Showing posts with label tony fortunato. Show all posts
Showing posts with label tony fortunato. Show all posts

Thursday, January 29, 2026

The Case for the Post-Install Check-In


The Case for the Post-Install Check-In

Installing new network gear can feel like crossing the finish line of a marathon. The link comes up, the lights blink happily, and there’s a strong urge to declare victory and never look back. But that’s exactly why post-install check-ins matter. An install isn’t really done when the hardware is mounted and powered on — it’s done when you know it’s behaving itself in the real world, not just during that first five-minute victory lap.

In this case, I followed up on a Ubiquiti Wave Pro link after the install, fully expecting to see a calm, stable connection living its best life. Instead, I found the link hopping frequencies like it had too much caffeine. On paper, everything looked “up,” but under the hood the radio was changing channels far more often than it should. If I hadn’t checked back in, this would have quietly turned into intermittent performance issues and finger-pointing later on.

The Case for the Post-Install Check-In
That’s the sneaky danger of skipping follow-ups. Many problems don’t show up immediately — they creep in once the link starts dealing with real interference, weather changes, or other radios in the area. A post-install review lets you catch these early warning signs while they’re still small and fixable, instead of waiting for a user to report that “the network feels weird sometimes,” which is never a fun troubleshooting starting point.

Following up also gives you a chance to validate your original assumptions. Maybe the spectrum looked clean during the install, but reality had other plans. Maybe auto-settings are being a little too enthusiastic. Checking back confirms whether the configuration you chose is actually the right one, or if it needs tuning. It’s like going back to tighten the bolts after a test drive — boring, but extremely effective.

In the end, checking on equipment after an install isn’t about mistrusting your work — it’s about respecting physics, RF chaos, and the fact that networks love to misbehave when you’re not looking. That quick follow-up on the Wave Pro link turned a potential future outage into a simple adjustment. And honestly, that’s way better than getting a call later that starts with, “So… this has been happening for weeks.”



Introduction: Moving Beyond Basic Benchmarking
For network engineers, relying solely on basic single-stream iPerf or simple ping output often fails to capture the true performance characteristics of a network path, especially under load. This is where FLENT (The FLExible Network Tester) comes in.

click on the image to read the article 


Wednesday, January 28, 2026

Cudy AX3000 Review - The Setup

 

Cudy AX3000 Review - The Setup

Based on some limited research, I picked up a "Cudy AX3000 Multi Gigabit Dual Band WiFi 6 Mesh Router" from amazon.

https://www.cudy.com/en-us

Cudy AX3000 Review - The Setup

I wont bore you with the whole 'unboxing' speech, but there's a lot to be said for a company that packages a product that doesn't

require a class in vendor unpackaging to get to the product.

It came with an installation card, ethernet cable and power supply.

Keeping in the spirit of your typical IT install, I chose to ignore the instructions and wanted to see how far I can get without having to resort to reading the manual. ;)

 

I connected the unit's internet port to my cable modem using the provided cable and plugged my laptop into the LAN port. After about a minute, I checked my and my address was on a 192.168.10.0/24 subnet with a default gateway of 192.168.10.1.

Cudy AX3000 Review - The Setup

I figured I will try to access the internet and was a little disappointed that it it didn't work and I noticed the globe with the circle/line through it. 


This is important for me to know in case i consider this for some of my clients and friends who are further than a short drive away.


I figured I will just type the router IP address into my browser to see if I can access the router, or if I will be forced to download an app.  Cool, the browser loaded this page.

Cudy AX3000 Review - The Setup

Its nice to see the vendor forcing you to change/create an admin password with some suggestions on creating a strong password.

I created my new password and was then prompted with a setup/captive portal.

Again, its important to me to know that until you create your password and go through the install screens, you will not have internet access.

Since my set up was DHCP based, I basically clicked by about half a dozen screens and completed the install.

Cudy AX3000 Review - The Setup
As a side note, I found it interesting that the router had a few setup options that could help me out in the future.

Wireless access point in particular would be cool.  Currently, if I need a wireless access point and only have a residential router available, I disable DHCP and use the Lan port to connect to the current network.


