Blog Archives

Cryptolocker new and improved: Cryptowall 4.0

Image Credit Travis Wise via Flickr

It’s been a long day.  You’re tired… heck you’re exasperated.  You prop your elbows on your desk and sink your chin into both palms. What a pleasant respite from the day… today was nuts Suddenly an email pops in your

Posted in Mac OS X 10.9 Mavericks, Samsung Galaxy S4, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , ,

How to find and erase all the cookies on your computer

Finding the Cookies on your computer. Background cookie image via Flickr from Neil Conway

I love cookies.  Oreos are good; everyone loves those but believe it or not: they aren’t my favorite.  Walkers Shortbread cookies are also pretty damn good but they don’t take the gold in my book. The cookies I’m really digging these

Posted in Google Chrome, Internet Explorer 10, Internet Explorer 11, Internet Explorer 9, Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mozilla Firefox, Opera, Safari, Samsung Galaxy S4, Web Browsers, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: ,

Networking 400: Secret TCP three-way handshakes

TCP secret three-way handshakes

So we all know that IP addresses allow us to communicate across the network by telling us source and destination layer 3 addresses.  But that’s just one bitty part of network communication. If you’ve been following my blog you know IP addresses

Posted in Google Chrome, Internet Explorer 10, Internet Explorer 11, Internet Explorer 9, Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mozilla Firefox, Opera, Safari, Samsung Galaxy S4, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Wireshark 301: Spying on what people are downloading (Part 1 of 2)

Wireshark Advanced

Wireshark can’t make sense of encrypted traffic which is why we should also make sure sensitive traffic is encrypted.  Wait.. wait.. there is one way to view encrypted traffic in Wireshark.  If the attack was able to acquire the private key file,

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Samsung Galaxy S4, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Wireshark 201: Intermediate Customization

Wireshark Level 2

Wireshark! Don’t get bitten. Wireshark will definitely bite you in the butt if you don’t know what you’re doing.  The program is daunting.  It’s scary.  Let’s be honest here: there’s so many colorful rows, network data and obscure text that

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Samsung Galaxy S4, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Last updated by at .