Tag: device

One of the Best Anti-Carjacking Devices

Security Concerns of a Collaboration System

[Abstract] The purpose of this document is to analyze the collaboration system that is to be migrated into the Kucera Clothier‚Äôs company and identify security concerns with the system, as well as, identify methods to minimize the risk of an incident of unauthorized access to company information. This document is intended for anybody looking to …

Continue reading

Proposed Server Cluster for Scenario Business

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

Software Applications Forensic Investigators Use

[Content] In the realm of computer forensics, there are many different software applications and hardware that digital forensic investigators need to use to find evidence against a crime that was committed, protect the evidence so that it maintains its integrity, and then present the evidence that was found. The vast majority of software applications that …

Continue reading

Areas Digital Forensic Investigators Find Evidence

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Network Testing Programs

[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …

Continue reading

Networking Protocols and Models

[Abstract] The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s …

Continue reading

Information Systems and Users

[Abstract] The purpose of this document is to provide an increased or basic knowledge of how users interact with information systems by utilizing input and output devices, computer performance factors, network performance issues, and correlating them to the online virtual campus. [Content] When viewing the American Intercontinental University online virtual campus system as an information …

Continue reading

Stun Gun

Pocket Taser Stun Gun, a great gift for the wife. A guy who purchased his lovely wife a pocket Taser for their anniversary submitted this : Last weekend I saw something at Larry’s Pistol & Pawn Shop that sparked my interest. The occasion was our 22nd anniversary and I was looking for a little something …

Continue reading

Advantages and Disadvantages of Network Topologies

Different network topologies have different advantages and disadvantages. A bus network topology is nice because it is simple and cheap, however it has its limitations. On a bus topology you are limited to the number of hosts you can place on a single bus. A ring topology can be beneficial because it provides redundancy, however …

Continue reading

Male or Female?

You may not know that many non-living things have a gender. For example: 1.) Ziploc Bags — They are Male, because they hold everything in, but you can see right through them. 2.) Copiers — They are Female, because once turned off, it takes a while to warm them up again. It”s an effective reproductive …

Continue reading