The Tech-Support Phone Call Scam

At the heart of many cyber attacks are criminals attempting to fool you out of your money or trick you into giving them your personal information. Common examples of this are fraudulent e-mails, called phishing, that pretend to come from a person or company you trust, such as your friend or your bank. While such …

The Tech-Support Phone Call Scam Read More »

Why you should use proper SSL Certificates

A posting to Pastebin, by a group that calls itself “Cyber Warrior Team from Iran”, claims to have breached a NASA website via a “Man in the Middle” attack. The announcement is a bit hard to read due to the broken English, but here is how the SANS Internet Storm Center parsed the post:

Securing Your Home Wi-Fi Network

Wi-Fi networks (sometimes called by their technical name 802.11) allow people to wirelessly connect devices to the Internet, such as smartphones, gaming consoles, tablets, and laptops. Because Wi-Fi networks are simple to setup, many people install their own Wi-Fi networks at home. However, many home Wi-Fi networks are configured insecurely, allowing strangers or unauthorized people …

Securing Your Home Wi-Fi Network Read More »

Welcome to The Boiler Room…

… version 2.0. that is. This is my second attempt at this site. My first attempt went great… until a hard drive crash took down my new server before I had a chance to get the first backup. My goal with this site to share advice and information various things dealing with computer & Internet …

Welcome to The Boiler Room… Read More »

Scroll to Top