Blog Archives

WPA2 wireless security cracked

Another good reason to use Ethernet cables when possible. If you are using WPA2, then make the password as long as possible. Think 63+ characters long. Be sure to keep your WiFi router’s firmware up to date as well. From http://mobile.slashdot.org/story/14/03/22/0048220/wpa2-wireless-security-crackable-with-relative-ease

Tagged with: , , , , , , , , , , , ,
Posted in Cybersecurity

The easiest way to speed up your laptop is…

Add RAM chips! Find out the make (brand) and model number of your laptop. Look around the keyboard and on the bottom of the laptop, you should see the make and model number of the laptop. Go to http://www.crucial.com and

Tagged with: , , , , , , ,
Posted in Cybersecurity

Accessing Your BIOS to use a LiveCD Operating System

Very helpful article from http://pcsupport.about.com/od/fixtheproblem/a/biosaccess_pc.htm This will help you access Tails or any other LiveCD operating system. Having trouble getting in to your computer’s BIOS setup utility? If you’ve tried the basic steps for accessing your computer’s BIOS and haven’t

Tagged with: , , , , , , , , , , ,
Posted in Cybersecurity

Do you hate Windows 8?

Do you hate Windows 8? You are not alone!Here is something that will make you hate Windows 8 just a bit less! Go to http://www.classicshell.net and download the software and install it. It will allow you to have the Start

Tagged with: , , , , , , , ,
Posted in Cybersecurity

Defending against Keyloggers

“What is a key logger?” Key loggers are devices or programs designed to record every keystroke that you make onto a computer keyboard to allow for continuous monitoring of computer usage. They are often known as keystroke recorders or just

Tagged with: , , , , , ,
Posted in Cybersecurity