Technology

NET NEUTRALITY PRIMER

0 comments

There are three ways to have high speed internet. You can get high speed Internet via cable, telephone, and cell phone. The issue is in many areas you only have one provider of high speed internet and rarely more than a few. This means that there is no real competition. Their monopoly was built with the help of the government. Counties and municipalities signed exclusive franchise agreements with cable companies. Phone companies provided lines with numerous government incentives including the Universal Service Fund.

Relying on public key encryption for business

0 comments

Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.

We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.

Surviving Computer Failure

0 comments

It is good to plan for computer failure. It will happen eventually and probably at the worst possible time. The first thing that you need to do is determine what you use your computer for and what information on it you need.

If determining what you use on your computer seems daunting you can back up the entire computer. There are a number of cloud based backup solutions that allow you to do continuous backups for a fee when you are online, some of the better known solutions are IDrive, Carbonite, and CrashPlan.

Tech Talk: Feel right at home with travel storage devices

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

Over the holidays, many families spend time traveling in their cars. There are number of devices that make can provide entertainment while traveling. The two devices to consider are mobile hotspots and mobile storage devices.

Lessons learned from the Podesta email hack

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

The hacking of Clinton Campaign Chairman John Podesta’s email provided a lesson for us all. It was an amazingly simple phishing email that caused his password to be revealed. An email was sent to Podesta’s gmail account saying someone had used his password to login to his account from the Ukraine and he should change his password. It included a link to change the password.

Advice on personal identifications and passwords

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

One of the most difficult aspects of security is uniquely identifying a user and verifying that they are who they claim to be. This is normally down through a username and password. The username uniquely identifies the user and the password verifies that they are that user.

Pages

Subscribe to RSS - Technology