Tag: security

Security at the Oscars

This year security was tight at the Oscars. They blocked off sections that were open for the last couple of years. There were more drop cloth to keep things more hidden than usual.

Alerts to Threats in 2015 Europe

From John Cleese The English are feeling the pinch in relation to recent events in Syria and have therefore raised their security level from “Miffed” to “Peeved.” Soon, though, security levels may be raised yet again to “Irritated” or even “A Bit Cross.” The English have not been “A Bit Cross” since the blitz in …

Continue reading

2016 United States Presidential Race Views

I’m an American trying to do my due diligence by paying attention to the political race that has been going on and when I look at the candidates this is what I see. Please be mindful that it is early and I haven’t had all the time in the world to research every candidate out …

Continue reading

A Message from John Cleese

The English are feeling the pinch in relation to recent events in Syria and have therefore raised their security level from “Miffed” to “Peeved.” Soon, though, security levels may be raised yet again to “Irritated” or even “A Bit Cross.” The English have not been “A Bit Cross” since the blitz in 1940 when tea …

Continue reading

Where Did She Put the Case of Beer?

Home Security Yard Sign

Ole & Leno go to the Mall of America

One cold winter day Ole and Lena went to the mall of America. They ended up getting separated and could not find each other. Lena saw a security guard and asked him if he’d seen her Ole…The security guard asked her what does he look like? Lena ya know he’s wearing a red & black …

Continue reading

Passports

Dear Sirs, I’m in the process of renewing my passport, and still cannot believe this. How is it that Radio Shack has my address and telephone number and knows that I bought a cable t.v. from them back in 1987, and yet the Federal Government is still asking me where I was born and on …

Continue reading

Airport Security

Dog For Sale

A guy is driving around the back woods of Montana and he sees a sign in front of a broken down shanty-style house: ‘Talking Dog For Sale ‘ He rings the bell and the owner appears and tells him the dog is in the backyard. The guy goes into the backyard and sees a nice …

Continue reading

Collaboration System

[Abstract] The purpose of this document is to provide an implementation and management plan, as part of a scenario, for implementing a collaboration system into Kucera Clothiers. Included within this document is a definition of the organizational goals or communication issues the collaboration system will resolve. Also included within this document is an explanation of …

Continue reading

Scenario Proposal of a Server Cluster

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

Proposed Server Cluster for Scenario Business

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

Analyze Trends and Technologies

[Abstract] The purpose of this document is to analyze trends and technologies based upon the recommendation I made for a company to utilize a collaboration system in order to improve communications throughout their organization. The recommendation was made based upon a scenario of a company called Kucera Clothiers whose IT strategy was to improve IT …

Continue reading

Hostile Code and Forensic Investigators

[Abstract] The purpose of this document is to identify five different examples of hostile codes and how they impact information systems. Also included within this document is an explanation of how forensic investigators should find the sources of hostile code. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Another Thawte Notary 10 Points

Today I took a train for 1 hour to a little place called Tsutsujigaoka. This is in Tokyo, but it is probably a part of Tokyo that I would not normally go to. When I got there I was met by a nice German guy who works for a bank. We went to a coffee …

Continue reading

Pretty Good Privacy

Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …

Continue reading

Digital Signature Properties

Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entails. This document is intended for anybody looking to gain a basic understanding or a …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Public-key Directory

Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …

Continue reading

Business Continuity

[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …

Continue reading

Choosing a Location for a Network Operations Center (NOC)

[Abstract] The purpose of this document is to provide a basic understanding of network operation centers by identifying three key factors to consider when choosing a location for a network operation center. Also included within this document are five areas of physical security to consider when constructing a network operation center. [Content] When considering constructing …

Continue reading

Hardening OS X

[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple‚Äôs operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] ‚ÄúEvery Mac is secure ‚Äî right out of the box …

Continue reading

Network Testing Programs

[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …

Continue reading

Networking Protocols and Models

[Abstract] The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s …

Continue reading

Information System Controls

[Abstract] The purpose of this document is intended to look at a course registration system within a university and argue which controls should be inputted into that system to ensure the system is not being abused. Also included within this document is an argument for which controls should be put into place to ensure students …

Continue reading

Estimating Business Investment

[Abstract] The purpose of this document is to provide an increased or basic knowledge of how automating the business by using computers and applications has advantages and disadvantages. Also included within this document is a plan to estimate the return on investment for automating the business, as well as, a determination of automating the business …

Continue reading

Top Secret

TOP SECRET This was sent to me by an associate in the surveillance field. I am sharing it with friends and family on a need to know basis. I can not vouch for its validity. SECURITY PHOTO: CONFIDENTIAL The photo is a video capture from a security camera located in the North Corridor that leads …

Continue reading

Jeff Foxworthy Picking on Michigan

1. If you consider it a sport to gather your food by drilling through 18 inches of ice and sitting there all day hoping that the food will swim by, you might live in Michigan. 2. If you’re proud that your region makes the national news 96 nights each year because Pellston is the coldest …

Continue reading

Filing Taxes

A woman walks into her accountant’s office and tells him that she needs to file her taxes. The accountant says: “Before we begin, I’ll need to ask you a few questions.” He gets her name, address, social security number, etc, and then asks, “What is your occupation?” “I’m a whore,” she says. The accountant balks …

Continue reading

Better Solution to Windows

Even though Bill Gates is wealthy and has had a proven success with Microsoft Windows, Windows is not the best product on the market. Excellent marketing has made Microsoft more successful, more so than being a quality product. Windows users are willing to accept the flaws with Windows due to the ease of use. Many …

Continue reading

Home Wireless Network Users Need to Properly Secure Their Networks From Threats

In recent years, technology has been rapidly developing. This development introduced us to the Internet, commercial networks, and even home networks to move towards using wireless networks. In America, home networks are the vast majority of users on the Internet. Since home networks are the majority of users on the Internet, you will learn about …

Continue reading

Do Presidential Candidate Rallies Really Help? Use the Money More Productively.

Since this is an election year there are going to be a few stories about the upcoming election. To go along with that there is one thing that really boggles my mind. First to kind of hit on the topic, I would like to ask if you have ever been sitting at home contemplating which …

Continue reading

Business Trip

I recently have arrived home from a business trip. This trip was to Seattle. The area around Seattle was nice. The forests were gorgeous, but the weather was a little too cold for me. Also it was cloudy all the time there. Other than that the business trip was a success. Other business associates and …

Continue reading

Wireless Insecurities

You would be surprised how many people out there have wireless networks running at home or at a place of business. You would be even more surprised how many people do not change the factory default settings. I recently set myself up on a wireless network before I even set my router up I was …

Continue reading

Wireless Morons

You would be surprised how many people out there have wireless networks running at home or at a place of business. You would be even more surprised how many people do not change the factory default settings. I recently set myself up on a wireless network before I even set my router up I was …

Continue reading