if you have problems, … Continue reading

Rate this:

Posted in Information Technology, Technology | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

SanDisk unveils wireless flash drives that hold up to 64GB

“The new Media drive can stream up to five different HD movies at once to multiple devices” SanDisk unveils wireless flash drives that hold up to 64GB.

Rate this:

Posted in Technology | Tagged , , , , , | 1 Comment

Unseen, All-Out Cyber War on the U.S. has Begun

“There’s a war going on, and it’s raging here at home — not in the streets or the fields, but on the Internet. You can think of it as a war on the digital homeland. If you work for a … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Internet, Linux, network, Networking, Technology, Windows | Tagged , , , , , | Leave a comment

You have to be versatile in Information Technology

Back in 2007 we published an article on ‘The Challenge of Teaching Information Technology‘.  Recently we were also asked to write and article for TricomTS’s blog The Right fIT (Their Corporate Website is here) on Educating Tomorrow’s IT Professional Today. So why … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , | Leave a comment

Information Technology isn’t baking a pie, it’s running a whole bakery.

One of my students who is an IT Manager for a government entity said young IT personnel (including herself when she was new in the industry) often think that information technology is as simple as baking a pie, when in … Continue reading

Rate this:

Posted in Computers | Tagged , , | Leave a comment

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat   Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, Networking, Technology, Windows, Wireless | Tagged , , , , , , , , , | Leave a comment

What’s taking so long?

On Sunday we had a an update to a MySQL server that broke the connection to the database.  After working from 6:30 p.m. until 3:00 a.m. the error was still happening and  the restoration was not in sight.  Something as … Continue reading

Rate this:

Posted in Technology | Tagged , | Leave a comment