Home wireless security
My latest effort, up at 2Guys2Cities, simple steps to help keep your wireless internet connection from the casual nefarious user.
Follow these topics: Uncategorized
My latest effort, up at 2Guys2Cities, simple steps to help keep your wireless internet connection from the casual nefarious user.
Follow these topics: Uncategorized
Goodbye Microsoft Security Essentials: Microsoft Now Recommends You Use a Third-Party Antivirus tags: Security MM On going over your time So true, whether for a speaking engagement, meeting or training session. They’ll remember you as the person who ran late, and forget anything you tried to tell them tags: training MM Excuse Me, PDF’s Instead of…
Just saw this post over at PC-Doctor, where he talks about DiamondCD RegistryProt 2.0, a tool that keeps an eye on your PC’s registry and let’s you know if any malware tries to make changes to it. I might have to check that out, if nothing else it’s another layer of free protection for your…
I have long thought M365 is too complicated for anyone to understand all of it deeply. Then I learned that Entra ID has 116 different roles.: People Administrator is the 116th Entra ID Role Lest you think that is all, let me also share this great piece about the 64 roles available in Microsoft Purview….
OK I was up until 4AM making sure everything here worked and writing the full article on the problems I had with That Hosting Company. It seems everything is ok with the exception of comments from Sunday and Monday. Sorry, those seem to be gone. Given that much work, I’m taking most of the rest…
Like anything in life, as well as technology, the best way to learn and get better at something is to practice it. I’m looking forward this weekend to getting a whole lot of practice with photography this weekend. While plenty of folks who’ve seen my abilities with landscape photography, and I’m fairly proud of how…
Businesses Found to Neglect Cybersecurity Until it is Too Late
Is Your Litigation Opponent Entitled to Know the Identity of Your E-Discovery Consultant?
Early Case Assessment in Ediscovery: Start Your Case Off Right
Understanding Open Source Intelligence is Critical to Cybersecurity
This phishing attack uses a countdown clock to panic you into handing over passwords
The UK Online Safety Bill Attacks Free Speech and Encryption