Wednesday, February 22, 2012

The Lair of an IT Person

Every IT person needs their own lair. So, in honor of those lairs, I am linking to a post about the best ever potential super villain hideouts. If I was a super IT villain, I would put in a bid. http://www.cracked.com/article_19678_6-abandoned-places-that-will-make-awesome-supervillain-lairs.html

UNK Telecom on Facebook

We are on Facebook! Like us!

Friday, February 17, 2012

Guest Speaker: Bill Hagestad

Bill came and talked to the ITEC485 class on Cyberwarfare this week. His presentation made some of the students start pondering what small things they could do to help. The Internet is a vast and wonderful resource of information, but its international reach has interesting connotations. To see Bill (http://red-dragonrising.com) in action and discuss this in detail, join our program! #ITEC485 #cyberwarfare #degreeinnetworking

Tuesday, February 14, 2012

Botnet Software?

According to InfoWorld, a new software package has been developed. For only $2399 plus $125/mo, you can have an entire software suite dedicated to creating malware. The monthly fee includes tech support and access to forums. If this topic fascinates you, come join our discussion!

Monday, February 6, 2012

Layers 5 & 6

Two seemingly unimportant layers were intensely discussed today. Layers 5 & 6 get a lot of flack and some even say that they are unimportant. However, encryption and sessions lie within these layers. In a world of security, encryption is a very important aspect. Encryption is integrated into secure wireless, VPNs, and certificates. Sessions are also an important item to remember especially when pondering timeouts on web sessions like Facebook and Gmail. How does that login stay active? I would say that a session is established and that the sessions ends when the user either presses the logout button, the browser is closed or a inactivity timer fires. #ITEC485 #osimodel #networking #security