Ira Wilsker

Recently, I attended a weeklong “Summer Cyber Security Workshop” at Texas Tech University in Lubbock. While we delved into the intricacies of hacking, encryption, penetration testing, cyber forensics, critical infrastructure protection and cybercrime, there was also evidence of a consistent demand from industry for workers trained in the broad field of cyber security.

shadow

In early July, Microsoft released its “Largest collection of free Microsoft eBooks ever, including Windows 8.1, Windows 8, Windows 7, Office 2013, Office 365, Office 2010, SharePoint 2013, Dynamics CRM, PowerShell, Exchange Server, Lync 2013, System Center, Azure, Cloud, SQL Server and much more.” This announcement was posted in an official blog by Microsoft’s Eric Ligman, senior sales excellence manager.

shadow

Over the past several weeks, I have taken several out-of-town road trips. On these trips I used a novel free smart phone app for routing and traffic information called Waze (waze.com). There are an abundance of apps that function with the integral GPS built into almost all smart devices, including smart phones and tablets.

shadow

Our cell phones are often wonderful devices; in addition to the traditional voice phone calls, they also can provide enhanced functionality with Internet access, cameras and SMS (text messaging). Now that smart phones have become the primary communications mode for most of us, it has also become a fertile field for crooks capitalizing on the functionality of our devices.

shadow
Ira Wilsker

Virtually all new laptop (notebook) computers, tablets and smart phones now include some type of webcam (web connected video camera). Some of the newer desktop monitors incorporate an integral webcam, and millions of computer users have an external webcam connected to their computers, typically mounted on the top of the monitor and pointed at the user. External webcams, often only requiring a USB connection, can frequently be purchased for under $20.

There are many legitimate uses for Webcams, as well as some illicit or criminal uses that webcam owners need to be aware of.

shadow