background preloader


This Siemens M75 is Bluejacking the Sony Ericsson K600i pictured below This Sony Ericsson K600i is getting Bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Origins[edit] Bluejacking was reportedly first carried out by a Malaysian IT consultant who used his phone to advertise Sony Ericsson. Usage[edit] Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth. See also[edit]

Bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant.). This allows access to a calendar, contact list, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device. Current mobile software generally must allow a connection using a temporary state initiated by the user in order to be 'paired' with another device to copy content. Any device with its Bluetooth connection turned on and set to "discoverable" (able to be found by other Bluetooth devices in range) may be susceptible to Bluejacking and possibly to Bluesnarfing if there is a vulnerability in the vendor's software.

What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. In the example of the simplest network where computers share an Ethernet wire, all packets that travel between the computers are "seen" by every computer on the network. A slightly safer environment is a switched Ethernet network. There are ways to hack the switch protocol, however. These programs can also be used on the Internet to capture data traveling between computers. A packet sniffer is not just a hacker's tool. The best defense against eavesdropping is a good offense: encryption.

Hacking for Beginners One of the best things about computers is how dynamic they are. There is so much information about computers and it changes constantly. As a hacker, you are at the leading edge of changes to technology. This makes it a very exciting and interesting field of study and can even lead to some awesome job opportunities as a computer security expert. Hackers are often misrepresented as “evildoers” bent on stealing money and personal information from individuals and businesses. White Hat Hackers are benevolent security experts that do not seek profits from illegal network access. Black Hack Hackers are the people who use their knowledge of computers for illegal or unethical purposes. The point – use your computer knowledge to promote learning and security; not to be a thief or criminal. By “thinking outside the box,” hackers are able to solve problems and accomplish mundane tasks more efficiently by leveraging their knowledge of computer systems. Programming Network Hacking

FREE Computer Training - Computer Repair Classes - Laptop Repair Instruction - Data Recovery Lessons - Web Design Seminars - Computer Security Counseling Hyper-V Hyper-V, codenamed Viridian[1] and formerly known as Windows Server Virtualization, is a native hypervisor; it can create virtual machines on x86-64 systems.[2] Starting with Windows 8, Hyper-V supersedes Windows Virtual PC as the hardware virtualization component of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual machines to one or more networks. Hyper-V was first released along Windows Server 2008 and became a staple of the Windows Server family ever since. History[edit] A beta version of Hyper-V was shipped with certain x86-64 editions of Windows Server 2008. Microsoft provides Hyper-V through two channels: Part of Windows: Hyper-V is an optional component of Windows Server 2008 and later. Hyper-V Server[edit] Hyper-V Server 2008 was released on October 1, 2008. Hyper-V Server 2008 R2 (an edition of Windows Server 2008 R2) was made available in September 2009 and includes Windows PowerShell v2 for greater CLI control.

10 best practices for successful project management The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. Given the high rate of project failures, you might think that companies would be happy to just have their project finish with some degree of success. Note: This article is also available as a PDF download. 1: Plan the work by utilizing a project definition document There is a tendency for IT infrastructure projects to shortchange the planning process, with an emphasis on jumping right in and beginning the work. Project overview: Why is the Exchange migration taking place? 2: Create a planning horizon 3: Define project management procedures up front

Cloud Storage and Backup News, Reviews and Promos - Cloud Storage Buzz Preparing for the Windows 10 Upgrade: What Your PC Needs | Windows 10 content from SuperSite for Windows Any version of Windows just performs better on newer equipment. That's a given. But, with Windows 10 so close to its official upgrade rollout, you might be wondering if your old PC can work adequately with the upgrade. The last thing you want (and Microsoft wants) is to have a horrible experience with this reported fantastic new operating system. Here's the minimum specs you need for the upgrade: A PC running Windows 7 SP1 or Windows 8.1 Update A processor that is at least 1 GHz Depending on your PC architecture: 1 GB of RAM for 32-bit or 2 GB of RAM for 64-bit Also, depending your PC architecture: 16 GB of hard disk space for 32-bit or 20 GB of hard disk space for 64-bit A graphics card that supports DirectX 9 or later with a WDDM 1.0 driver A display that supports at least 800x600 Remember, these are minimum specs.

Cheat Sheets Download All (.zip) Wall Posters (36" x 24") Interior Gateway Protocols v1.0 (1 page) Protocols v2.1 (2 pages) v2.1 (1 page) First Hop Redundancy v2.0 (1 page) v2.2 (2 pages) IPsec IPv4 Multicast IPv6 v2.0 (2 pages) v1.2 (1 page) v1.1 (1 page) Spanning Tree Applications Wireshark Display Filters scapy tcpdump Reference Common Ports IOS IPv4 Access Lists IPv4 Subnetting Syntax Markdown MediaWiki Technologies Frame Mode MPLS IOS Zone-Based Firewall QoS VLANs Voice VOIP Basics Miscellaneous Cisco IOS Versions Physical Terminations

33 Digital Tools for Advancing Formative Assessment in the Classroom I came across a great blog post the other day – Formative Assessments Are Easier Than You Think – that told the firsthand account of a teacher, Steven Anderson, who implemented formative assessment in his classroom. He used a sticky-note version of an exit ticket to elicit evidence of student learning and in his words, “what a difference that made.” Formative assessment is ‘easier than you think’ and with all the digital tools and apps now available for mobile devices it’s even easier. We’ve shared some digital tools before and with the five tools that Steven shared combined with our earlier suggestions there are now 33 digital tools that we’ve uncovered that are free or inexpensive and help teachers implement formative assessment in their classrooms. Here they are: A few of Steven’s discoveries: Lino – A virtual corkboard of sticky-notes so students can provide questions or comments on their learning. Poll Everywhere – Teachers can create a feedback poll or ask questions. Pick Me!

IP subnetting made easy George Ou explains IP subnetting using his own graphical approach. It's a great primer for students and a nice refresher for others. IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. IP addresses and subnets Although IP stands for Internet Protocol, it's a communications protocol used from the smallest private network to the massive global Internet. ...increment 252 hosts... ...increment 4+ billion hosts... The word subnet is short for sub network--a smaller network within a larger one. Subnets have a beginning and an ending, and the beginning number is always even and the ending number is always odd. The graphical subnet ruler Over the years, as I watched people struggle with the subject of IP subnetting, I wanted a better way to teach the subject. Note that for every bit increase, the size of the subnet doubles in length, along with the number of hosts. IP classes made simple