Chinese Telecom Manufacturers Are A Security Threat?

At the beginning of October the House of Representatives Intelligence Committee released a report that accused Chinese telecom manufacturers Huawei Technologies and ZTE of being a potential security threat to computer networks and the Internet in the United States and worldwide.  There are concerns about the companies’ close ties to the Chinese government and the Chinese Communist Party.  The concern is that using the switches, routers, and other telecom gear manufactured by these companies could compromise network security, through software ...

Continue Reading →
0

7 Secrets of Windows 7 (&8)

Starting on Thursday of this week, and then resuming on November 19, I will be offering a class that takes a look at the Windows 7 and the new Windows 8 operating systems, to give newer users of either operating system a look at some of the special features each has to offer.

7 Secrets of Windows 7 (&8)

Windows 7 is the latest Microsoft operating system, and the replacement for Windows Vista and Windows XP. In this class, we will look ...

Continue Reading →
0

The Bulletproof Computer

For the next two weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated with your Internet connection. ...

Continue Reading →
0

Barnes & Noble Store PIN Pads Compromised

63 B&N stores in California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania, and Rhode Island were discovered to have PIN pads at the checkout that sent credit card information to unknown recipients.   It appears the the software in the PIN pads themselves had been reprogrammed somehow by the perpetrators to accomplish this feat.  The breach has been under investigation by the FBI for some time prior to the announcement to give them time to track down the cyber-criminals.

The ...

Continue Reading →
0

Security Software to Avoid

Many people already know that I am not a fan of McAfee security products, due to the number of unusual networking issues I have come across that were resolved by removing McAfee and installing anything else.

Well, I have another product to add to my short list of security products to avoid.  One of my clients was having problems getting all his Internet connection speed.  He had F-Secure Online Protection from CenturyLink.  When we removed it we got a 10 fold ...

Continue Reading →
0

Event Boundaries: Why We Forget

I read an interesting blurb in the Sunday Oct 14th edition of the St Paul Pioneer Press on “event boundaries.”  If you have ever had the experience of going on a mission to another part of your house only to have forgotten why you went there, your memory lapse was most likely triggered by walking through the doorway of the new room.  It turns out our minds pack up and store our thoughts when leaving one room or entering another.  ...

Continue Reading →
0

Make Your Web Site Googlicious

For the next two weeks I will be teaching a course designed to help small business owners inprove their page rank and traffic on their web site.

So you own or manage a web site, but nothing’s happening. How can you improve your results in the major search engines, increase your page rank, and drive traffic to your web site that results in more business? In this class you will learn about online strategies you can do yourself for free that ...

Continue Reading →
0

Deep Web Search Secrets

I am coming into another season of Community Education Classes, and the first offering will be Deep Web Search Secrets.  The class description is below.  Please register for the class at the Community Education Program link below.  I cannot take walk-in students, so please pre-register.

Tired of searching Google, Bing or Yahoo, and getting thousands of results but not the information you want? Search the Internet using advanced techniques. Explore the public websites and visit parts of the vast realm of ...

Continue Reading →
0

Trading Files on BitTorrent? You Will be Tracked

Companies like the Recording Industry Association of America (RIAA) and the Motion Picture Association of American (MPAA) and other organizations that are trying to enforce copyrights on songs, movies, and television shows are actively scanning the BitTorrent swarms for popular content that is being traded on these platforms.  They are logging the IP addresses of those they believe to be infringing on their copyrights in violation of the law, in order to pursue those individuals through their Internet Service Providers, ...

Continue Reading →
0

Your Wi-Fi Encryption Key is Easily Cracked

If you are running a wireless network in your home or business, the days of running an open and unsecured wireless access point are over.  You just open yourself up to way too much mischief and malicious activity by running an unsecured network.  If you are still using WEP encryption, you need to move off of WEP and on to WPA or WPA2 encryption. 

I read an article on Ars Technica that goes into more detail on the ...

Continue Reading →
0
Page 110 of 140 «...8090100108109110111112...»