Entries by Robert Siciliano

How to kick People off your Wi-Fi

If someone is “borrowing” your Wi-Fi service, there’s more to this than just the nerve of someone secretly mooching off of you. Their use of your service could interfere with bandwidth and mess up your connection. If they’re a bad guy hacker or even a skeevy child porn peddling pedophile and get caught, it can…

10 Home Security Mistakes we make

Please, be humble and consider the possibility that you—yes you—might be committing numerous home security mistakes—that could really cost you if you don’t correct them. House Alarm Turned Off Some people only activate it when they are not home and others only activate it when they are sleeping. The alarm should be on at all…

15 Home Safety and Security Tips

There’s always a perfect time to assess your home’s safety and security. Do you employ all of the following practices? Make sure your house’s roofing is fire resistant. If not, get it remodeled. Not only should you have smoke and carbon monoxide detectors, but you should also regularly inspect them for lint and dust buildup.…

Save Money with the Nighthawk 2-in-1 cable modem-router

If you are like most people, there are several devices in your home that fight for WiFi connections at any given time. This slows your network, and gives you a shoddy experience. Instead, look into upgrading your system immediately and save some cash too. The Nighthawk is a 2-in-1 cable modem-router that not only saves…

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently…

What’s in a Bugout Bag

There’s a name for the survival sack that you take with you outdoors in the event of survival emergency: bugout bag. Let’s start with the key components to net a three-day survival: Water: one liter per person per day Food: “energy bars” or backpack meals Small pot or large cup (though if you have only…

Phishing works and here’s why

A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it was sent by the…

Is that Viral Story real?

The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a bicyclist is obviously fake. Isn’t…