Hi danwillie blogger at large at sites like America-in-2020.com, 4UScyber.com, USALive .today, SolarWindWaterDIY.com and many others. Danwillie is my blogging name. Go to danwillie .com to find out more. Webmaster, Blogger, 40 years in computer network services
Lawmakers are seeking answers from Amazon about Ring’s partnerships with police, citing contradictions between its public statements and terms of service. Excellent Article from Townhall then Business Insider The House oversight committee sent a letter to Amazon on Wednesday seeking answers about how its Ring home-security service partners with police departments. Ring has partnered with […]Read More
Adobe Adobe’s February 2020 Patch Tuesday updates fix a total of 42 vulnerabilities across the company’s Framemaker, Acrobat and Reader, Flash Player, Digital Editions and Experience Manager products. The highest number of flaws, 21, has been fixed in the Windows version of the Framemaker document processor. The vulnerabilities have been described as critical buffer overflow, heap overflow, out-of-bounds write, […]Read More
Not Russia Russia Russia We have heard so much from the left its all Russia. Well this breach has been going on for two years and far greater than anything on Russia. Glad FBI and DOJ have continued to investigate this instead of being side track by the rhetoric from the left. In 2014, the […]Read More
This article below is an excellent for understanding Plishing Attacks today. To summarize don’t click on email links unless you are absolutely sure of its origin. Keep a good plishing tool to check your email links. The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity […]Read More
Earlier this year, Microsoft management split the Windows division in half, moving Windows engineering into the same group as Azure engineering. It was only a matter of time until Windows and Azure would start sharing the same codenaming scheme, right? Windows 10 Microsoft’s latest Windows 10 19H1 test build adds updated sign-in options for Hello, […]Read More
Trump takes on Google and Internet Media #stopthebias Our President has taken on the internet media and their control of content with a new new hashtag #StopTheBias. This is important for 2018 and 2020 Elections. Below are article on this subject President Trump accused Google of promoting former President Obama’s State of the Union address […]Read More
So DNS is changing. DNS is the heart of the Internet. But today as everything else weaknesses have been found and take advantage of. We need to make it as secure as the the websites are and The article below from Johannes B. Ullrich, at SANS talks to that. This is somewhat old news but […]Read More
Free Internet is Gone. IETF has made a nightmare out of our free internet. We know how filtering is done against religious beliefs and political beliefs and our government is complicit in this by doing nothing. The internet needs over site, not by other companies but by governments that represent us and our values.
Both TurnkeyLinux with Wordpress and Letsencrypt performed perfect unlike Comodo and Bluehost!
Our Government must protect and control data for Americans. There is a role for private industry within the confines of law. We can no longer go with the previous administration response of computer hackers control of American business and people being held hostage and told to pay up because government has no solution.Read More
Bug in Intel PC Firmware I5, I7, I9 and More. Nine-Year-Old Critical Vulnerability Affects Intel Active Management Technology Intel issued a critical alert Monday concerning an escalation of privilege vulnerability affecting Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), and Intel Standard Manageability. Firmware updates are available in all cases — but that’s […]Read More
Below is a summary of networking made simple. I hope it helps you to understand networking better. With most operating systems, the lower OSI layers of physical medium data link with MAC address, network with IP address, and transport with TCP or UDP, and will be understood by both devices.Read More
If a customer is trying to access your website and types in your address – for this example, we’ll say it’s www.example.biz – the browser and operating system quickly perform an internal audit to see if that computer has recently visited your website (IP address), and therefore has that website address in its cache (memory).Read More
What we need to is be responsible and design an internet that protects Americans. But the big media, and search engine cyber bullies, are crying about Russia. I have never seen so many cry babies in my life.Read More
Googlehacking Google search Commands This are commands to use when in google search especially when google does like your site and a general search shows nothing. site: define: filetypes: intitle: author: Ctrl F to find ~ related “” exact “name only” – exclude .. between 2..10 Attribute to HackCollege.com with this graphic and info. So […]Read More