Posts

Showing posts from August, 2025

5 Tips for Protecting Your Data on Your New Android Phone

Image
#1. Opt out of Google arbitration If you have a Google phone then you need to know about Google's forced arbitration. Why is opting out of Google’s forced arbitration important? Google's arbitration clause prevents your right to sue in court or to participate in class action lawsuits. (Also, arbitration is generally considered more favorable to companies.) According to Google: “If you decide to keep your Google Device but opt out of these Arbitration Terms, you must do so by notifying Google within 30 days of activating your Google Device for the first time (unless a longer period is required by applicable law) by following the instructions at g.co/devicearbitration/optout .”    To Opt Out of Google Arbitration Fill out the Device Arbitration Opt-Out form here:  https://partnerdash.google.com/apps/devicearbitrationoptout/optoutform     #2.  Review App Permissions (Allow or Do Not Allow an app access to your camera, microphone, location, etc.)...

Nvidia's "AI for All: From Basics to GenAI Practice" Course (Critique)

Image
Nvidia’s " Generative AI Explained" course … actually, the course name changed to AI for All: From Basics to GenAI Practice , is roughly 2 hours long. Wait … 3.5 hours long … They really meant maybe 3.4 hours long?? So it’s longer than advertised. Overview: There is A LOT of info packed into these videos and the course consists of 3 units: ·         Unit 1 – AI Transformation Across Industries ·         Unit 2 – Introduction to Artificial Intelligence ·         Unit 3 - Generative AI and Beyond ( which consists of 3 subunits ) o    3.1 Generative AI Overview o    3.2 Image Generation using Generative AI o    3.3 Beyond Generative AI ·         Unit 4 – Accelerating AI with GPUs Each unit has a short quiz at the end and there is a final 17 question course completion quiz. All short quizzes allow y...

Lucky 777: 7 OSI Layers, 7 Stages of the Cyber Kill Chain, and 7 Social Engineering Principles

This is a quick, at-a-glance reference table for the  7 OSI layers , 7 Stages in the Cyber Kill Chain,  and 7 Social Engineering Principles. OSI Layers Cyber Kill Chain Stages Social Engineering Principles Application Reconnaissance Authority Presentation Weaponization Intimidation Session Delivery Consensus Transport Exploitation Scarcity Network Installation Urgency Data Link (C2) Command & Control Familiarity Physical Actions on Objectives Trust

Kali Linux Live Boot from USB (How-to)

Image
There are a few ways to put Kali Linux on a Windows machine. I covered using Windows Subsystem for Linux in another blog post. The other ways include: 1)       Set up a virtual machine. 2)       Partition the hard drive. 3)       Create a live boot USB (with persistence).   Option #1: I was originally hoping to set up a separate lab environment on an old laptop by running Kali Linux on a virtual machine. However, the laptop could not enable virtualization technology.   Laptop Incapable of Virtualization When I first purchased my Lenovo laptop years ago I did not think I would need or want to put a virtual machine on it, so I opted to get one that did not have virtualization capability to save money. Now I regret it. However, upon looking up the Intel Celeron chip specs, it turns out it could have virtualization. I could reflash...

Flash Drive Can't Save Large Files? Here's What to Do. (Quick Lesson)

Image
If the USB drive cannot save large files, chances are, it is using a FAT32 file system which has a 4GB limit on individual file sizes.  Reformat the USB drive to exFAT or NTFS (file systems that support larger files). 1. Right-click on the drive > select Format . 2. The Format window will pop-up > under File system > select NTFS or exFAT. 3. Click Start .