From Newest Post to Oldest Post
Posts
- PayPal Woes and Degenerative AI
- A Pathetic Defense of Julian Assange
- Damned if you do. Damned if you don’t.
- ProtonMail? Not Worth an Electron!
- Give it a REST: Serious WordPress Bugs
- Hardening the Apache Webserver
- Numb to it all
- Secure Your Amazon S3 Buckets
- It’s almost too easy
- Tech Support Scams
- Apple Fixes Critically Stupid Error in High Sierra
- Update Your Dahua NVR & IP Cameras
- Intel Inside? Better get it out!
- Hacking VoIP Phones
- 40 Websites Hacked in 7 Minutes
- BOLO: 17-Year Old MS-Office Bug in Equation Editor
- Fun With Windows 10 Fall Creator’s Update (FCU)
- New VMware Vulnerabilities
- Microsoft Security Bulletin: Quakbot and Emotet Trojans
- Patch Tuesday: November 2017
- Intel AMT/ME, MINIX, and NSA’s HAP
- Top Attacking Countries: October 2017
- Exploiting Virtual Machines with RAM Row-Hammer Attacks
- BOLO: IcedID Banking Trojan/Emotet Trojan
- The Cyber Kill-Chain: Revisited
- Office 365: Lackluster Anti-Spam/Malware Performance
- Oh Brother (printers): Denial-Of-Service
- Divorce eSecurity: Practical Electronic Security
- John Kelly’s Cell Phone Hack
- Humor: Problem Solving Flowsheet
- WordPress Update
- Social(Networking+Engineering) Defeats Physical Security
- Chrome Browser Update: 62.0.3202.75
- Bits on Bitcoin!
- Speed Dating for SysAdmins
- BOLO: WPA2 WiFi KRACKed. Ouch!
- A Netsec’s Favorite Mayonnaise
- Microsoft Patch Tuesday: October 2017
- VPN Services: A Primer
- The How & Why of Caller-ID/SMS Spoofing
- Common Mistakes Made With Your Tech Partners
- Un-Clouding: Don’t Let This Happen to You!
- Joomla: Security Update
- Top Attacking Countries: September 2017
- GPS Hacked
- SSL/TLS Email Connection Testing
- Microsoft Office: No Shortage of Exploits
- VMware Exploited Again: Update Now
- WordPress 4.8.2: Update Now.
- Top Attacking Countries: August 2017
- Microsoft’s 9/2017 Patch Tuesday
- Equifax Hacked
- The Insecurity of Journalism
- How To Monetize Your Job In Security
- Of NSA Vulnerability Disclosures and Cyber-Command
- BOLO: Defray Ransomware
- Fun With Windows 10’s Utility Menu
- Top Attacking Countries: July 2017
- Has Your Password Been Pwned?
- Fast Algorithm of Revertible Operations’ Queen (FAROQ) Cipher
- BroadPwn Exploit: iOS and Android Updates
- Of SSL, Content Security, and Pesky Protocols
- EFF: Who has your back?
- Verizon Wireless? Change your passwords.
- Top Attacking Countries: June 2017
- Critical Patch Tuesday: 7/11/2017
- Debate: Technology, Privacy, and Law Enforcement
- 2017 HIPAA Violations: Lessons Learned
- The Six Phases of a Project or Upgrade
- WordPress and Joomla Updates
- Android Users Rejoice!
- The CIA’s CherryBlossom WiFi Exploits
- Inside CIA’s OutlawCountry Linux Hack
- Skype: Critical Vulnerability Patched
- HIPAA: Product Sunsets
- Mobile Device/Smartphone Security
- Windows 10S: Microsoft Bogus Claims
- Fortinet: Mapping the Ransomware Landscape
- Fortinet: Guide To The Threat Landscape
- WordFence Advisory: Continued TR-069 Exploits
- Of the NSA & Russian Election Hacks
- A Funny Sign of Our Times
- BOLO: PowerPoint Order/Invoice Exploit
- Top Attacking Countries: May 2017
- Foscam: A Chinese Disaster
- Google Chrome 59 Released
- ‘Twas a Three Dog Night
- SAMBA Bugs: Is Your NAS Updated?
- BOLO: FireBall Browser Malware
- HIPAA: Ransomware IS a Breach
- Protect Yourself: Life Outside the Firewall
- Vulnerabilities with Movie Subtitles
- New USB Kill 3.0: From the makers of USB Kill™
- BOLO: Chrome Spreads Your Creds!
- Big Data vs. Big Oil: Technology Company Value
- The Cybersecurity Framework
- Demystifying President Trump’s CyberSecurity Executive Order
- Mr. Smith Goes to Washington
- Help for MalWare & RansomWare?
- BOLO: WannaCry(pt) RansomWare
- BOLO: Netrepser Espionage Trojan
- Centralization, Decentralization, and AI
- BOLO: New “Jaff” RansomWare
- Windows Patch Tuesday: 5/9/2017
- BOLO: Critical Update – Windows AntiMalware
- BOLO: Intel Chip Zero-Day Vulnerability
- Top Attacking Countries: April 2017
- Two PHP and WordPress Security Tips
- Security & Ambient Light Sensors
- The Greatest Unsolved Mysteries
- Browser Changes & SSL Certificate Errors
- Jared’s WordPress Downloads
- BOLO: Apple’s Big Mac Attacks!
- HIPAA, MPLS, and Encryption
- Jared and the VAX
- WordPress and the Hacks Thereof
- Email Security: Trim Those Distribution Lists
- Spectrum Networks: Regulate as a Carrier?
- Meaningful Use vs. Actual Use
- Edward Snowden: The Fool
- Network Monitoring for Dummies
- Debunking WikiLeaks: What you need to know!
