Who Is On My Wi-Fi?



Appears to be a very useful tool, both at home and travel.  Article is worthy of a moment of attention.



Part 1

I have been debating how to approach this subject of Subnetting, there is not much to say other than it really sucks to learn.  But once you learn it, it just gets easier and more understandable.  Unfortunately, every new subject you learn, with which you have no familiarity with is going to be absolute hell unless you can pick it up quickly.  When I started learning subnetting and then relearned and re-familiarized myself, I have to admit it was tough and I just was not getting it.  But the information super highway, Youtube, and many other tid-bits of information out there in the world can make all the difference in the world.  You might not understand what one method teaches there is always another method that may take hold in your brain.  So, take heart…it may be a roller coaster, but it is our roller coaster.  Just keep looking for the method that makes sense to you, it is out there.  Below are some references, which are not all inclusive as there are a multitude more references for your viewing pleasure.

Youtube, as you probably already know, is an underutilized resource and valuablesubnet-study tool in your arsenal of learning.

Look through these references, videos (you won’t need to view all, just until you are comfortable), and the other web-sites.  To really prepare yourself for the test (CCENT or CCNA) use the IPv4 subnetting – random question generator v1.6  as it will generate random IPv4 subnetting questions for you to practice on (makes it easy for you!)

headerfistAlso, keep in mind that you will be tested on IPv4 for subnetting, so that is what we will be using.  IPv6 is being deployed and you may see it on the test for CCNA, but more likely than not you will not receive test questions on the subnetting of IPv6.

Until we meet again in Part 2…

See also:  Part 1, Part 2, Part 3, Part 4













Other Web-Sites:







IPv4 subnetting – random question generator v1.6  http://subnetting.org/

More on RFID

Children have no choice.  Katherine discusses the San Antonio school district plan to give all students “the chip” so that they can be tracked throughout the day.  They are starting with the school with the lowest number of native English speakers.

Listen to her program by tapping on “the chip”

Internetworking Part 6

Flow Control ensures data integrity at the Transport Layer (Layer 4) by maintaining and allowing  users to request reliable data transport between systems.

Flow Control prevents the transmitting host from overflowing the buffers of the receiving host.  If the flow of data is not controlled it can result in lost data.  The ability to obtain reliable data transport uses a connection-oriented communications (briefly discussed in Part 5) session between the two, or more, systems and the protocols involved, which would permit the following:

  • All segments received are acknowledged to the sender upon their receipt;
  • Any segments lost or dropped, which are not acknowledged, will be retransmitted;
  • Segments are re-sequenced into their original order upon arrival at their destination;
  • Manageable data flow is maintained to avoid congestion, overloading and data loss.

The inherent purpose of flow control is to maintain a means for the receiving  host to govern the amount of data sent by the transmitting host.


Part 1, Part 2, Part 3, Part 4, Part 5

Passwords and New Jobs…

If you have a Facebook, Twitter, or any other social networking account, can you be asked for you account and its password?  Short answer, YES they can ask but you do not have to give it up…I imagine that depends upon how badly you need the job, also.  This does seem to be the big rave on the news, other than the Obama-Care challenge.

There is software that companies tend to use to sift through the internet to find out if anyone is talking bad about their company AND people have been fired for talking bad about the company that they worked for (note the operative term “worked”).  You have an obligation to not denigrate the company you work for and many of them have policies that reflect such a thing.  If you cross the line you should be held accountable…if only it were a perfect world where everyone was held to the same standard!  But anyway…

You have a right to privacy and there are certain lines that should not be crossed.  While on Facebook, I had posted the article “Should Companies be allowed to ask for your Facebook Password?” by Tuan C. Nguyen.  Someone answered with a comment essentially saying that if a company did ask for my password I could not work for them because they acting unethically (they want their passwords to be secure, but want yours?) and it would be a security violation of password sharing which is frowned upon in the IT community.  And he is definitely right…one of the first things you are taught is security & protection.

Until the next exciting adventure!





RFIDs Part 5

This segment is not actually Radio Frequency ID, but it is a related issue.  People are so hell bent on convenience that they, more often than not, fail to think of the long term and devastating possibilities.

Now you will be able to pay by using the smart technology within your phone.  there are, and will be more, applications granting access to your banking institutions to pay for your purchases.  Many of the loyalty card programs are looking into similar technology for purchase discounts.

What exactly are the ramifications for this in your life?  How secure is your phone and the signal it uses?  Most people do not even pass-code their phones, because it is inconvenient.  How inconvenient will it be when your account is wiped out?  Now your phone will contain access to all your financial data, all of your purchasing data, purchasing habits (i.e., food, clothes, technology, etc.)

By pushing everyone to use credit & debit cards the banking industry is really striving toward a cashless society.  In doing so, they are forcing everyone to make purchases with a flippant and cavalier approach and will cause much more debt spending in your life than if you were using cash.  A study was done (I heard about it on the Katherine Albrect Show http://www.katherinealbrecht.com/index.php?option=com_content&view=frontpage&Itemid=1) in which a study was done when cash money is being used to pay people tend to be more mindful on the expenditures; whereas, with the airline industry they are no longer taking cash on flights and you are forced to use credit card and you are more likely to spend more with its use.  This is because most people do not want to spend such a small amount on a card and will be more flippant with its use.

It is already a well known fact that such technology can be used to monitor your actions, expenditures, and conversations.  With the advent of many District Court decisions which permit police to do so without any warrants.

