That was how he got his name
During normal computer use, you suddenly notice a burning smell coming from your PC. However, there’s no smoke visible and your computer is running just fine. What’s should your next step be?
During normal computer use, you suddenly notice a burning smell coming from your PC. However, there’s no smoke visible and your computer is running just fine. What’s should your next step be?
One of your clients is suffering through seemingly random instances of the blue Windows Stop Error. The problem appears to occur without any warning, and your client has not been able to determine what might be causing the issue. The last instance of the Stop Error occurred earlier in the week. What is the best way to start resolving this problem?
You’ve been using your networked laser printer for a few months without a problem, but now you’d like to use a different tray than your usual paper source. However, you don’t see any options on the printer menu for the other paper tray. Which of these would be the most likely cause of this?
Wireless networks are very susceptible to wireless monitoring. In this video, you’ll learn how to capture packets on your wireless network and ways that you can protect yourself from wireless packet analysis on open WiFi networks.
CompTIA Security+ SY0-301: 3.4 – Wireless Packet Analysis Read More »
Initialization vectors are important to build strong encryption, but historical 802.11 WEP vulnerabilities were partly related to poor IV implementations.
CompTIA Security+ SY0-301: 3.4 – Initialization Vector Attacks Read More »
WiFi isn’t the only wireless network technology to gain the eye of the hackers. In this video, you’ll learn how Bluejacking can send unsolicited messages to other mobile devices and how Bluesnarfing was a significant security vulnerability on Bluetooth networks.
CompTIA Security+ SY0-301: 3.4 – Bluejacking and Bluesnarfing Read More »
The bad guys are always looking for an open network. In this video, you’ll learn how to automatically locate wireless networks over large geographic areas using wardriving, and the history of warchalking.
CompTIA Security+ SY0-301: 3.4 – Wardriving and Warchalking Read More »
In this video, you’ll learn how to identify wireless interference and some techniques you can use to minimize the amount of wireless interference on your network.
CompTIA Security+ SY0-301: 3.4 – Wireless Interference Read More »
An extra access point connected to your network creates a serious security concern. In this video, you’ll learn about the dangers of rogue access points and how the bad guys can watch you with their evil twins.
CompTIA Security+ SY0-301: 3.4 – Rogue Access Points and Evil Twins Read More »