Eric Jacksch
What not to like about Facebook Pages
Each Facebook Page is managed by one or more administrator. The user creating the page becomes the first administrator, and…
I WannaCry
Over the past week, the WannaCry ransomware worm exploded across 74 countries, infecting businesses, hospitals, universities, and many others. The…
Campaigning for cybersecurity
Many fingers are pointing at Russia, which indeed possesses the motive, means, and opportunity. But the harsh reality facing candidates…
Circle: Good instead of evil
There are several ways to filter Internet access. Most firewalls providing filtering based on IP address and port combinations. However,…
Authentication Architecture
Early Unix operating systems, born long before the rise of the Internet, used a single flat text file to store…
Top questions execs should ask to make sure corporate assets are protected
According to vulnerability scans, how many critical and important patches need to be applied, and how many remain outstanding for…
Simply no data to find
Dell acquired thin client manufacturer Wyse in 2012. Jeff McNaught, VP Marketing of Cloud Client-Computing, explained that today’s thin client…
Change your Apple password. Now.
According to Motherboard, who broke the story, hackers contacted them and and provided details of their scheme and screen shots…
Five to survive
The insider threat is grossly underestimated. While focusing on technical security issues remains vital, Snowden and the CIA leak illustrate…
Traveling with tech
All travellers should begin by carefully considering whether they actually need to take a device with them. For example, those…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected