Welcome to my blog posts. Initially, this site was dedicated solely to cybersecurity, information technology, and other technical-related topics. While I still have posts on these topics, I’ve also expanded to non-technology items that I hope other people may find helpful.
If you have tried to install OneDrive or CorelDRAW 2019 on a Mac and have received failure messages, read on. …
If you have been following this blog series, you know that the first blog discussed the cyberattack kill chain and how…
In my first blog, I discussed the cyber kill chain and how hackers move through predictable steps to launch an…
Cyberattacks and data breaches are unfortunately commonplace in the daily news cycle. Many of us have had our personal, healthcare,…
As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest…
I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10…
I have discussed here and here many of the dangers that kids face when trying to navigate technology and the…
If I were to ask you to install an exterior door in your child’s bedroom and told you that…
Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices…
A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an…
As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or…
The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level. Â The motivation…
Update – October, 2021 After nearly 70,000 downloads of my templates, policies, and procedures, I have decided to take the…
Abstract Technology and digital evidence are at the forefront of nearly every criminal, civil, and corporate investigation in the…
Anyone who has experience with the Internet knows how easily it is to stumble across inappropriate Internet content. Â As a…
Over the years the question of how to store digital forensic evidence has been raised many times. Â Forensic examiners often…
Digital pictures and video have transformed our lives. I have so many pictures and videos of my kids that by…
Developing a Business Justification When I began investigating cyber crimes and seizing digital evidence, it was rare to seize more…
Cyber attacks and warfare are among the greatest threats to the United States. The federal government and private industry spend…
Finding user accounts on a computer running the Windows Operating System (OS) is a standard part of a forensic examination….
There are many reasons why anyone working in the digital forensics/incident response profession should have the ability to record the…
Issue: URLs visible within the places.sqlite database file when viewing the file in hex view that are not visible when…
Peer-to-Peer (P2P) file sharing is one of the fastest and easiest ways for individuals around the world to obtain and…