WiFi 101 – Access Points, Wireless Routers, and Switching
How much do you really know about routers, access points and WiFi? When I arrived at this company, someone had mentioned that there were some wireless problems. Mostly with coverage but also with...
View ArticleSubnetting and Masks: Separating IPv4 Addresses for Security and Routing
Everything you ever wanted to know about subnetting and masks, also a few things you didn’t want to know, too. Some of you have probably heard of the term subnetting and some of you may even know what...
View ArticleSecure Shell: What is SSH?
Secure Shell or SSH is an encryption protocol for securing remote CLI shell access Recently, a co-worker or two overheard another colleague and myself talking about SSH (Secure Shell) and SSH’ing into...
View ArticleEnd and Not So End Device Security Best Practices
A crash course in securing network devices from the guy who secures all The SSL Store’s network devices A short time back, my colleague and tech blogger extraordinaire, Patrick Nohe, wrote an...
View ArticleIT Horror Stories: Tales of Wireless Interference
Our resident IT expert, Ross Thomas, recounts a couple of amusing Wi-Fi tales When I took this job nearly a year ago, there were some lingering wireless issues within our office. Just having come from...
View ArticleHow to read an Email Header
Not sure if an email is legitimate? Check the email header! Hey friends! There is some unfinished business in my blog series about email security and verification. This topic was considered during...
View ArticleHow to set up a DNS Server
A complete guide to spinning up your own DNS server. Odds are, if you have a computer and you find yourself on the interwebs Googling away, you have heard the term ‘DNS’. The fact is that without DNS...
View ArticleSSL/TLS Encryption and Email Servers
What you need to know about using SSL/TLS to encrypt connections made by your email servers When I was approached with the topic for this blog post, I happily agreed. Here’s some paraphrasing of how...
View ArticleMicrosoft Announces a New Email Filtering Option Based on DMARC Score
Research from Valimail indicates that domains lacking DMARC enforcement are nearly 4X more likely to get spoofed — how Microsoft’s new feature could help differentiate junk from legitimate emails Hey...
View ArticleAdvanced Encryption Standard (AES): What It Is and How It Works
Understanding advanced encryption standard on basic level doesn’t require a higher degree in computer science or Matrix-level consciousness — let’s break AES encryption down into layman’s terms Hey,...
View Article