The Internet has its own set of norms and acceptable behaviors.  We know these collectively as netiquette.  Please take a moment to familiarize yourself with these essential rules.  They will make communication online much easier for you.  It also help in avoiding Internet trolls. The use of ALL CAPS in email is like shouting Refrain from using multiple question marks and exclamation points consecutively. Watch your tone. Email is written, not verbal communication. Check your spelling. Everyone deserves your best effort to make sure they have an easy to read email from…

Continue reading

I found this on thenetworkadministrator.com.   Q: My Etch-A-Sketch has funny little lines all over the screen. A: Pick it up, turn it upside down, and shake it.   Q: How do I turn my Etch-A-Sketch off? A: Pick it up, turn it upside down, and shake it.   Q: What's the shortcut for Undo? A: Pick it up, turn it upside down, and shake it.   Q: How do I create a New Document window? A: Pick it up, turn it upside down, and shake it.   Q: How…

Continue reading

I am busy writing things lately. I am working on a professional statement and on writing an article on emerging technology for Certification magazine.   I am compiling a list of technologies that those in IT should be aware of. So far I have the following:  RFID (Radio Frequency Identification) VoIP (Voice over IP) Wireless 802.11n SOA (Service Oriented Architecture) EAI (Enterprise Application Integration) I will be adding a few more before the article is done. If you have a suggestion, just comment or email me. When I was choosing…

Continue reading

I was admiring the new switch with my brother and I thought about the 802.11g router that is sitting on top of the switch.  I want to upgrade to 802.11n but I do not want to buy any pre-n devices.  The pre-n devices will never be as compatible with future devices as the true n devices but it seems that I will have to wait until the end of 2006 or the beginning of 2007 for the standard.  Maybe next year I will be connected using an "n" card. The…

Continue reading

I was made aware of this little creature on the CWNP forums and it seems quite cool.  The Nabaztagtag WiFi Rabbit is a small wireless rabbit that can receive messages, read your email, music, tell you the weather and time, measure air quality, as well as a variety of other programmable tasks.  It is definitely not a necessity, but certainly a cool geek toy. Future versions of the Nabaztagtag WiFi Rabbit will be able to do pre-programmed activities when a RFID-enabled object is held up to its nose. Here is the…

Continue reading

I am really cutting this close.  The CWSP test changes on January 1 and I just scheduled the test for December 21.  I am going out of town from the 24th to the 1st so this is really my only chance.  I must study very hard and pass it the first time.  I am feeling pretty good about the material right now but I have not taken any practice tests yet.  I am going to try that tonight. I am working on the midterm exam for the OS class today. …

Continue reading

For cybersecurity teams to achieve their goal of securing information and systems, they must motivate their staff.  Motivation is what causes people to behave in a certain way.  To be an effective motivator, you must understand the various theories and strategies for motivation.  Creating a positive environment in the workplace is also key in motivating employees. Many theories have been developed to help explain how people are motivated.  These theories are not applicable to any environment, but they do give us a better knowledge of how people are motivated.  Years…

Continue reading

Professor Hale was out last week so I was teaching his class in addition to my own.  I actually enjoy teaching programming but teaching two classes at the same time can be stressful.  Each class meets for several hours in the morning and at night. I had an odd experience on Monday.  Three of the students said that they were going to leave early and I thought they were joking.  I was about to cover some new material that day so it was certainly not a day anyone would want…

Continue reading

Kent State University is hosting me today to talk about penetration testing and what it can do for your company security.  The topic is titled “Penetration Testing: A proactive approach to secure computing” and the slides are provided below. Penetration testing: A proactive approach to secure computing – Eric Vanderburg – Kent State University from Eric Vanderburg
I am studying to take the CWNA (Certified Wireless Network Administrator) exam.  I plan on taking it in 3 weeks and I have been studying for 2 so far.  I usually spend a little more time on a certification but I am teaching a computer hardware course in 3 weeks and I want to have this certification behind me so I can concentrate on the class.  I found an online study group which has not worked out well so far but I hope to have more communication in the future. …

Continue reading