by Greg Scott | Jan 26, 2025 | Politics and Religion
In another of President Trump’s day-one executive orders, he offered pardons or commuted the sentences of every January 6 rioter. Every single one. These include: Enrique Tario, Proud Boys leader, serving 22 years for seditious conspiracy, David Dempsey, serving 20...
by Greg Scott | Jan 25, 2025 | Politics and Religion
Section one of the fourteenth amendment to the US Constitution opens with this sentence. “All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they...
by Greg Scott | Jan 25, 2025 | Politics and Religion
In Matthew 22:36-40, New International Version, Jesus makes a case for compassion. We should maybe consider listening more closely. 36 “Teacher, which is the greatest commandment in the Law?” 37 Jesus replied: “‘Love the Lord your God with all your heart and with all...
by Greg Scott | Jan 20, 2025 | Phish collection
Last Thursday, Jan. 16, 2025, I learned how to post a Facebook ad. Yes, I know I do technology for a living, and I’m sure I could have figured out what buttons to click on my own to set up an ad, but marketing is still foreign to me and I have no idea what makes...
by Greg Scott | Dec 27, 2024 | Who Says IT is Boring?
My phone rang the Saturday morning before Christmas, 2024, and I met Dave, a friend of a friend. Dave’s old desktop computer had died and he bought a new Windows 11 Dell Inspiron desktop from Best Buy, but he could not connect to the internet and could not load...
by Greg Scott | Dec 10, 2024 | Memoir
Sometimes inconsequential events in our lives stand out later as important milestones. I was nine years old in fourth grade In November, 1966, when I watched my very first Star Trek episode, The Corbormite Maneuver. I wasn’t old enough to join NASA and explore...
by Greg Scott | Nov 29, 2024 | Cybersecurity, Who Says IT is Boring?
In mid October, 2024, a few weeks before this writing, I posted “A SYN flood DDoS attack up close and personal.” In a DDoS (Distributed Denial of Service) attack, somebody orchestrates lots of systems to flood a victim with traffic, denying internet...
by Greg Scott | Nov 23, 2024 | Phish collection
Somebody impersonating TransUnion wants to steal my login credentials. This phishing attack works because I froze my credit with the major credit reporting agencies a few months ago after somebody with details on my credit history tried to scam me with a phone...
by Greg Scott | Oct 15, 2024 | Cybersecurity
I had heard about different DDoS attacks, including SYN flood attacks, for a long time. In fact, I got serious about cybersecurity in November, 2000 after I found my internet-facing DNS server an unwitting part a DDoS attack against the government of Brazil. In a DDoS...
by Greg Scott | Aug 23, 2024 | Phish collection
This Facebook phishing sample earns points for creativity. Create a Facebook profile named, “Deadline in 20 Hours: Additional Details Requested 91718809.” The number at the end gives it that official look. Nice touch. Go after author Facebook pages and...
Recent Comments