Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Hype Archives - fixedByVonnie
Blog Archives

Did you know Experian was recently hacked?

When you walk into a T-Mobile store or apply for a cellular plan online or over the phone, T-Mobile runs a credit check on to make sure you’re good for repayment.  But here’s the big news: if you applied between

Posted in News Tagged with: ,

Crypto 201: Public Key Infrastructure (PKI) – Cryptography for smarties (Part 1 of 3)

PKI with Vonnie, background image credit J. Triepke via Flickr

Cybersecurity gurus sometimes stumble over what SSL, HTTPS, TLS have in common.  Do you know the answer?  If you said the “S” then I’ll give you a gold star for being a smartie pants – but that’s not what I have in

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Welcome to Kali Linux (Part 3 of 3)

In the first guide, I gave you an overview of Kali Linux.  Then in the previous guide I showed you how to setup Kali Linux in VirtualBox.  In this guide, we’re going to log in Kali Linux, update the packages

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 2 of 3)

In the last guide, I gave you a sweeping overview of the powerful digital forensic toolset known as Kali Linux.  In this guide, I’m going to show you how to install Kali Linux in VirtualBox so you can have a test

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 1 of 3)

What’s your favorite hacker movie? Is it Iain Softley’s 1995 classic Hackers?  Or what about War Games or maybe you couldn’t get enough of Bruce Willis in Live Free or Die Hard? All these movies are great right?  They all tell

Posted in Linux, Security Tagged with: , , , , , , ,

Last updated by at .