Information Leakage From Radio-Frequency Emissions
If you’ve taken Learning Tree’s introduction to cybersecurity course, you may remember that it explains some ways attackers can see what a user types on a keyboard. Those are examples of “information leakage”. It also may be possible for an attacker to use an inexpensive USB radio dongle device or even-WiFi to capture and decode […]
PortableApps can save your Boss’s conference presentation
PortableApps allows you to present your content anywhere at anytime! PortableApps makes it easy for you to take required applications and content with you no matter where you go so that you can make the conference presentation successfully. Imagine, The Boss has an important conference presentation next week. Or maybe they have to deliver a […]
GPU Processing in R: Is it worth it?
It would be difficult for an R user not to have heard of GPU processing. In 2006, about seven years after it invented the GPU, Nvidia released the first incarnation of CUDA, the architecture that allowed scientists, engineers, and statisticians to use high-end graphics processors as pure floating-point number-crunchers. Today, Nvidia’s CUDA platform, specific for […]
How Should I Dispose of My Old Electronics (That May Have Passwords In Them)?
Recycling is good. I even wrote about recycling your devices a couple of years ago. Just recently the US Computer Emergency Readiness Team or US-CERT (part of the US Department of Homeland Security – DHS) issued Security Tip ST18-15 on Proper Disposal of Electronic Devices. Given that new “Tip” and the fact that this is […]
Which Linux Training Should I Select?
Linux skills are crucial today. The Linux Foundation has found that, “as of 2017, the Linux operating system runs 90 percent of the public cloud workload.” However, running a server means getting down into the details. The Linux command line is an alphabet soup of terse commands. It really does become intuitive at some point. […]