ntaylor

Home/ntaylor

About ntaylor

This author has not yet filled in any details.
So far ntaylor has created 32 blog entries.

Money can’t buy you love, but it can buy you (fake) twitter followers

Wow! It would appear that the latest bizarre twist in the world of social media belongs to twitter and, believe you me, I am glad, because I’m fed up with writing about the latest debacle at FB (can’t even bring myself to type the name today!). It goes like this: social media is apparently a [...]

By | 2016-12-05T11:11:55+00:00 July 18th, 2013|Categories: Risky Business, Uncategorized|Comments Off on Money can’t buy you love, but it can buy you (fake) twitter followers

Sister Mary Magdalene and her little known role in Project Management

Recently I had the pleasure of having lunch with a lovely lady that I know and she told me a wonderful tale and I want to share it. My friend, we’ll call her Grace, started by telling me....”I became a project manager in the 3rd Grade!”…so she had me hooked right away.  Here’s what happened: [...]

By | 2016-12-05T11:12:02+00:00 July 4th, 2013|Categories: Risky Business, Uncategorized|Comments Off on Sister Mary Magdalene and her little known role in Project Management

The People's Republic of Facebook

It’s very interesting that when the presidents of the United States of America and the People’s Republic of China recently met in California, we were told that on the agenda will be a discussion about China using cyber attacks on US companies and infrastructure. It’s interesting because in the same news cycle we were told [...]

By | 2016-12-05T11:12:11+00:00 June 20th, 2013|Categories: Risky Business, Uncategorized|Comments Off on The People's Republic of Facebook

WordPress Brute Forcing Exploit

Summary: Brute Force attacks using over 90,000 IP addresses are being used to crack into administrative Wordpress accounts. Brute Forcing is a method of gaining access by using wordlists consisting of a wide variety of passwords or by generating random passwords to attempt to “guess” the password of an account. Protection Steps: Change passwords to [...]

By | 2016-12-05T11:12:45+00:00 April 23rd, 2013|Categories: Protect Notices|Comments Off on WordPress Brute Forcing Exploit

Chromebooks and the future of the PC, we have all been here before!

Well I’m sure that you have all heard the drumbeat about the PC and how its days are numbered, even if Mr. Dell wants to buy his baby back.  It has been getting louder and louder and so we decided it was time to explore the world of Tablets and Chromebooks, and yes....the cloud! You [...]

By | 2016-12-05T11:13:11+00:00 February 28th, 2013|Categories: Risky Business, Uncategorized|Comments Off on Chromebooks and the future of the PC, we have all been here before!

To Russia With Love?!

There was a lot to be said for the plain old telephone service (POTS)! For a start the worst thing that could happen to you is that your conversation would be overheard. Now of course that could be by accident or by wiretapping. Either way it was generally accepted that to transact “real business” such [...]

By | 2016-12-05T11:13:47+00:00 December 6th, 2012|Categories: Risky Business, Uncategorized|Comments Off on To Russia With Love?!

It’s only Twitter!

Last week I wasted a few hours trying to understand what Twitter was doing about a direct messages spam problem that they have.  Here’s an article in information week about the problem.  http://www.informationweek.com/security/attacks/twitter-direct-messages-disguise-trojan/240007914 The answer in case you are interested is...nothing!  Oh, there are instructions on how to go in and delete all the direct [...]

By | 2016-12-05T11:14:03+00:00 November 1st, 2012|Categories: Risky Business, Uncategorized|Comments Off on It’s only Twitter!

Sloppy Chips!

Now this is hilarious…there is a new innovation in Computing know as…wait for it….Sloppy Chips. Now these are not to be confused with the sloppy chips that you can get from the fish and chip shop in my brother’s hometown of Standish. They are in fact the type of chip that may one day soon [...]

By | 2016-12-05T11:14:45+00:00 August 16th, 2012|Categories: Risky Business, Uncategorized|Comments Off on Sloppy Chips!

Quantum computing . . . the end of passwords!

Quantum Computers are not like “normal” computers. They don’t use the transistors or chips that the machine that you are reading this blog on uses. They are designed to exploit the bizarre world of quantum mechanics and in particular these two concepts: Quantum superposition: This holds that physical systems, like an electron, exist in all [...]

By | 2016-12-05T11:14:52+00:00 August 2nd, 2012|Categories: Risky Business, Uncategorized|Comments Off on Quantum computing . . . the end of passwords!

People are honest. . .NOT!

People are honest, except when it comes to phones, apparently. Symantec recently conducted a very interesting study into the weakest link in security – people. They did this by preparing 10 Smartphones to be “lost” by adding applications that would track what happened to the phones once they were found. They also made sure that [...]

By | 2016-12-05T11:15:15+00:00 June 28th, 2012|Categories: Risky Business, Uncategorized|Tags: , |Comments Off on People are honest. . .NOT!