CornCon 2018

  At this year’s CornCon cybersecurity conference (https://corncon.net/) we learned about several USB devices an intruder could use to break into or even destroy a computer. The USB Killer (https://usbkill.com/products/usb-killer-v3) is a device that draws power from a USB port to charge up capacitors and then dump hundreds of volts back into the machine over…

Continue reading

Integrated Marketing Course: Key Website Points

Having recently returned from an Integrated Marketing Course offered by the American Marketing Association, has motivated me to reiterate the following key website points:   What Should a Website Do? Validate: It should be clear what your business is selling within 3 seconds of a user landing on your website. Educate: Provide something of value…

Continue reading

Meltdown and Spectre Vulnerabilities

April 13, 2018     Twin State Technical Services      ref: Meltdown and Spectre Vulnerabilities It seems fitting on Friday the 13th to talk about some of the scarier results in technology vulnerabilities. The design flaws in chipsets will take 3 – 5 years of architecture redevelopment to completely eliminate – so as a consumer, you don’t need…

Continue reading

The European Union is Moving at a Faster Pace in Defining Individual Privacy Rights

Companies like Microsoft now issue versions of software to meet compliance requirements for national and global governing bodies – for example, Microsoft version N. The European community has a strong commitment to informing citizens of how to know and exercise their rights of protection to their own personal information. This is also causing our software…

Continue reading