Posts

Week 12 posting - Blogging Wrapup

The blogging assignments for this class were helpful in going more in depth on a particular topic of the week’s assignments. However, the blogs sometimes felt a little redundant as it would talk about something one of the assignments would cover. I feel like if it were more defined and asked us to cover something specific each week instead of broad spectrum of our choosing it would be more beneficial. The blogging didn’t help me in my current position with work. Blogging is not something I am interested in doing so I do not see myself blogging for personal reasons outside of assignments required. I know some companies truly rely on blogging to help spread information to those who need the information. They are great resources to use and a great way to spread information.

Week 10 posting - Lost/Stolen Mobile Device

 What happens to a device when it is lost or stolen? Thankfully there are solutions in place now that can help prevent unwanted access of the data on a mobile device. All Apple iPhones and iPad come with a built-in security feature in case the device is lost or stolen. You are able to login to your Apple ID on iCloud.com/find in order to help locate a lost or stolen device. In order for you to use this feature, Find My must be enabled on the device prior to it being lost or stolen. Once logged in, you can select your lost or stolen device and set it to lost and display contact information for it to be returned to you. Otherwise, if it is stolen you can completely wipe everything from the device providing it is connected to a network at the time you are trying to wipe it.

Week 10 Posting - iOS Update 16.1

 With mobile devices advancing in the OS technology, here is a general quick overview of Apple’s newest iOS 16.1. Now you will be able to see different third-party apps information in real time from the lock screen. I can see how this could be a convenient addition because it would be nice to see something like when your pizza will arrive at your door without needing to find the app and load it. They made changes to some of their proprietary apps like Fitness+ and Apple Home. Fitness+ no longer will require the user to have the apple watch in order to use which will broaden the subscription possibilities to people who cannot or choose not to have an Apple Watch. You and four other people can have a shared iCloud photo library where anyone connected to it can modify and add as they see fit. That is great for people who want to quickly be able to share photos to people inside their family or group of friends. Now you’ll be able to snap a picture and have it automatically sent to the ...

Week 8 Posting - Ethernet Cables

 Ethernet cables have come a long way since the beginning. The latest and greatest ethernet cable is currently Cat 8 ethernet cable. When it comes to home networking, Cat 8 is overkill as most homes usually have 1GB internet connection speeds and do not have the need to transfer that much data around their network. However, it does meet IEEE standards and if you are wanting to future proof your network, investing now is not a bad idea. It will help you prevent the need to upgrade your network cables later on down the road. The most commonly used ethernet cord currently in the market is Cat 5e cable. These cables support up to 1GB of speed which is now becoming more common in the household as ISPs are offering faster speeds all the time for residential use.

Week 8 Posting - IPv6 vs IPv4 IPsec

  IPv6 has now been around for a while. It helped us alleviate the problem of running out of IP addresses. It did this by creating 340 trillion possible unique IP addresses by using a 128-bit addressing scheme. Is IPv6 more secure than IPv4 though? Initially most people believe the IPv6 is more secure as it is new and has built in encryption and capabilities of checking data packets for integrity. IPv4 is capable of using IPsec but is used mostly for VPNs and not end-to-end security like IPv6. Ultimately, it boils down to how the IPsec is being used whether or not it is more secure.

Week 7 Posting - IDS/IPS Network Security

 Intrusion detection and intrusion prevention systems are crucial to any network security out there. They work by monitoring network traffic packets and determine whether or not the packet is good or malicious. The detection system will simply review a copy of the packet and will allow network traffic to flow normally without any latency. A prevention system will sit in the flow of traffic monitoring the packets but can cause system latency and if the prevention system goes down so does the link its monitoring. The main difference between the two systems is that the detection system needs help from other devices or humans monitoring the system to prevent the attack from becoming worse than it already is. The prevention system is able to stop the attacks directly without the need of intervention from anyone or anything else.

Week 7 Posting - Component Lifespan

 When dealing with components of a computer, the lifespan can vary by each individual piece. For example, monitors can last 10-20 years, depending on what type of monitor you use and how often you are using said monitor. A high-end mechanical keyboard can last 15-30 years whereas a cheap non-mechanical keyboard can last about 2 years. The total average of computer components is between 5-10 years. With the way technology is today, most people will tend to get new computers in the timespan and do not notice issues with their components. For some components like keyboards and mice, you tend to get what you pay for. The higher end models of these devices tend to last much longer than their cheaper counterparts.