• Wireless Access Keys for Windows

    Today’s Topic: Token based PC login is becoming more affordable and reliable than ever. By simply carrying a token with you your Windows PC can lock and unlock with out you having to type in a password. In many environments this can make your systems more secure since people will not ...
  • Wireless Access Keys for Mac Computers

    Today’s Topic: We demonstrate a wireless access key from Atama.io and explain why this is the future of system security, and a great tool to use now. The small key sized bluetooth device allows your Mac to know when it is close, and when it is not and allows your Mac ...
  • Dynamically Block IP Addresses on Windows Servers

    Today’s Topic: We discuss how to dynamically block IP Addresses on a Windows Server to prevent Brute Force Attacks from inside your network. We use CyberArms to demonstrate how IP Addresses can be automatically blocked if someone tries to attack a servers different services. You can find CyberArms here: http://cyberarms.net Today’s Review: We Review the ...
  • Build a Web Proxy Server

    Continue the Conversation at http://www.GeekBrainDump.com Today’s Topic: Web Proxy Servers allow you to to bypass web filters and be able to access content that you could not otherwise. It is also an easy way to protect your privacy from website data collection, but if you use a Public Web proxy you ...
  • AdBlock Plus to Block Ads on Webpages

    Continue the Conversation at http://www.GeekBrainDump.com Today’s Topic: AdBlock Plus can be used to block advertisements from being displayed in your web browser. Beyond this basic functionality it also allows you to program very specific filters, and even simply block segments that you do not want to load. With these filters you are ...
  • Block Website Tracking with Ghostery

    Continue the Conversation at http://www.GeekBrainDump.com Today’s Topic: Ghosterly shows you all the tracking scripts that websites you visit target against you. You are able to individually block scripts and see which ones are running in real time. Ghosterly requires more manual interaction that other options, but as a geek it is nice ...
  • IP Blacklisting (Banning) Automatically in WordPress

    Continue the Conversation at http://www.GeekBrainDump.com Today’s Topic: WordPress has become a target for hackers in it’s own right and dealing with Brute Force Attacks can be a pain. By adding a plugin or script to automatically determine Brute Force Attacks and to then Blacklist the IP address is an easy way ...
  • Google Tracking with Android Devices

    Today’s Topic: Did you know that your Android phone or device may already be sending back your current location to Google’s servers? Android Devices and Google Apps are setup to send this information and it can be viewed through their website. This is something that if the NSA did it people ...
  • How to Opt Out of Google Targeted Ads

    Today’s Topic: We talk about how to opt out of Google’s Interest Based Ads. Regardless of their intrusion on your privacy many times this type of targeted advertising is simply worthless and ironically shows you ads that you don’t care about within the contact you are using the web. Today’s Review: We ...
  • How to Delete Your Facebook Account

    We talk about how to permanently shut down your Facebook account for those people that cannot abide by face books unethical practices. I have spent thousands of dollars and countless hours building my Eli the Computer Guy Facebook Page and as a Content Business it will cause real monitory harm for ...
  • Technically Plausible Explanation for Lois Lerner Lost Emails

    “Never attribute to malice that which is adequately explained by stupidity” as they say. With the scandal at the IRS unfolding it seems stupefying to believe that Lois Lerner’s emails could have simply vanished. Sadly if the IRS deals with emails the way that too many organizations do then it ...
  • Real Time Backup of Your WordPress Site with VaultPress

    Backups are always a half forgotten mess in the IT world, and backups of WordPress sites are even worse. Most solutions require administrator actions that only sporadically actually happen. VaultPress from Automattic, the creators of Wordpress, gives you a Real Time, off site solution that is easy to setup, and ...
  • Internet Explorer Security Flaw – What Can You Do About It?

    Today’s Topic: We talk about the latest flaw in Internet Explorer that compromises the security of versions 6-11 and what can be done to mitigate the risk. (Other than migrate to Linux) ********************* Tech Questions??? ******************** Spiceworks Community of IT professionals is the place to get your tech questions answered: http://goo.gl/75thj7 *************** Please ...
  • Heartbleed Bug in OpenSSL Proves You Shouldn’t Trust the Security of the Internet

    Today’s Topic: We discuss what the HeartBleed Bug is and why it proves nothing on the Internet is ever safe. ********************* Tech Questions??? ******************** Spiceworks Community of IT professionals is the place to get your tech questions answered: http://goo.gl/75thj7 *************** Please Visit our Sponsors!!! *************** TotalSem – A+, Net+, Security+ Books and Test ...
  • Secret Has an Odd Take on Edward Snowden’s Advice – Daily Blob – March 12, 2014

    Today’s Topic: After Edward Snowden’s talk at SXSW we talk about the odd correlation with the new Social App called Secret: http://goo.gl/JTaCiq Post on Secret’s Infrastructure: http://goo.gl/rY9sNe Today’s Review: We review the ErgoTech Triple Monitor Desk Stand: http://goo.gl/mm47ZG *************** Please Visit our Sponsors!!! *************** Altaro – Free HyperV Backup Software – http://goo.gl/K8SzFN B and B ...
  • Edward Snowden SXSW Speech Thoughts – Daily Blob – March 11, 2014

    Today’s Topic: We talk about Edward Snowden’s appearance at SXSW on March 10th and discuss the lessons that can be taken away from it: http://goo.gl/AngJbL Today’s Review: Prong PocketPlug iPhone Case: http://goo.gl/Js7Hch *************** Please Visit our Sponsors!!! *************** Altaro – Free HyperV Backup Software – http://goo.gl/K8SzFN B and B Electronics – FREE White Paper ...
  • Hacking the Internet of Things – Daily Blob – Jan 23, 2014

    Today’s Topic: We discuss the dangers of the Internet of Things and how devices as seemingly “dumb” as refrigerators will be turned into hacker attack vectors. Today’s Review: We review RavPower’s Luster Series Power Bank – A “pretty” SmartPhone Battery with built in Flashlight: http://goo.gl/TT6JiA *************** Please Visit our Sponsors!!! *************** TotalSem – ...
  • A Rough Lesson in the New York Times Rule… – Daily Blob – Nov 18, 2013

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Authentic8 Silo to Share and Secure Web Apps

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to TOR

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Personal VPN Services for Security Overview

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: June 13, 2013 Length of Class: 25:35 Research Assistance: Tracks Security / Data Integrity Prerequisites None Purpose of Class This class teaches students why Personal VPN Services are important, and what to think about when buying them. Class Notes VPN’s have been used in corporations for 15 years, but regular ...
  • Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions

    Info Company: Steganos Software (http://www.steganos.com/us/) Product: OkayFreedom (https://www.okayfreedom.com/) Compensation to ETCG: NONE Date Created: June 5, 2013 Overview OkayFreedom is a freemium Personal VPN Service that allows you to bypass network restrictions and firewalls. The free version gives you up to 1 GB of traffic a month, and works very well. Overall the User Interface and ...
  • Episode #336: Introduction to Online Backup Services for Tech Professionals

    In this episode Eli the Computer Guy talks about Online Backup solutions and what you should consider as a tech professional. Notes: Backup software will either backup all files into a single Archive file, or they will leave the file structure intact Most online backup software only backs up files. Generally they ...
  • Disposable Email for Hacking and Security

    Disposable Email for Hacking and Security
  • Removing Spyware and Malware from a Windows PC Using Spybot Search and Destroy

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: January 16, 2012 Length of Class: 43 Minutes Tracks Computer Security /Integrity Computer Repair Prerequisites Simple Windows PC Tune Up Cleaning an Infected Windows PC Purpose of Class This class teaches students how to remove spyware and malware from their Windows PC using Spybot Search and Destroy Chapters Introduction (00:00) First Steps (07:43) Spybot Search and ...
  • CloudFlare for Website Security and Management

    For Class Notes and more go to: http://www.everymanit.com/2011/09/11/cloudflare-for-website-security-and-management/ Please give us a THUMBS UP if you like our videos!!! Donations are Appreciated!!! https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XGA9BN4V37QY6
  • OpenDNS for Network Security

    Please give us a THUMBS UP if you like our videos!!!
  • VPN – Virtual Private Networking

    Please give us a THUMBS UP if you like our videos!!!
  • User Account Security Theory

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: December 16, 2010 Length of Class: 44 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class discusses the concepts required to understand how to protect user accounts from hackers. Chapters Introduction (00:00) Username Security (04:16) Password Security (12:48) Session Security (23:30) Final Thoughts (34:56) Class Notes Username and Login Name The Username and Login Username do ...
  • Introduction to Backup Systems

    Info Level: Beginner Presenter: Eli the Computer Guy Course Length: 45 Minutes Tracks Security/ Data Integrity Prerequisites None Purpose of Class This class introduces you to the basic concepts of computer backups. Topics Covered Types of Backups Media Used for Backing Up Data Software Used to Backup Data Online Backup Technologies Advice for Maintaining Backup Procedures Class Notes Types of Backup Full — backup everything Incremental — backup everything ...
  • Computer Security Basics

    Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class introduces you to the basic concepts of computer security. Topics Covered: Defining Hackers Updating Software Antivirus Software Antimalware Software Firewalls Site Advisors Internet Security Suites Web Browser Security Problems Class Notes: Defining Hacker There are many reasons why people hack. Some do it for fun, profit or ...
  • Introduction to Risk Assessment

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: October 12, 2010 Length of Class: 57 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class teaches students the basic concepts behind Risk Assessments. Topics Covered Defining Risk, Threat and Vulnerability Types of Protections Mitigation Concepts Business Rational for Risk Assessment and Management Class Notes Introduction The better you know technology the better you will ...
  • Practical Risk Assessment and Mitigation

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: October 13, 2010 Length of Class: 69 Minutes Tracks Computer Security /Integrity Prerequisites Introduction to Risk Assessment Purpose of Class This class teaches students how to conduct a Risk Assessment Topics Covered The Risk Assessment Process What to Look for in a Risk Assessment Class Notes Introduction Security is just good technology Risk is a business decision Assessment ...
  • Physical, Operational and Enviornmental Security

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: October 15, 2010 Length of Class: 40 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class teaches students about the importance of Physical, Operational and Environmental Security. Topics Covered Physical Security Operational Security Environmental Security Class Notes Physical Security Infrastructure Systems should be kept in a Server Room IDF’s should be secured Server Cabinets make good ...

Back to Top