Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Internet Archives - Page 2 of 9 - fixedByVonnie
Blog Archives

Crypto 201: Public Key Infrastructure (PKI) – Cryptography for smarties (Part 2 of 3)

PKI with Vonnie, background image credit J. Triepke via Flickr

Ahh, the Public Key Infrastructure.  It’s sounds monolithic doesn’t it? That’s because it is.  Don’t try to understand it by yourself. You need an expert.  You need Vonnie.  You need to read on playa.

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Crypto Hypno: Cryptography basics (Part 5 of 5)

Crypto Hypno

Ahh the refreshing scent of cryptography.  It’s like a fresh rose on valentines day. In my last post you learned about VPNs.  I showed you the nitty gritty itty details about the protocol and both phases (hopefully you didn’t phase out

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, What Is, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 4 of 5)

Crypto Hypno

If you’ve been following this series from its infancy, you should already know the basics of encryption, symmetric/asymmetric encryption, and message hashing.  Today we’re going to tie everything together in tidy little bow.  You’ll learn about the two primary ways we

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Crypto Hypno: Cryptography basics (Part 2 of 5)

Crypto Hypno

In the first part of our series on cryptography, you learned about the data plane, control plane and management planes.  The data plane is when all the bits board first class and fly to some exotic location in French Polynesia.

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

How to destroy a router with DHCP Starvation

DHCP

Today I’m going to show you something dangerous. Really dangerous.

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,