Why should we not use “beef stew” as a password? It is not stroganoff! (strong enough) If you still do not understand the joke, stroganoff is a beef dish! If you are still interested in it, you can find many wonderful recipes online that will impress your friends and family! However, as the joke implies...Read More
Why did the PowerPoint Presentation cross the road? To get to the other slide! It all started in 1987, the birth of what we call PowerPoint. PowerPoint, a Microsoft product, is widely believed to be an invention by Bill Gates. However, it was actually founded by Robert Gaskins. It was also called “Presenter” and belonged...Read More
What do you call two monkeys that share an Amazon account for orders? Prime-mates! Amazon Prime is widely considered a service that disrupted the retail industry. Let’s cover a brief history of the Prime service and how it changed online commerce as we know it. Amazon Prime was launched in 2005 offering a free two-day...Read More
Have you heard of the new band in town named “999 Megabytes”? They are good but they do not have a gig yet! If you did not understand this joke, you need to get up to speed with bytes. At the very least, it will help you understand internet speeds and what you have been...Read More
The following is a project I conducted for a company who wanted to created a security council. The real life scenario was given to me below and I was able to to create a report to help justify and sell this need to the President of the company. Background The Office of the President of...Read More
The following is an example of a memorandum framework I created for an organization. Most of the information has been redacted to allow me to post it. TO: CISO FROM: Ravel Charles DATE: 1/13/2017 SUBJECT: Proposed Laws/Regulations and Frameworks Introduction/Purpose The following provides descriptions of proposed Law/Regulation and Control Framework/Standard that our company should consider...Read More
The following is a quick post about transport protocols. Whether you are a network engineer or a systems analyst, it is important to understand how data is transferred from system to system. I will be covering SSL and SSH in this post. SSH stands for Secure Shell and is a protocol that allows people to...Read More
What is the biggest lie you consistently tell without noticing? "I have read and agree to the Terms & Conditions" We are all guilty of being in a such a rush to read an article or use a service that we quickly click and accept the famed “Terms and Conditions” without even giving it a...Read More
The following is a quick post that outlines the Man in the Middle Attack. With technology evolving as fast as it does, it is important to understand the most popular attacks that exist out there. The issue with HTTP is that eavesdroppers can intercept your messages. This is problematic when it comes to sending confidential...Read More
For this post, I wanted to highlight why technologists have a good sense of humor! If you are familiar with the internet, at some point you would have seen an “HTTP” status code appear on your browser. HTTP stands for “Hyper Text Transport Protocol”. Consider HTTP the way that information is generally transported throughout the...Read More