Author: Jared Howe


Remember the uproar over SOPA a few months ago? Don’t look now, but there’s another bill currently being debated in the House of Representatives that some people are calling the next SOPA.

The House of Representatives is expected to vote on the cyber-security legislation Friday, despite claims from privacy groups and technology experts.


What Is WiFi?

If you’ve been in an airport, Starbucks, library or hotel recently, chances are good that you’ve been right in the middle of a wireless network. WiFi operates in more than 750,000 hotspots around the world. You also most likely have a wireless router/access point in your home which uses exactly the same technology.


WEP, WPA, WPA2 and Home Security

WEP and WPA are types of security that are used to protect wireless networks, including the one you may be using at home. This white paper provides details of each, and suggests why you might be safer using one over the other.

online tracking

What They Know About You

Do you know that when you visit any website, the website collects personal, identifiable information about you? Did you know that advertisers that post ads on those websites can use that information to track you as you surf the Internet? Most of us don’t really have any idea what information is being collected about us and what websites are doing with this information. What you don’t know may surprise and frighten you, because websites can identify you in many different ways, even if you take steps to protect your identity.

online privacy

Online Privacy and Behavior Profiling

Most of us are concerned about websites collecting information about us and using it for behavioral advertising. Further, we desire control over the collection and use of information about us, but we lack the knowledge and understanding about data collection practices and policies. This paper outlines the ways in which websites collect data from consumers, and what they do with it.


Firesheep is a software program that uses a packet sniffer to intercept unencrypted cookies from certain websites (such as Facebook...

DNS Spoofing

Assuming the DNS (Domain Name System) name of another system by either corrupting the name service cache of a victim...

Promiscuous Mode

A mode of operation where a device is configured to receive all data on a network regardless of its destination...


Irrelevant or inappropriate messages sent via email to a large number of recipients.  


Two or more computers which are connected.


Wide Area Network. A network that provides capabilities for a number of independent devices to communicate with each other over...


An electronic handheld device that functions as a mobile telephone, but also provides additional information accessing features, such as email...