Privacy vs National Security | Encryption

Australia just passed a data encryption law that requires companies to give law enforcement access into devices without the user’s permission. “Police can force companies to create a technical function that would give them access to encrypted messages without the user’s knowledge”. https://www.bbc.com/news/world-australia-46463029

The Thunderbolt 3

What if there was one plug that charged your computer, connected its monitors, internet, and every accessory you could want. Well, it’s here! The new Thunderbolt 3 by Intel is amazing! It can transfer data up to 40Gbps (That’s about 400x faster than your internet speed at 100Mbps). Check out this article on the new […]

What’s Coming and How to Prepare For It

Like every year for technology, 2019 will continue to see changes. Not just because 2019 is anything special, but because it’s also right before 2020. We see trends continuing that large software companies are forcing smaller companies into a cloud-based model (think Amazon and Microsoft), web applications that are hosted in the cloud are the […]

Browser Extensions… Beware of Using Them

In a recent article in the BBC, they mentioned how 81,000 users private messages have been leaked and posted for sale on the dark web (See article). The article mentioned how the hackers got into their Facebook accounts by using browser extensions, “Personal shopping assistants, bookmarking applications and even mini-puzzle games”. Be cautious when you […]

Getting Conned… Twice | New Ransomware Technique

Really Interesting article about a ransom-ware strain that encrypts your computer, and then asks for admin credentials to your computer in order to decrypt the files! Don’t do it! In effect, you are getting conned twice. The first time they got your files, the second time they could have everything!!!   Article: https://www.bleepingcomputer.com/news/security/commonransom-ransomware-demands-rdp-access-to-decrypt-files/

What is Sandboxing?

SANS published an interesting article (see below) showing that Windows Defender is now supporting sandboxing. So what is sandboxing? And why is this a good thing. “Sandboxing is a software management strategy that isolates applications from critical system resources and other programs.” – Tech Definition. Sandboxing allows applications and code that come into your system […]

You Should Try a Linux

I was reading an interesting article comparing Linux vs Windows (see below), and I realized most people have never toyed with a Linux OS. While Windows clearly has the market for business desktops, with Windows 7 being replaced using a Linux at home would be a worthwhile experiment. Currently I have two Linux OS’s at […]

Don’t use these passwords… please

We’ve all heard many times how important passwords are, here are a list of common passwords people use, please don’t use these as it will make breaking your password really easy. Season + year (e.g. Winter 2018) Local Sports Team + Digits (e.g. Seahawks3) Company Name +Year/Number/Special Character (e.g. VeloxSystems2018@) So how do you compile a good […]

Why Do We Do and Say Dumb Things Online?

BBC has an interesting article about a 16 year old who is pleading guilty to hacking into Apple’s network. This kid “boasted about his activities” and broke into their network because “he was a huge fan and dreamed of working there.” There is something that happens when you’re behind a computer (it’s called The Online […]

Y2K – Real or Myth?

Interesting article from BBC discussing if Y2K was a myth… conclusion: no, it wasn’t, the only reason it was a HUGE problem, was because of IT folks who spent countless hours preparing for it. Basically it would have been a big deal, but they realized that before it happened. “The prudent sees danger and hides […]