Cudy AX3000 Review - The Setup
After the install, I ran a quick Wireshark capture and noticed it was sending out IGMP packets.

I've seen IGMP enabled on a lot of residential routers and get annoyed when there isn't a way to disable IGMP. I figured "what the heck" lets see if Cudy allows me to disable it. I was pleasantly surprised when I quickly found the setting and disabled it.

The only other thing I did was change the SSID's and passwords.

Here's an interesting note: I chose to disable auto firmware updates so I could do it myself. I intentionally downloaded the incorrect firmware and was impressed that it did not blindly accept it. 

 The only thing worth noting was that after the firmware upgrade the password for my 2.4ghz SSID was a series of randomized characters, so I simply changed it back.  I only noticed because some IOT devices reported being offline after the firmware upgrade.

As far as WiFi performance goes, it did outperform my previous lab wireless router by 50 Mbps up and down as well as added some solid coverage to 2 spotty areas.

I tried to keep the first write up short and plan to do more based on different features and scenarios, so let me know if you like this format.  

For example, the next thing I want to set up is the various flavors of VPN server, VPN client and VPN tunneling, bandwidth control...

amazon.com link: https://amzn.to/3N7pooH

amazon.ca link: https://amzn.to/3YZoCg5


Cyber Leaders Podcast

Cyber Leaders Podcast


Tuesday, January 27, 2026

Free Stanford AI Course - Computer Vision (CS231N)



If you’re fascinated by the technology that enables computers to “see” and understand images, this Stanford CS231n: Convolutional Neural Networks for Visual Recognition YouTube playlist is a must-watch treasure trove of knowledge. This curated series of lecture videos brings to life one of the most influential deep learning courses ever created — the one that helped shape modern computer vision. Whether you’re a student, engineer, or AI enthusiast, you’ll find content that’s both inspiring and deeply informative. 

What sets this playlist apart is the balance of rigorous academic insight and hands-on practical examples. Taught by Stanford professors who helped pioneer the field of deep learning for vision, the lectures take you step-by-step through core concepts like convolutional neural networks (CNNs), image classification, localization, object detection, and much more. You’ll gain both the theory and intuition behind the models that power today’s advanced computer vision systems — from autonomous vehicles to facial recognition and beyond. 

One of the greatest benefits of this YouTube playlist is its flexibility. You can learn at your own pace, revisit complex topics whenever you need, and follow along with real code examples and visual demonstrations. There are no deadlines, no tuition, and no rigid classroom structure — just world-class deep learning instruction available to you anytime, anywhere. It’s like having a Stanford computer vision class on demand. 

In a world increasingly driven by visual data and intelligent systems, mastering CNNs is one of the most valuable skills you can develop. Whether you’re building your first project or preparing for a career in AI, this playlist gives you the conceptual foundation and practical confidence to succeed. Dive in today and explore the frontiers of computer vision with some of the leading minds in the field. 

Link to video


HTTPS certificate industry phasing out less secure domain validation methods

https://security.googleblog.com/2025/12/https-certificate-industry-phasing-out.html




Monday, January 26, 2026

Why Your EdgeRouter Deserves Proper Name Resolution

If you’ve ever stared at your equipment logs trying to figure out which mystery IP address belongs to which device, you already know the pain. Enabling name resolution turns that mess of numbers into actual, human-readable names. Suddenly, instead of “192.168.1.37 did something suspicious,” you see “printer-that-shouldn’t-be-talking-at-3am.” It’s an instant quality-of-life upgrade that makes troubleshooting faster and a lot less rage-inducing.

I did some homework on the Ubiquiti Edgerouters that i manage and found something cool. That’s where **dnsmasq** really earns its keep. It acts as a lightweight DNS and DHCP helper that automatically ties IP addresses to hostnames. Devices grab an address, dnsmasq remembers the name, and your router logs suddenly make sense. No more keeping a separate spreadsheet titled “IPs I Hope I Remember.” It’s like giving your EdgeRouter a cheat sheet for your own network. It also helps resolve names for devices that are not configured in your DNS server like cameras and printers.

Another big win is troubleshooting speed. When name resolution is enabled, firewall logs, traffic stats, and diagnostic tools become way more readable. Instead of mentally translating IPs back to devices, you can immediately see who’s doing what. That means less time decoding numbers and more time actually fixing the problem—or pretending you fixed it and going for coffee.

Best of all, enabling name resolution with dnsmasq is one of those rare networking tasks that delivers big results for very little effort. A small config change makes your network easier to manage, easier to explain, and easier on your sanity. Your EdgeRouter already knows what’s going on; dnsmasq just helps it talk to you in plain English instead of fluent IP-address-ese.

In the video below, I use Wireshark to learn and confirm if the config change actually works.






Thursday, January 22, 2026

What is 5G Network Slicing

 

What is 5G Network Slicing

From the NETSCOUT blog “What Is Network Slicing” explains how network slicing—a cornerstone capability of 5G networks—creates multiple isolated, logical networks over a single physical infrastructure to meet diverse service demands like ultra-low latency, high bandwidth, and massive device connectivity, unlocking new business opportunities and optimized experiences for enterprises and consumers alike. 

The post breaks down how network slicing works across radio access, core, and data domains, highlights key use cases (from IoT to gaming to autonomous systems), and underscores its benefits in generating revenue, improving service quality, and reducing costs. NETSCOUT also showcases its 5G solutions that provide visibility, automation, and SLA assurance for managing and scaling these slices, encouraging organizations to leverage this transformative technology for competitive advantage.

click on the image above to read the blog



Let us know if you have any technical sites or documents you like to read by using the Contact us section in the top right corner.

What is 5G Network Slicing


Wednesday, January 21, 2026

Screenshot or It Didn’t Happen: Why Install Notes Save Your Sanity

 

Screenshot or It Didn’t Happen: Why Install Notes Save Your Sanity

There’s nothing quite like finishing a hardware install and thinking, “I’ll remember how I set this up.” Spoiler alert: you won’t. That’s where documenting installation details comes in—especially screenshots. 

In my recent Ubiquiti PowerWave radio deployment, every screen grab became a tiny insurance policy against future confusion. Instead of relying on memory (which fades faster than a 5 GHz signal in a concrete building), I captured exactly what the device looked like when everything was working.

Screenshots are especially valuable with gear like Ubiquiti radios, where settings can be buried three menus deep and labeled just differently enough to make you question your life choices. By documenting things like firmware versions, link status, frequencies, power levels, and alignment screens, you create a visual baseline. When something breaks later—and it will—you have a known-good reference instead of guessing what “normal” used to look like.

Another big win is troubleshooting and support. When you open a ticket or loop in another tech, screenshots instantly bring anyone up to speed. Instead of long explanations like “the link was green-ish but only on Tuesdays,” you can just attach proof. In the case of PowerWave radios, having screenshots from the install makes it much easier to spot what changed: a channel width, a DFS event, or a firmware update that quietly flipped a setting behind your back.

Finally, good documentation is a gift to your future self—and to anyone else who has to touch the system later. Whether that’s six months from now during a storm-induced outage or two years later when someone asks, “How was this originally configured?”, your screenshots tell the story. Taking a few extra minutes during the install can save hours of head-scratching later. In short: document early, screenshot often, and let your past self do your future self a solid.





Tuesday, January 20, 2026

Free Stanford AI course - ML from Human Feedback (CS329H)


If you’re ready to build a solid foundation in machine learning, this Machine Learning Fundamentals YouTube playlist is one of the best free resources available online. Carefully curated to guide learners step by step, this collection of videos breaks down complex algorithms and concepts into clear, digestible lessons. Whether you’re just starting out or want to strengthen your understanding before diving into advanced topics, these lectures will equip you with essential tools and intuition for real-world machine learning. 

What makes this playlist especially worthwhile is its structured progression through key topics like supervised learning, classification, regression, clustering, evaluation metrics, and optimization techniques. You’ll find that each video builds on the last, making it easy to follow along even if you’re new to the field. The explanations are framed in a way that balances theory with practical insights — so you’ll not only know what works, but why it works.

Another great advantage of this playlist is its learning flexibility. Because it’s hosted on YouTube, you can watch at your own pace — rewind tricky sections, skip ahead when comfortable, and revisit lessons whenever you need a refresher. This makes it perfect for self-paced learners, busy professionals, and students who want a structured yet flexible way to absorb fundamental machine learning skills without the pressure of exams or fixed schedules. 

In today’s data-driven world, understanding machine learning isn’t just an advantage — it’s becoming a necessity. Whether you’re aiming for a career in data science, software engineering, or research, this playlist gives you a solid foundation to build on. Ready to take your first step into the world of intelligent systems? Start watching this machine learning fundamentals playlist today and unlock the concepts that power modern AI.






Monday, January 19, 2026

How Windows Notepad Sabotages Your Bash Scripts (Without Even Trying)

bash scripting

If you’ve ever written a perfectly reasonable Bash script on Windows, copied it to a Linux box, and been greeted by a mysterious ^M or a “bad interpreter” error, congratulations—you’ve met the joys of line endings. Windows Notepad loves to use CRLF (Carriage Return + Line Feed) to end lines, while Linux expects a simple LF. To Linux, those extra carriage returns are like unexpected speed bumps, and your script trips over them before it even gets started.

The problem is that Bash is very literal. When it reads #!/bin/bash^M, it doesn’t politely ignore the weird character—it assumes you’re asking for an interpreter that doesn’t exist. From your perspective, the script looks fine. From Linux’s perspective, it’s wearing Windows shoes on a hiking trail and wondering why everything hurts.

This is where plain old Windows Notepad really shows its age. It’s great for quick notes and passive-aggressive reminders, but it has zero awareness of Unix-style formatting. So you end up writing valid Bash logic that’s wrapped in invalid line endings, and the script fails in the most confusing way possible. Nothing like spending 20 minutes debugging code that’s technically correct but formatted “wrong.”

Using Notepad++ is how you avoid this whole mess. It understands that different operating systems have different expectations and lets you save files with Unix (LF) line endings. That one small setting turns your script from “Why won’t this run?” into “Oh wow, it just works.” Moral of the story: write your Bash scripts with tools that speak Linux, or at least have the decency to translate—your future self will thank you.

Here are the links 

Mobaxterm https://mobaxterm.mobatek.net/

Notepad++  https://notepad-plus-plus.org/







How Real-Time Observability Protects Manufacturers in a Disrupted World

Keep Manufacturing Operations Secure and Resilient




Friday, January 16, 2026

from the web: Cisco IP Source Guard (IPSG) and configuration

From the website:  "IP Source Guard is a security feature on Cisco switches designed to prevent IP address spoofing attacks. It restricts IP traffic on untrusted switch ports by filtering traffic based on the DHCP snooping binding database or manually configured IP-to-MAC bindings."

In January 2026, Internetworks published several networking tutorials focused on advanced IPv6 and routing topics. The January 15 post explains IPv6 route redistribution between different routing protocols like EIGRPv6, OSPFv3, and RIPng, highlighting how to configure redistribution so routes can be exchanged between these protocols in an IPv6 environment. It emphasizes planning to avoid routing loops and using filtering, metrics, and administrative distance adjustments to control the redistributed routes, and includes an example configuration with multiple routers running EIGRPv6, OSPFv3, and RIPng working together.

Earlier in the month, January 12 featured a tutorial on IPv6 EIGRP, detailing the next-generation implementation of Cisco’s Enhanced Interior Gateway Routing Protocol for IPv6. This explained its advantages—such as rapid convergence and separate protocol instances for IPv6—and showed how to enable IPv6 EIGRP on interfaces with addressing and configuration examples. January 4 covered Cisco IP Source Guard, a security feature that prevents IP spoofing on switches by filtering traffic based on DHCP snooping or static IP-to-MAC bindings, along with step-by-step setup instructions.

click on the image to read the article


Cisco IP Source Guard (IPSG) and configuration



We are now accepting technical articles or tool or topic recommendations.  
Just use the Contact form in the top right corner to contact us..



