Marketing at its Best

Marketing at its Best.
Special Weekend Shared April 2021.

You have to give serious thought to advertise your work and Product without having to buy a lot of stats and other information.

You want it to be or feel natural, then it is my view to allow this to happen organically.

Tommy a Sunday Thought

Sunday Thought For Tommy in this Pocbooks Update Moment. Have a beautiful day and week.

Writers Technology Moment on Redundancy

Topic Writers History Technology Moment on Backups and Redundancy

Categories
Technology

WordPress Technology Moment Video

WordPress Technology Moment
This is and FYI for all you writers out there looking to get started with a website. No matter your age, there is a simple process for you. Here is a helpful tip. You can Share and Rumble this video here

His Love For His Children and Growth

A commentary interview reaction to what it takes to attain a wholeness in maturity and grow. Interesting conversation indeed.

Spiceworks IT Questions Help

Perceptive Readers Do you need a Free Community to get your IT Questions Answered? Then you have one that has been around since 2006: Spiceworks.com

Categories
Technology

The Truecrypt Encryption Era

From the July 8, 2015 archives

The Truecrypt Encryption Era – The Loss of the Era Explored Part 1

For Security Consultants and home users feeling comfortable with using Information Technology, It was a time of wisdom.

It was a time of practicality.

It was a time of good advice.

It was a time of data protection.

In the year 2004, when Windows XP was the popular operating system, the program called Truecrypt arrived on the scene.

People who were interested in the product were able to download, install it, implement the basic setup; and use it all under 30 minutes.

Still Truecrypt possessed powerful encryption features!

(Humor) Why back in the day, when you gave a laymen definition of encryption: “The process of converting something that is readable into unreadability. Only the right key can unlock the code to make it readable again.” – JAL; you would then show a Truecrypt picture.

For ones who want the technical education, see Dictionary of Networking published by Sybex.
Encryption: “The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. The reverse of this process is known as decryption.”

Truecrypt was programed with the ability to implement the following algorithms:
AES
Serpent
Triple DES
Twofish
AES-Twofish
AES-Twofish-Serpent
Serpent-AES
Serpent-Twofish-AES
Twofish-Serpent
A lot of choices to choose from for sure. Who developed Truecrypt? This seems to be a guarded secrete in itself and only those who need to know, know the names of the developers. This may or may not change in the future. The millions upon millions of downloads attest to the value of the developers work.

Now consider the questions below that will be answered in the next article:

  1. Why were people interested in this product?
  2. Why did some consultants recommend it?
  3. How did some consultants implement it?
  4. Are there viable choices consultants are recommending now?

Be sure to get your answers in the article
“The Truecrypt Encryption Era – Security and Peace of Mind Part 2”

Only at GEEK BRAIN DUMP!

Categories
Technology

Twitter Perceptive Readers Technology Video

What have you observed about Twitter? Here is an in-dept consideration of decisions they made as an IPO or public company.

Appreciating Your Golden Eggs and Goose

What is a story that helps us to think introspectively on patience and maintaining our appreciation in a matter that is common to all of us. Appreciating Your Golden Eggs and The Goose.

Categories
Technology

Systems Administration Skills and Judgment Calls

From the pocbooks.com archives (October 2014): Systems Administration Skills and Judgment Calls Notebook of IT

The purpose for this series of articles is to help with making good judgments in deciding what software and tools to use on your home and business network.

The situations Systems and Network administrators are encountering today is more complicated than what the general public believes.

“What do you mean? They teach students in school today how to setup a home network.”

Yes, in many schools, the curriculum includes using a computer, connecting to wireless networks and how to download apps. Hmm, well the students have already taught and graduated themselves in how to download apps.

All the same, this is not what I mean by complicated. The search engine definition for complicated is “consisting of many interconnecting parts or elements; intricate.”

There happen to be so many “interconnecting parts” (software) on the internet that the younger generation is viewing everything as safe.

“Hey, turn on this.” “Download that.” “Give access to what? OK, I will.”

The BYOD (Bring\Buy your own devices) can crash a network to a slow crawl or standstill and if you don’t have tools to track it down… let’s just say the network is no longer yours.

Will you face this Scenario?

Back in the days when the command line of choice was called DOS (Disk Operating System) for Windows computers, if you just purchased a 100 to 300 page manual on DOS you could track down and resolve problems on a LAN (Local Area Network). Back then, it was common for bots\hackers to scan websites, much like today, to find vulnerabilities. Once they found an open FTP (File Transfer Protocol) port they would break in and upload\store pirated movies on the server’s hard drives. Oooh wee! Your 100 gig hard drive storage that would take a life time to fill up was now loaded and part of a Darknet type of system.

Oh, the phones would ring off the hook. Why is the website slow? I can’t use the network! I bet your mother no longer wants you over for dinner!

So, you sit back and wonder how you are going to fix this problem? Oh, I forgot to add one more thing. Even though your webserver is hijacked, you don’t know at the time if this is really the problem. You don’t even know that the hard drive is filled up with movies because the hackers created an invisible directory.

What? How can an invisible directory be created and store more than 50 gigs of short movies on it without you knowing it? If the directory was invisible, how did you find it?

All good questions… And it will be shared with you what I, *cough*, I mean how a scenario like this can be solved.

In this “Notebook of IT” series, we will talk about the following topics noted below here at Geek Brain Dump. As I share some of these tidbits with you, it will also help US to remember and make good decisions when it comes to Systems administration. At times, I will make short videos to show you why a tool or choice is valuable. By no means do I know everything, but what I do know is that if you are managing a network, you should know what is going on with the software and traffic. This doesn’t mean you work 24 hours a day. It means, that if a severe threat comes along to your systems; and it will at least once in your IT career, you will have a step-by-step method to lock down your network, solve the problem(s), reestablish a baseline and get back up and running within hours if not less. CAVEAT: If the threat is that severe, you will be happy to resolve it by the COB (Close of Business)

These are some of the topics we will address:

 Firewalls
 Security
 Websites
 Virtualization
 Documentation
Tools
Disaster Recovery
Caution-What to watch out for
Until next week, have a good one; and for others, a cold one.