by Greg Scott | Jan 13, 2014 | Cybersecurity
The sensational IT security stories just seem to keep coming. Consider: Researchers at antivirus companies decoded a mysterious computer virus named Stuxnet, apparently authored by our own NSA and the Israelli government, designed to attack Iran’s nuclear...
by Greg Scott | Dec 24, 2013 | Cybersecurity
If you shopped at Target between 11/27/2013 and 12/15/2013, congratulations. Your credit or debit card info is one of around 40 million up for sale in a thriving underground marketplace complete with wholesalers, distributors, retailers, and easy to use websites. ...
by admin | Nov 26, 2013 | Slice of Life
This story is one example of many for what a dedicated IT professional does to keep current. The story started in April, 2013 when an opportunity to deliver a project based on a software product called RHN Satellite from a company named Red Hat came along. Large...
by admin | Oct 24, 2013 | Technology
My family is OK with health insurance coverage for now and I live in Minnesota, which has its own website for navigating the local healthcare marketplace, so I don’t need to deal with the US healthcare.gov website to find health insurance. But I was curious after...
by admin | Jul 30, 2013 | Cybersecurity, Slice of Life
I woke up today around 4 AM when one of our cats jumped on my stomach. By now, it’s a pounce and jump operation because he knows if I catch him, I’ll throw him across the room and bounce him off a wall. So he pops up from the floor to the window pane, pounces on my...
by admin | May 30, 2013 | Technology
I did a presales call with a small dentist office a few months ago. I have some dentist customers, so I’ve come to understand a little bit about how dentist offices operate. But this office was, well, different. The “server” was really an old, failing Windows XP PC...
by admin | May 13, 2013 | Technology
In part one of our computer detective saga, the story opened with a few users unable to access their emails. Similar to a Hollywood detective story, we followed the clues through several unexpected twists and turns, with each clue answering questions and generating...
by Greg Scott | Apr 27, 2013 | Technology
(Originally posted April 27, 2013 on my Infrasupport website when I was an independent IT consultant. I copied here and back-dated to match the original posting date.) I spent an awful day yesterday with Microsoft Office 2013 Home and Business Edition. Full...
by admin | Apr 7, 2013 | Cybersecurity, Slice of Life
(Originally published on my Infrasupport blog on April 7, 2013. I back-dated the posting here.) This story is personal. It is one of the best examples I’ve seen where poor IT security practices and the physical world collide and leave a trail of destruction. Way...
by admin | Apr 6, 2013 | Technology
This story is a great example of characterizing a problem, getting closer and closer to a solution with each step, and why the process is so important. The story flows like a detective novel, with Greg the gumshoe uncovering new clues with each new step,...
Recent Comments