Wednesday, January 14, 2026

My Wifi 'extension cable'

TP-Link AC750 Wireless Portable Nano Travel Router (TL-WR902AC)

There’s something deeply unfair about having perfectly good Wi-Fi but a wired-only device staring back at you like it’s 2006. That’s where the $40 TP-Link AC750 Wireless Portable Nano Travel Router (TL-WR902AC) swoops in like a pocket-sized hero. This thing is absurdly small—about the size of a deck of cards—but somehow manages to solve problems that would otherwise involve sketchy USB adapters, driver hunting, or just giving up. It’s designed for travel, sure, but it’s also perfect for those random “why does this only have Ethernet?” moments.

The real magic for me was using it in client mode. In this configuration, the AC750 connects to an existing Wi-Fi network and then shares that connection out through its Ethernet port.

Translation: your wired-only device suddenly thinks it’s on a wired network. No OS tweaks, no weird hacks—just plug in an Ethernet cable and go. I used it to give a stubborn wired device internet access over my Wi-Fi, and it worked so smoothly it almost felt suspicious. its also a great companion for test tools that only have ethernet ports for admin or out of band access.

Setup is refreshingly painless. You power it up (USB-powered, because of course it is), connect to it, pick your Wi-Fi network, and boom—you’re done. The web interface is simple enough that you don’t need a networking certification or three cups of coffee to understand it. Once configured, it just sits there quietly doing its job, like the best kind of networking gear: the kind you forget about because nothing is broken.

The best part? This little router is cheap, portable, and endlessly useful. Toss it in a laptop bag and suddenly you’re ready for hotels, labs, job sites, or any situation where Wi-Fi and Ethernet refuse to cooperate with each other. The TP-Link AC750 is basically a Wi-Fi interpreter for wired devices, and it does it without drama. For something so small, it delivers a surprisingly big “why didn’t I buy this sooner?” moment.

amazon.com https://amzn.to/45iOR4K

amazon.ca https://amzn.to/4apCB5Y




Make sure you are on the email list for some cool stuff I have planned year by filing out the contact form with the work subscribe in the message  field.

email




Tuesday, January 13, 2026

free Stanford AI course - Language Models from Scratch (CS336)

 

free Stanford AI course - Language Models from Scratch (CS336)

Since the last one i posted got so much attention, i will post a few more.   Enjoy

If you’re eager to master the next frontier in artificial intelligence, Don’t miss the Stanford CS336: Language Modeling from Scratch playlist — a complete, free university-level lecture series now available on YouTube. This playlist guides you through building language models from the ground up, just like the ones behind cutting-edge AI systems. Whether you’re a developer, student, or AI enthusiast, these videos give you firsthand insight into the principles and practices that power today’s large language models. 

What makes this playlist truly valuable is its depth and clarity. Taught by Stanford faculty and researchers, the lectures cover both the theoretical foundations and hands-on implementation details you need to build real language models. You’ll explore tokenization, neural architectures, PyTorch coding techniques, and how language models are trained efficiently — all explained step by step. This level of instruction is rare, especially at no cost.  

Another advantage of this YouTube playlist is its flexibility. You can learn at your own pace, pause and replay complex sections, and revisit topics whenever you need a refresher. This is like having a world-class AI course on demand — no enrollment, no tuition, and no schedule to keep. If you’ve ever wished you could access Stanford-level AI education from anywhere in the world, this playlist makes that possible.  

In a world where language models are reshaping industries — from search and content creation to software development and research — understanding how they’re built is a powerful skill. The Stanford CS336 Language Modeling from Scratch playlist equips you with both the big-picture concepts and the practical know-how needed to advance your career or personal projects in AI. Dive in today and start learning the foundations of tomorrow’s technology.





Monday, January 12, 2026

Why Wireshark Display Filters Are Your Network Superpower

 

If you’ve ever opened a capture in Wireshark and immediately felt like you were staring into the Matrix, display filters are your way out. Learning to use them means you stop looking at all the packets ever and start looking at the ones that actually matter. Instead of scrolling endlessly and squinting at hex like it owes you money, you can narrow things down to exactly what you’re troubleshooting. Less noise, more signal, and way fewer “why is this taking so long?” moments.

