Blog Stats
- 75,849 hits
Monthly Archives: January 2014
What am I doing?
Posted in Security Blog
Tagged 2014, computer security, information security, lol, security, thinks i do
Comments Off on What am I doing?
8 Levels of Information Technology Security
This is cool. Click it to see it on it’s original site.
Posted in Security Blog
Tagged 2014, data center, infographic
Comments Off on 8 Levels of Information Technology Security
Amazing Arizona Comic Con 2014
The Amazing Arizona Comic Con is not as big and amazing as the Phoenix Comic Con, It even uses the smaller convention center, but it is still a lot of fun. Fewer people dress up for this one and fewer … Continue reading
Posted in life
Tagged Amazing Arizona Comicon, cosplay, Costume, Phoenix Comicon
Comments Off on Amazing Arizona Comic Con 2014
CISSP
Took my test today and passed on the first try. No bootcamps or classes. How? I read two books. The CISSP: Certified Information Systems Security Professional Study Guide, which was a very informative, yet dry. I took several months to read … Continue reading
CISSP Test
I passed my CISSP test, so I got that going for me, which is nice. -Carmelo
Worst Passwords of 2013
According to this article, password is no longer the #1 password that people are using, now its 123456. Are people smarter when it comes to passwords? Well…. I think some are just lazy. A good password should be at least … Continue reading
Deliver DNS Trojan with Microsoft Word Macro
I saw this video on Armitage’s Facebook page. Subscribe to his channel for notifications when new videos are uploaded.
Posted in Security Blog
Tagged 2014, armitage, dns, Macro, Microsoft, trojan, video tutorial, Word
Comments Off on Deliver DNS Trojan with Microsoft Word Macro
Jim Miklaszewski
Saw this meme on Imgur. Is it just a meme? Did this happen? I don’t know.
The Ten Commandments Of Computer Ethics
The following are the 10 commandments from the Computer Ethics Institute Thou shall not use a computer in ways that may harm people. Thou shall not interfere with other people’s computer work. Thou shall not snoop around in other people’s … Continue reading