I am always concerned when privacy is concerned…it is not alright when the tech savvy peeping tom down the street does such things, but it is legal when the government does it????? hmmmmmm!

SEE ALSO:  RFID Part 1, RFID Part 2, RFID Part 3, RFID Part 4

Here are some articles to view:









Secure eMail

I recently read a c|net article about an interesting web-site and its service.  The article is “This email will self-destruct…” and mentioned the services at https://oneshar.es, which permits a person to send a one-time message; after the url is accessed one time the information is destroyed and removed from use.  I was rather curious about it and queried Mr. Cipriani about what happened to the information, of which he verified that the information was removed from the system.

This has spectacular possibilities for secure email or messaging.  There are some applications which you can encrypt the message and then you could send via oneshar.es the password or passphrase.  You could just send out a one time message to a person.  In either case, you can determine how you wish to use it, but it is one of those useful applications that may be handy to you, one day.

Keep it on the back burner for now.



I was reading an article at the InfoSecurity web-site, which had an interesting note on the psychology of passwords.  A recent survey indicated the contradiction of password security, in-that, people desire password security and that they be strong and changed often; however, these people would, themselves, not change their passwords on a regular basis nor make them difficult and strong.  Rather concerning, don’t you think?



Browsing Privacy

In this day and age, everyone wants a little privacy, the idealistic genre has the mind “if you don’t have anything to hide, then…” kind of attitude, and as you get older you come to have a great appreciation for privacy.  There are some steps you can take to help your own privacy along.  I was reading Rob Lightner’s article for CNET, “Five Smart Ways to Keep Your Browsing Private”



  1. One of you biggest concerns is to get rid of all tracking cookies on your computer.  There is a free software that does this called CCleaner.  It is very good, I have tried it.
  2. Opting out of tracking by use of third-party software such as PrivacyChoice, which offers several tools to aid in this endeavor (I have never used it).
  3. Another thing you can do is to prevent the depositing of those tracking cookies and you can do this by making changes to you web-browser.  This is something I do and quite simple to set up.  Just search for you specific browser the way to browse privately.
  4. Anonymous browsing.  According to the article he uses a TOR set up, which I have never used but may toy with sometime.  Apparently TOR protects you via encrypted pathways, thereby protecting the anonymity of your IP address.
  5. Anonymous browsing using proxies.  This is similar to StartPage’s (www.startpage.com) Proxy setting where you use StartPage’s resources to search for something without yielding your IP address.

Of course, there is always the use of a thumb drive being set up with another operating system and setting it in such a way that you save nothing, to be totally private.  I tried this with an old version of Linux when I was in college, but my computer kept locking up.  Just couldn’t figure out what was going on.  Apparently the thumb drive itself was not very compatible with Linux, so I changed the drive and it worked great.

Hope this is useful to you!

Resource: http://howto.cnet.com/8301-11310_39-57363219-285/five-smart-ways-to-keep-your-browsing-private/


Mobile Malware

I was reading an article on Help Net Security about malware and mobile devices.  Malware has, in effect, matured to such a place in its evolutionary cycle where they have grown in numbers that are staggering.  What makes things worse is the fact that both people, in general, and businesses, as a matter of habit, have entwined these mobile devices into their lives in such a fashion that they are a necessary tool and our life blood, so to say.

There is more malware than ever before which makes it difficult for the average user to know that they are safe from its potentially devastating effects.  Unfortunately, most people are oblivious to the potential attacks and problems, and in turn wonder why & how such a thing could have happened?

The next problem is the fact that malware is becoming smarter every day, some evolving into a polymorphic problem.  Cybercriminals are finding new ways to exploit vulnerabilities, which enable them to profit from our foolish endeavors.

The wall of protection is next to non-existent.  People are downloading and installing more applications (app) on their phone than ever before, which creates and cultivates a field of opportunity for cybercriminals.  I would be next to nothing for someone with the know-how to either create an app for mobile devices or crack one and reintroduce it into the app store.  Think about it, as of January 2011, there were approximately 90,000 apps for the iPad and roughly 475,000 for the iPhone; same time frame, there seemed to be about 250,000 apps for the android platform.  These numbers do not account for the other platforms out there in the market and I lean toward them because they are the most popular and growing in market share.  A malicious minded individual could have a field day with this by just injecting, or infecting, a few apps.

By researching the topic of the most popular apps, the ones that would cause the most devastation to people (business or common user) would be music related, social media, navigating, and games.  These seem to be, in my opinion, the most widely used by a large demographic of the mobile device carrying population.  This is not for fear for the purpose of generating fear itself, but rather to get you to think!  Your mobile device(s) are essentially a computer and no one I know would leave their computer unprotected these days – unless of course they never hooked up to the internet, just figure the odds on that?  Poking around I determined a guestimate that 90% of American Households posses at least one computer (this percentage seemed pretty constant) and approximately 75% of American Households have internet access (I saw a low of 62% and as high as 85%, so I went just above the average).  The funny thing is most people who do not posses a computer, even on the poverty line in the economic spectrum, seem to have the means to possess a smartphone.

Now, there are some free apps out there for protection and there are some for cost.  How good they are, your guess is as good as mine.  Perhaps the best place to check this out would be Consumer Reports or some thing like that.  Look into it and keep your stuff backed up so you can recover from something potentially catastrophic.

Until the next time my friends!