If you are a fan of our program (I know you are), come get a shirt.
http://www.customink.com/proof_approvals/1064983?token=ff58eb36-5a48-11e1-aa61-54520017e231
Tuesday, February 28, 2012
Wednesday, February 22, 2012
The Lair of an IT Person
Every IT person needs their own lair. So, in honor of those lairs, I am linking to a post about the best ever potential super villain hideouts. If I was a super IT villain, I would put in a bid. http://www.cracked.com/article_19678_6-abandoned-places-that-will-make-awesome-supervillain-lairs.html
Friday, February 17, 2012
Guest Speaker: Bill Hagestad
Bill came and talked to the ITEC485 class on Cyberwarfare this week. His presentation made some of the students start pondering what small things they could do to help. The Internet is a vast and wonderful resource of information, but its international reach has interesting connotations. To see Bill (http://red-dragonrising.com) in action and discuss this in detail, join our program! #ITEC485 #cyberwarfare #degreeinnetworking
Tuesday, February 14, 2012
Botnet Software?
According to InfoWorld, a new software package has been developed. For only $2399 plus $125/mo, you can have an entire software suite dedicated to creating malware. The monthly fee includes tech support and access to forums. If this topic fascinates you, come join our discussion!
Monday, February 6, 2012
Layers 5 & 6
Two seemingly unimportant layers were intensely discussed today. Layers 5 & 6 get a lot of flack and some even say that they are unimportant. However, encryption and sessions lie within these layers. In a world of security, encryption is a very important aspect. Encryption is integrated into secure wireless, VPNs, and certificates. Sessions are also an important item to remember especially when pondering timeouts on web sessions like Facebook and Gmail. How does that login stay active? I would say that a session is established and that the sessions ends when the user either presses the logout button, the browser is closed or a inactivity timer fires. #ITEC485 #osimodel #networking #security
Subscribe to:
Posts (Atom)