Posts

Showing posts from May, 2019

Raspberry Pi Information

Image
https://www.raspberrypi.org/

Technology Jobs

Technology jobs are everywhere. Most do not require a college education. Most jobs out there only require certification in a specific task or field. You can even just enlist in the military and get all the training needed for the job. Options include computer user support specialist, computer network support specialists, entry-level cybersecurity analyst, web developer, software engineer, I.T. manager, etc. All of these I found at Forbes here . Jobs you can get with a college degree can vary. Many of the jobs I listed happen to also be jobs you have a better chance at getting if you have a college degree. Enlisting in the military seems to me like the way to go. I am going straight to college and maybe am going to consider the military. In most cases, they will even pay for your college education. I want the fresh out of college me to decide if he wants to enlist in the military. Only time will tell.

Why Should You Be Careful What You Share Online?

With everyone getting social media accounts nowadays, they tend to post without thinking about their own privacy. Sharing pictures of your pets and including their names might sound like a great idea at the time; but what if this were one of your security questions on an account you just opened up. When creating an account for anything online, chances are the company will ask you to input answers to a couple of questions just in case you lose access to that account. Chances are when looking at someone's social media account, they have already answered a few of these questions unknowingly. These questions range from, "What was your mother's maiden name?" to, "What is your favorite movie?" Social engineering is what this practice is called. Sometimes the person is tricked into revealing these things. Other times, it may be purely coincidental. Be careful what you post or it will come back to bite you in the future. Click here for more about social engineering.

Installing Antivirus Software

Image

Why I Chose Cybersecurity As My Major

Image
Cybersecurity wasn't my first choice for a major. I had originally wanted to be an Electrical Engineer. Later on in life, I figured out that it involved more science than I was willing to learn. When searching for majors, I came across the fields of Information Technology. I was amazed at what could be done in the fields of technology beyond just using science. I stumbled upon Information Security or, in many schools, Cybersecurity by pure coincidence. At first, I thought, "I don't have the skillset for this kind of career." but then I heard an announcement on the school's PA looking for candidates for a Cybersecurity education pilot program. I decided to sign up and was accepted. It was an ok class but it taught me what I needed and that this was the field for me. After the program, I became more aware of what kinds of evils are in the world when it comes to computers. Nothing in this world is 100% secure. If someone wants to get to the information they are not s

How Efficient Is Using Three Monitors?

Image
I don't know about you but I currently have three monitors on my desk. I occasionally use one to do my homework and another to watch a video. The third monitor is just for if I need to look at a rubric. All three are Energy Star Certified though so I guess that is good. Every time I use a Chromebook, I think to myself, "Boy, this screen is small." but then I get over it after using it more. When I get into the field of Cybersecurity, I may use more than the three I am used to. All three of my computer monitors were given to me when a relative moved and had no need for them anymore. I took up this offer but over the years I have used them, I have noticed the subtle flaws in them. A dead pixel and a red pixel are just some of the flaws I have seen. They are a natural thing for any display so I couldn't complain. If you would like to know more about display technology, click here .

My Frustration With Video Editing Software

Image
I love technology but I cannot for the life of me figure out video editing and recording software. I tried recording my screen but couldn't figure out why my microphone wouldn't work. I may end up using my phone to record and uploading that way. When using the editing software, I couldn't find a way to do a voiceover. It takes too long to go over footage and nitpick at every single screwup I do. It seems to me that it might be user error at this point but I am too tired of screwing around to get it just right. My computer seems to be smarter than me. It would be easier to upload all the videos created and leave it to the end user to navigate through my mistakes. I appreciate everyone who works with these types of software for a living. I just wish it were easier for me. The editing software I was going to use can be found here .

What Is Ransomware?

Image
If you look up cybersecurity, chances are you have run across the topic of ransomware. Ransomware is a piece of malicious software designed to encrypt personal files and ask for a ransom to get the files back. Just recently, a ransomware attack affected computer systems of Baltimore, Maryland. This has forced the city to shut down normal operations and leaves residents unable to pay bills with the city. The most famous piece of ransomware was the WannaCry attack. WannaCry took advantage of a vulnerability in Microsoft Windows to infect and spread. This vulnerability was patched by Microsoft but a lot of the infected machine owners had not updated their system. These systems included systems found in the majority of UK hospitals. According to the Telegraph, the hack caused more than 19000 appointments to be canceled. Many blame the attack on the North Koreans but I am not sure if this is true. The moral of this blog post is to be smart and always update. If you want to learn more about

The Importance Of Cyber Security

Image
With our growing reliance on technology comes the concerns of security. Technology has allowed many manual processes to be automated. But what happens when the programmers of a certain application mess up and leave a hole for anyone outside to access information not to be shared with the public. This is where cyber security comes in. Often times someone in charge of a service unintentionally leaves a vulnerability for a hacker outside to find and expose or use to their advantage. Cyber Security is used to prevent or patch these flaws to protect information. This information may include an individuals name, phone number, credit card number, etc. Another concern is our reliance on technology for health monitoring and medical use. With these devices connected to the internet, one rogue or ignorant programmer could lead to information that shouldn't be shared to become public. If you would like to learn more about Cyber Security, click this link .