Skip to main content


Showing posts from April, 2020

What Do You Need? [List of Offered Services]

2023 Version is here, at this handy Notion Page.

Project: Optimizing Wi-Fi For a Residence.

 A 5-year old house is not quite optimized for ideal wireless setup. Let's help them. *Not an accurate representation to maintain security. Issue: The Wi-Fi router from Verizon is in the back of the house. Around 70% of the house can receive the signal, but not the office in the very front. Equipment: Netgear router (not extender) Netgear extender. Home router from Verizon Cable boxes Other things that use Wi-Fi.

What To Do When You're Done With LinkedIn [2021 Version]

You use LinkedIn because it's the biggest 'job networking' site on the internet. If you want a site that accepts multifaceted, interesting people, don't look there, look elsewhere: Twitter ! Twitter has... Great blocking and muting tools, from words to people. Lists to organize and sort. The ability to log into multiple Twitter accounts at once. Newsletter options, for us verbose people. You may be thinking "Twitter? But it's so..." casual? Genuine? That's what makes it great. For people like me who grew up in a wilder internet and find LI's culture stuffy (and racist , oop), Twitter ... can be just as racist, but at least you can call it out without repercussion. 

Hey, Internet, Show Me the Dark Fibre

I am doing a Pluralsight course - Designing Cisco Enterprise Networks: WAN for Enterprise Networks - and it mentioned a little something called Dark Fibre. That's a new term for me, and maybe for you as well. Let's research it. Dark Fibre is a bit of unused optical fiber. One can make a private fiber network with this, as it sounds like the dedicated telephone lines that companies can buy to connect sites that are miles apart. It has great potential for capacity . There seem to be many unused fiber cables out there, buried underground, as telecom companies apparently bought too much.  They may not sit unused for long, however, as with increased internet demand these days, content creators are demanding it.

How to Mitigate Zoom Hijacking

While in a Zoom meeting for assisting students during a turbulent time, after about 20 minutes, it was quickly taken over by 'pranksters' with inappropriate images. There was a flurry of the event hosts trying to pull up the settings to remove the troublemakers. The meeting was quickly retooled to put everyone on mute for the next round. A lot of people have been quickly thrust into this world of web conferencing, and selected Zoom, a software that works, but with little to no security. There's certainly no end to end encryption.  Why is this serious? Because video streaming uses UDP packets, and an attacker doesn't need all of them to get the gist of the information being transferred. I don't want to see people scramble to reestablish professionalism, so I made a quick guide. I downloaded this spyware Zoom onto a test phone and laptop to set up a test meeting: Auphelia Degardess is the name of the phone, and the one with the visual of myself. Mirr