- Jared’s 3-Tiers of Tech Support
- BOLO: Microsoft Word Infections Without Macros?
- Cellphone IMEI/IMSI Interceptors
- A Quirky Look at Windows 10 Creator’s Edition
Pages
- Donor Dashboard
- Privacy Policy
- Donation Confirmation
- Donation Failed
- Donation History
- The Telecom Corner: ISDN Resources
- The Telecom Corner: ISDN D-Channel Operation
- The Telecom Corner: ISDN BRI S-Interface
- The Telecom Corner: ISDN PRI U-Interface
- The Telecom Corner: ISDN BRI U-Interface
- The Telecom Corner: ISDN Interfaces
- The Telecom Corner: ISDN Overview
- The Telecom Corner: ISDN Information
- The Telecom Corner: DDS DS0 Byte Formats
- The Telecom Corner: DDS Line Operations
- The Telecom Corner: DDS Overview
- The Telecom Corner: Modems
- The Telecom Corner: Modulation
- The Telecom Corner: Switching Systems
- The Telecom Corner: Radio Transmission
- The Telecom Corner: Transmission
- The Telecom Corner: E1 Framing and Channelization
- The Telecom Corner: T1 Framing and Channelization
- The Telecom Corner: L-Carrier Systems
- The Telecom Corner: VFCT
- The Telecom Corner: Fax HDLC Protocol
- The Telecom Corner: Fax Call Procedures
- The Telecom Corner: Fax Standards
- The Telecom Corner: Fax Overview
- The Telecom Corner: DDCMP Specifications
- The Telecom Corner: DEC DDCMP Protocol
- The Telecom Corner: Bisync Block Checking Procedures
- The Telecom Corner: The IBM Bisync Protocol
- The Telecom Corner: Async vs. Sync
- The Telecom Corner: Protocol Information
- The Telecom Corner: EtherType Variable Assignment
- The Telecom Corner: Networking with DOS
- The Telecom Corner: OSI Model and NetWare
- The Telecom Corner: Ethernet Pinouts
- The Telecom Corner: Ethernet Frame Types
- The Telecom Corner: Ethernet Configuration and Wiring
- The Telecom Corner: Ethernet Physical and Datalink Layers
- The Telecom Corner: CSMA/CD Introduction
- The Telecom Corner: RS-530 Pinouts
- The Telecom Corner: RS-422 Pinouts
- The Telecom Corner: V.35 Pinouts
- The Telecom Corner: RS232 Pinouts
- The Telecom Corner: Data Interface Standards
- The Telecom Corner: LAN & Novell Information
- The Telecom Corner: Networking Overview
- The Telecom Corner: Multiplexing Techniques
- The Telecom Corner: Digital Hierarchies
- The Telecom Corner: PCM
- The Telecom Corner: ASCII, 8-Bit IBM Extended
- The Telecom Corner: ASCII Control Characters
- The Telecom Corner: ASCII, 7-Bit Space Parity
- The Telecom Corner: ASCII, 7-Bit Mark Parity
- The Telecom Corner: ASCII, 7-Bit Odd Parity
- The Telecom Corner: ASCII 7-Bit, Even Parity
- The Telecom Corner: ASCII
- The Telecom Corner: Punched Tape
- The Telecom Corner: SS7 Advanced Services
- The Telecom Corner: SS7 CLASS
- The Telecom Corner: G.732 CAS Signaling
- The Telecom Corner: DS-1 Auto Ring-Down (ARD)
- The Telecom Corner: DS-1 Foreign Exchange Signaling
- The Telecom Corner: DS-1 E&M Signaling
- The Telecom Corner: Digital Signaling Systems
- The Telecom Corner: Adaptive Transform Coding
- The Telecom Corner: CVSD
- The Telecom Corner: SB-ADPCM
- The Telecom Corner: ADPCM
- The Telecom Corner: Pulse Code Modulation (PCM)
- The Telecom Corner: Voice Coding
- The Telecom Corner: Voice Quality Categories
- The Telecom Corner: Voice Digitization
- The Telecom Corner: OPS - ONS Loss
- The Telecom Corner: Digital CO ONS Loss
- The Telecom Corner: Analog CO ONS Loss
- The Telecom Corner: Hybrid ONS Loss
- The Telecom Corner: Digital ONS Loss
- The Telecom Corner: Analog ONS Loss
- The Telecom Corner: Loss Planning
- The Telecom Corner: Echo Control
- The Telecom Corner: Echo Problems
- The Telecom Corner: PBX
- The Telecom Corner: Start Dial Signaling
- The Telecom Corner: E&M Signaling
- The Telecom Corner: SF Signaling
- The Telecom Corner: Ground Start Signaling
- The Telecom Corner: Loop Start Signaling
- The Telecom Corner: Asynchronous Transmission
- The Telecom Corner: Trunk Signaling
- The Telecom Corner: 2 and 4 Wire Transmission
- The Telecom Corner: Phone Numbers
- The Telecom Corner: PSTN
- The Telecom Corner: The Phone
- The Telecom Corner: Other References
- The Telecom Corner: Voice Specifications
- The Telecom Corner: Voice Introduction
- The Telecom Corner: Voice Network Acknowledgements
- The Telecom Corner: Voice Networking
- The Telecom Corner: Baudot Code
- The Telecom Corner: Morse Code
- The Telecom Corner: History
- The Telecom Corner: Visitor's Page
- The Telecom Corner
- Life Outside The Firewall: Get Protected
- Mobile Device/Smartphone Security Tips
- Blacklisted URLs (Last 500)
- Useful Links
- Oops: Error 404
- Site Index
- Downloads
- Contact
- About