ntaylor

About Nick Taylor

Nick is an owner of netlogx, which he founded in 1998 with his wife Audrey Taylor.

netlogx is a Company to Watch

By |2019-10-10T08:27:09-04:00July 19th, 2013|

July 19, 2013 - On July 19th, it was our pleasure to host Bill Harlow of Katz, Sapper & Miller, and Tracy Pursell of Key Bank as they presented us with the Indiana Companies to Watch award for 2013. This annual award is given to successful second-stage companies that are gearing up to take off. [...]

Money can’t buy you love, but it can buy you (fake) twitter followers

By |2022-09-03T16:03:36-04:00July 18th, 2013|

Wow! It would appear that the latest bizarre twist in the world of social media belongs to twitter and, believe you me, I am glad, because I’m fed up with writing about the latest debacle at FB (can’t even bring myself to type the name today!). It goes like this: social media is apparently a [...]

The People’s Republic of Facebook

By |2022-09-02T20:40:41-04:00June 20th, 2013|

It’s very interesting that when the presidents of the United States of America and the People’s Republic of China recently met in California, we were told that on the agenda will be a discussion about China using cyber attacks on US companies and infrastructure. It’s interesting because in the same news cycle we were told [...]

WordPress Brute Forcing Exploit

By |2022-09-02T20:33:59-04:00April 23rd, 2013|

Summary: Brute Force attacks using over 90,000 IP addresses are being used to crack into administrative Wordpress accounts. Brute Forcing is a method of gaining access by using wordlists consisting of a wide variety of passwords or by generating random passwords to attempt to “guess” the password of an account. Protection Steps: Change passwords to [...]

It’s only Twitter!

By |2022-09-02T18:57:50-04:00November 1st, 2012|

Last week I wasted a few hours trying to understand what Twitter was doing about a direct messages spam problem that they have.  Here’s an article in information week about the problem.  http://www.informationweek.com/security/attacks/twitter-direct-messages-disguise-trojan/240007914 The answer in case you are interested is...nothing!  Oh, there are instructions on how to go in and delete all the direct [...]

Sloppy Chips!

By |2022-09-02T18:35:58-04:00August 16th, 2012|

Now this is hilarious…there is a new innovation in Computing know as…wait for it….Sloppy Chips. Now these are not to be confused with the sloppy chips that you can get from the fish and chip shop in my brother’s hometown of Standish. They are in fact the type of chip that may one day soon [...]

Quantum computing . . . the end of passwords!

By |2022-09-02T18:33:03-04:00August 2nd, 2012|

Quantum Computers are not like “normal” computers. They don’t use the transistors or chips that the machine that you are reading this blog on uses. They are designed to exploit the bizarre world of quantum mechanics and in particular these two concepts: Quantum superposition: This holds that physical systems, like an electron, exist in all [...]

People are honest. . .NOT!

By |2022-09-02T18:25:42-04:00June 28th, 2012|

People are honest, except when it comes to phones, apparently.   Symantec recently conducted a very interesting study into the weakest link in security – people. They did this by preparing 10 Smartphones to be “lost” by adding applications that would track what happened to the phones once they were found. They also made sure [...]

Internet Passwords

By |2022-09-02T18:24:49-04:00June 14th, 2012|

It’s about the security of everything you do. You will have read about the hacking of LinkedIn and the theft (because that’s what it is) of 6.5 million passwords. You will have gone in and changed your password on LinkedIn and you may have already forgotten it and had to change it again! You are [...]

Facebook. . .argh!

By |2022-09-02T11:54:06-04:00May 31st, 2012|

Those who know me know I loathe Facebook. Ignoring for the moment the moronic and slavish behaviors that it enables or drives, it is the internet equivalent of running with scissors. People will put information about themselves out there that they would not admit to in normal conversation. The problem with this is of course [...]

Go to Top