One of the easiest and most satisfying wins is filtering by protocol name. In the video, using simple filters like dns, mdns, or nbns instantly cleans up the mess. Want to see only DNS traffic? Type dns and boom—suddenly your capture makes sense. It’s like telling Wireshark, “I don’t care about the other 10,000 packets, its just noise, packet junk or gossip.” This alone can turn a confusing capture into a clear story about what’s actually happening on the network.

Display filters also save a ton of time, which means less frustration and more confidence. When you know how to quickly isolate traffic, troubleshooting feels less like guessing and more like detective work. Is DNS slow? Filter on DNS. Is a connection failing? Filter on TCP. Instead of blaming “the network” (or the firewall, or the ISP, or Mercury in retrograde), you can actually prove what’s going on with a few well-placed filters.

Best of all, learning display filters is one of those skills that pays off immediately and forever. You don’t need to memorize everything—start simple, like protocol names, and build from there. Before long, you’ll look at massive captures and feel calm instead of afraid. And that’s a rare feeling in networking: confidence, clarity, and the smug satisfaction of saying, “Yeah, I filtered that.”









Wednesday, January 7, 2026

Lets play IP 'Whack a Mole'

Had such a weird problem the other day after the installation of a voice switch.

The voice switch was manually configured  with an ip address (x.x.x.2) and an old Cisco switch (model unknown) decides to grab the same ip from our dhcp server.

Here's the odd part,  I configured the DHCP scope to start at x.x.x.11.

Since I was working remotely, I disabled the upstream switch port that the cisco switch was connected to until the onsite guys could investigate.

The onsite tech told me that the cisco switch was in an area that wasn't accessible, I suggested he hang tight and I will reenable the upstream switch port connected to the Cisco switch.

I enabled the port and we waited for about 15 minutes to see if the issue comes back. I could see the devices on the cisco switch had ip addresses and data was definitely flowing. Oddly enough the switch had not requested an ip address from the DHCP server with I confirmed via the switch mac table, router mac table and DHCP server.

I told the tech "lets leave it alone for the weekend'. Monday morning I checked and the Cisco switch is still online, I can see its mac address, but no ip address.

The tech decided to 'take it out'  when he got access since it was a super old 10/100 switch, so unfortunately I could no longer do any more testing, but still a good exercise on identifying, locating and isolating a duplicate ip address scenario.
 


Tuesday, January 6, 2026

Stanford free AI course Deep Learning (CS230)

Stanford free AI course Deep Learning (CS230) 

If you’re passionate about advancing your AI and machine learning skills, there’s no better time than now to dive into deep learning — and this free Stanford CS230 Deep Learning YouTube playlist is a goldmine of knowledge waiting to be explored. Hosted by Stanford University, this playlist curates a comprehensive set of lectures covering the essential concepts, techniques, and real-world applications of deep learning. It’s the kind of content that normally resides behind costly university enrollment — yet here it is, accessible with just a click. (YouTube)

What makes this playlist stand out is its structured approach to teaching one of the most sought-after skills in today’s tech landscape. From neural network fundamentals to advanced optimization strategies, the lecture videos break down complex topics into digestible, engaging lessons. Whether you’re a student preparing for a career in AI or a professional looking to level up your expertise, this Stanford course offers a roadmap that’s both deep in technical substance and geared toward real application. (YouTube)

Another great advantage of this playlist is its flexibility. You can watch it at your own pace, rewind to clarify tricky concepts, and re-watch key sections for better retention. Unlike traditional classroom settings, there’s no pressure, no deadlines, and no tuition — just you and some of the brightest minds in deep learning sharing cutting-edge insights. It’s a rare opportunity to learn directly from top educators without spending a dime. (YouTube)

In a world where AI and machine learning are rapidly reshaping industries, having reliable and expert-led training is essential. This playlist not only equips you with foundational knowledge but also inspires deeper curiosity and exploration into advanced topics like neural architectures and model optimization. Ready to elevate your skills and explore the frontier of AI? Start watching the Stanford CS230 Deep Learning playlist today and take a big step toward mastering one of the most transformative fields in tech. (YouTube)


Overview of Single-Mode and Multimode Fiber Optics
Overview of Single-Mode and Multimode Fiber Optics



Monday, January 5, 2026

Troubleshooting skills don't just happen

 

Troubleshooting can just happen
I remember a while ago when I was presenting and told the group "if you do your job right, you will always find something to fix, tune or tweak" .

