Many secure, SSL webistes today now appear “insecure”, and give security warnings, Google’s Chrome browser, starting with version 57, released in January 2017, was the first browser to go to these extremes. Apparently in an effort not to be undone, Firefox followed suit, although it offers much more pertinent information. What has happened is that […]
Jared’s WordPress Downloads
I put up a new Download Center. The first files uploaded to it are both related to WordPress: WPSCAN and SHA512-PASS WPSCAN is a Unix command-line scanner that can be useful in identifying Hacked Pages and Backdoors within a WordPress site/directory structure. The next file is a PHP WordPress plugin called SHA512-PASS. It stores user […]
BOLO: Apple’s Big Mac Attacks!
For those people with Macs, there are dark clouds overhead. According to McAfee Labs, malware attacks designed for Mac computers rose 744 percent in 2016. It started with the discovery of the Osx.Dok Trojan on Friday, 4/28/2017:
HIPAA, MPLS, and Encryption
Recently, I was asked a question. “If I use MPLS, do I need to do encryption to be HIPAA compliant?” Multi-Protocol Label Switching (MPLS) is different things to different people, depending upon the networks involved. In this context, it was a Metropolitan Ethernet (Metro-E) network being provided by a local cable company. So, the answer […]
Jared and the VAX
Sometimes LinkedIn pesters you to do things. I wrote a recommendation to a great guy I knew from my old Timeplex days, Thaddeus B. Here’s a good story that shows Thad’s character. I had moved to Clearwater, FL from D.C. and in 1991, needed access to S/W Engineering’s system to download PAL code. I sent […]
WordPress and the Hacks Thereof
On Thursday, 2/23/2017 a client’s WordPress got hacked. It wasn’t even noticed until a significant amount of spam was observed to be spewing forth from the server at the end of March. Suffice to say, that one little hack resulted in another, then another, until there was the corruption of a whole lot of data. […]
Email Security: Trim Those Distribution Lists
It is very important these days to keep a small attack surface, both personally and professionally. When you get a “User unknown” message back, delete that person from your Email distribution lists. Too many companies keep names in their lists forever. That is a really bad idea. When a domain name expires, it is very […]
Spectrum Networks: Regulate as a Carrier?
Recently, I replied to a LinkedIn fellow’s post regarding SD-WAN (Software Defined Wide Area Network) versus MPLS (Multi-Protocol Label Switching). In cable transmission parlance, MPLS is sometimes referred to as “Metropolitan Ethernet” or “Metro-E”. This is defined in the DOCSIS 3.0 (Data Over Cable Service Interface Specification) standard. I replied with the comic up […]
Meaningful Use vs. Actual Use
This is a Healthcare graphic I created 2-1/2 years ago. It might be old, but it’s still good. Share this with your favorite doc.
Edward Snowden: The Fool
Introduction There’s not much good I can say of Edward Snowden except that to his credit, his document releases served as a wake-up call to all manufacturers, service providers, and the average American. So, the NSA is performing wide-scale surveillance; is that really something new? Does anybody remember ECHELON, from back in the early 2000s? […]