Monthly Archives: February 2012

The Do Not Call List: Has It Stopped Working?

It has happened to you before. You are enjoying time with your family, eating dinner or participating in a business meeting when you phone rings. It is a number that you don’t recognize. It isn’t a local number. It could … Continue reading

Posted in 1 Geek, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

Secure Shell: Part 1- The Basics

In our technological infancy, no one really was very concerned about security. Use of the telnet application was the common method used to establish text-based connections to remote systems. The downside of telnet is that all of the traffic (usernames, … Continue reading

Posted in 4 Geek, Linux, Mac, Security, Software, Software Engineering, Technology, Uncategorized, Windows | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

WPS Security Vulnerability: Ease of Use -> Less Secure

Several weeks ago, a security researcher by the name of Stefan Viehbock identified a pretty serious vulnerability in the WPS (Wi-Fi Protected Setup) protocol that is supported by most consumer-grade wireless routers produced over the last several years. Although I … Continue reading

Posted in 3 Geek, Apple, Gadgets, Hardware, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

Apple Upgraded the AirPort Utility to 6.0 for Lion Users: A Blessing or a Curse?

I always thought that one of the negatives of using Apple products in my network was the fact that you could not configure them through a browser.  All other consumer-grade routers that I am aware of provide a browser-based network … Continue reading

Posted in 3 Geek, Apple, Linux, Mac, Technology, Uncategorized, Utilities, Windows | Tagged , , , , , , , , , , , , , , | Leave a comment