After an install, I always go online the next day or two and check logs, port stats, etc..  I would say I will find something odd that is worth investigating about 30% of the time.

Over the years, I have found a lot of 100Mb POE injectors connected to 1 Gb ethernet ports and 1 Gb devices, bad cabling, 100 Mb switches/hubs on 1 Gb devices, the list goes on...

In this specific example, a new computer with a 1 Gb Ethernet interface, with new patch and structured cabling connected into a switch 1 Gb Ethernet port came up as 10 MB, and then later, 100 Mb, along with a boatload of errors.

I reached out to the client to address the issue since it can only be a few things (in order of most to least probable):
- bad patch cable at the client's desk
- bad run to the patch panel
- bad patch panel cable 
- bad switch port
- bad computer ethernet port

The clients initial response is that they are 'too busy to look at it' , and since the computer seems to be working just fine and can get on the internet, there is no urgency to address it.

Now my job is to sell, convince and educate the client that this is worth fixing before they 'notice' and it becomes a last minute support issue. :)

Troubleshooting can just happen



Troubleshooting can just happen


Friday, January 2, 2026

from the net: The biggest cybersecurity and cyberattack stories of 2025

 

2025 was a big year for cybersecurity, with major cyberattacks, data breaches, threat groups reaching new notoriety levels, and, of course, zero-day vulnerabilities exploited in incidents.

Some stories, though, were more impactful or popular with our readers than others.

Below are fifteen of what BleepingComputer believes are the most impactful cybersecurity topics of 2025, with a summary of each. These stories are in no particular order.

https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2025/


Saturday, December 27, 2025

from the net: New Android Malware Lets Hackers Turn Google Play Apps Into Spyware

 

The security research team at iVerify Threat Intelligence have discovered a new Remote Access Trojan (RAT) that has been dubbed Cellik, and which is targeting Android users

It includes features typically seen on advanced spyware and delivers functionality that allows threat actors to spread their wares in a more stealthy fashion.


click on the image to read the article





The NETSCOUT DDoS Threat Intelligence Report (Issue 15: Digital Aftershocks) analyzes global distributed denial-of-service (DDoS) attack activity and trends, revealing that more than 8 million DDoS attacks were recorded worldwide in the first half of 2025, with peak attacks reaching 3.12 Tbps in bandwidth and 1.5 Gpps in throughput. It highlights how geopolitical events and coordinated campaigns by groups like NoName057(16) have driven spikes in attack volume, while botnet-driven and DDoS-as-a-service threats are increasing in sophistication, duration, and impact. The report also shows emerging threat actors expanding the threat landscape and emphasizes regional variations and the collateral damage DDoS attacks can inflict on service providers and critical infrastructure sectors.

Wednesday, December 24, 2025

Have a Great Christmas and New Year

Tim and I are taking a few days off, so enjoy the holidays with your loved ones .








Tuesday, December 23, 2025

The Internet Protocol Journal Volume 28, No.3, December 2025

 

The latest issue of the Internet Protocol Journal mixes technical thinking with some big-picture debates about where the Internet is headed. It kicks off with the editor’s notes and then dives straight into security and governance topics, including an article on how to protect a truly borderless Internet. A major theme in this issue is Internet governance, highlighted by two opposing pieces that ask whether the traditional “multistakeholder” model is breaking down—or if reports of its death are greatly exaggerated.

Beyond those heavier discussions, the issue also slows things down a bit with a thoughtful book review of Geopolitics at the Internet’s Core, which looks at how global politics shape the Internet’s infrastructure and decision-making. There’s also a memorial piece honoring Fearghas McKay, recognizing his impact on the networking community. Shorter sections like Fragments and Thank You! add some lighter, reflective moments between the more serious articles.

Overall, this IPJ issue strikes a nice balance between deep technical insight and broader reflections on policy, security, and the people behind the protocols. It’s a solid read for anyone who wants to stay informed not just about how the Internet works, but how it’s governed—and where it might be headed next.

click here or the above image for this issue




Popular post