It is very important these days to keep a small attack surface, both personally and professionally. When you get a “User unknown” message back, delete that person from your Email distribution lists. Too many companies keep names in their lists forever. That is a really bad idea. When a domain name expires, it is very […]
April 2017
Spectrum Networks: Regulate as a Carrier?
Recently, I replied to a LinkedIn fellow’s post regarding SD-WAN (Software Defined Wide Area Network) versus MPLS (Multi-Protocol Label Switching). In cable transmission parlance, MPLS is sometimes referred to as “Metropolitan Ethernet” or “Metro-E”. This is defined in the DOCSIS 3.0 (Data Over Cable Service Interface Specification) standard. I replied with the comic up […]
Meaningful Use vs. Actual Use
This is a Healthcare graphic I created 2-1/2 years ago. It might be old, but it’s still good. Share this with your favorite doc.
Edward Snowden: The Fool
Introduction There’s not much good I can say of Edward Snowden except that to his credit, his document releases served as a wake-up call to all manufacturers, service providers, and the average American. So, the NSA is performing wide-scale surveillance; is that really something new? Does anybody remember ECHELON, from back in the early 2000s? […]
Network Monitoring for Dummies
LinkedIn and SolarWinds suggested this book just for me. Imagine that! I added comment #5: “Yes, I’m stupid. Please send me the book.”
Debunking WikiLeaks: What you need to know!
Why the WikiLeaks CIA dump was the most damaging one yet Stop the presses! The sky is falling! I’m getting tired of correcting people regarding the latest WikiLeaks dumps regarding IoT (Internet of Things): I really doubt the credibility of the latest WikiLeaks dumps Let’s start with the obvious, a Cover Sheet marked “Secret” with paragraphs […]
Jared’s 3-Tiers of Tech Support
I created this easy-to-use system several years ago. I don’t want to alienate, like, most of my friends here; but you know I don’t hold anything back. Enjoy! Level 1: Numbnut ———————- The poor Indian souls that take a beating all day long. Level 2: Dingleberry ———————- Usually American. Similar to Level 1, only quicker. […]
BOLO: Microsoft Word Infections Without Macros?
This got beamed into my head through a LinkedIn post a couple of weeks ago. The poster had wanted a more authoritative response to the question, “Can opening Microsoft Word documents cause an infection without Macros?”. Yes, you can get infected without having Macros. Apple, Microsoft, and Linux have all been dealing with image exploitations […]
Cellphone IMEI/IMSI Interceptors
“Oh what a tangled web we weave….” (Sir Walter Scott) This is a good lesson in privacy, from the top down. When the Cops have it, the Crooks have it! IMSI/IMEI Interceptors, direct from Alibaba. 3G/4G? How many units you want? There’s all kinds of different models with different capabilities there. Here’s one: https://www.alibaba.com/product-detail/Nigeria-New-Security-System-Mobile-Phone_60256958833.html?spm=a2700.7724838.0.0.IWxH6g Get the […]
A Quirky Look at Windows 10 Creator’s Edition
In August we got the Anniversary Edition of Windows 10 and on Tuesday, 4/11/2017, Microsoft released the Creator’s Edition. The most interesting feature of this new Windows 10 Edition is improvements to the handling of Critical Windows Updates. Microsoft, to their credit, continues to improve the security of the Windows platform, especially in Windows 10. It […]