Rogue network devices could be more common than one might think #RaspberryPi #PwnPlug

A while back, I wrote about devices that could be used on a network to gain access, be deployed by just about anyone, and potentially be undetected by IT staff or employees of a business. Here’s a follow-up. Recently I have been playing around with a 35 dollar micro computer called the Raspberry Pi.  This lil’ pup of a computer is …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter
1

What do you say if someone wants to plug something into your network?

Let’s assume you are a business owner and a man walks in wearing a jumpsuit with an official looking badge, and tells you that he is from the power company, sent there to plug a device into your outlet that will monitor and potentially save you money. What do you do?  Let’s assume they say they are from DHEC and …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Technology used by performing bands for audio, video & lighting (and more)

Our band, The Dockside Band, has been making the most of technology since we have been performing out, and apparently, some people have been taking note. We have been asked dozens of questions by our friends, club and venue owners and other musicians, they span many topics: How are you controlling those LED lights? Are you playing back to a …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter