Raspberry Pi Projects
There are a number of projects people can build utilizing Raspberry Pi. Windows 10 IoT can be installed on Raspberry Pi, check out some...
CompTIA Certifications for Cyber Security
CompTIA Certifications for Cyber Security Discussion of the new CompTIA Cyber Security Certification and how it fits with the recommended...
Online Reputation
Today two things people should concern themselves about is their online profile and online reputation. Both to a large extent can be...
Plenum Cable
When running network cable, it is important to evaluate the area you are running he cable in. For example, running cable above a drop...
Gravity Demonstration
Here is a great demonstration of one theory of gravity and how it warps space-time. A great book that explains this theory well, at least...
What is a Distributed Denial of Service (DDoS) Attack
Today there has been a major distributed denial of service (DDoS) attack on the internet. Targeting specifically the DNS (domain naming...
Radical New Approaches to Security Analytics
This video is a recording of a keynote talk by Martin Fink the Executive Vice President, Chief Technology Officer, Hewlett-Packard...
How to Install Windows 8 without a Product Key
In a previous article I showed you how to install Windows 7 without a product key for evaluation and testing purposes. However, with...
TechIgnite Cyber Security Conference
March 21 - 22, 2017 | San Francisco, CA Get Insights Discover how to tackle today’s most disruptive technologies - Blockchain, Machine...
Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough...