DataSecurityBootCamp.com

Intro & Articles Blog

Welcome to the Data Security Boot Camp Intro & Articles blog. These are articles of various topics related directly or indirectly to data security incidents, research discoveries, or direct work experiences that provide unique insight into the data security "big picture". Please read and hopefully find some useful content you might be able to apply to your situation.

Please Support Our Effort

DataSecurityBootCamp.com/donate

Introduction

Introduction to the Articles and other Writings...


Why a VPN connection won't protect your computer from a phone home attack if it can control your systems connectivity the way Microsoft can

IN PROGRESS. Why a VPN connection won't protect your computer from a phone home...


People will ask why I've chosen to reverse-engineer Microsoft Windows technology and architecture best I can tell?

IN PROGRESS. People will ask why I've chosen to reverse-engineer Microsoft Windows technology...


How do you prove that a data security tool works? Typically the only way you know your system has been compromised is your bank account has been drained

IN PROGRESS. How do you prove that a data security tool works? Typically the only...


What would be one of the greatest things in the world? An opensource version of something compatible with Windows(Linux doesn't count)

IN PROGRESS. What would be one of the greatest things in the world? An opensource...


What if you have malware "attaching" to certain programs or binaries on your computer?

IN PROGRESS. What if you have malware "attaching" to certain programs or binaries...


Observations of the corporate espionage of IBM's Tivoli Management Framework 2001+ version by a co-worker

IN PROGRESS. Observations of the corporate espionage of IBM's Tivoli Management...


Why IPv6 on a computer at home or roaming public WiFi is useless and a security risk

IN PROGRESS. Why IPv6 on a computer at home or roaming public WiFi is useless...


Microsoft has moved to Asynchronous Downloads, which don't require you to give permission for an update to occur

IN PROGRESS. Microsoft has moved to Asynchronous Downloads, which don't...


A summary of "My Location" results since my whistle-blowing in 2015/2017

IN PROGRESS. A summary of "My Location" results since my whistle-blower...


Did you know changing a network adapters options doesn't always change everything needed?

IN PROGRESS. Did you know changing a network adapters options doesn't...


Did you know, in Windows 10 Home, that Remote Access, Remote Assistance, and Terminal Service are installed and available?

IN PROGRESS. Did you know, in Windows 10 Home, that Remote Access, Remote...


How developer tools installed on your computer can be used against you easily

IN PROGRESS. How developer tools installed on your computer can be used...


An analysis of why firewalls need a simple export/edit/import process

IN PROGRESS. An analysis of why firewalls need a simple...


Why the default Windows config is so dangerous on "free" public WiFi

IN PROGRESS. Why the default Windows config is so dangerous...


Did you notice this, too, about Government data collection?

IN PROGRESS. Did you notice this, too, about Government data...


The fallacy that when your "old" Windows computer slows down, you "need" to buy a new one

IN PROGRESS. The fallacy that when your "old" Windows computer...


Why faster 5g cellular and Internet speeds are a bad thing for data security

IN PROGRESS. Why faster 5g cellular and Internet speeds are...


What if Microsoft has put VPN or VNC code into the Windows kernel?

IN PROGRESS. What if Microsoft has put VPN or VNC code...


How phone-home malware seems to work, and why changing your IP address doesn't help

IN PROGRESS. How phone-home malware seems to work, and why ...


Opensource and derivative software, Good and Bad

IN PROGRESS. Opensource and derivative software, Good and Bad...


Wireshark capture of protocol packets for services that have been disabled could be a sign of a MITM attack on your WiFi or hotspot

IN PROGRESS. Wireshark capture of protocol packets for...


Have you ever wondered about the Windows "optional" updates?

IN PROGRESS. Have you ever wondered about the Windows "optional"...


The lack of harddrive activity lights is a data security issue

IN PROGRESS. The lack of harddrive activity lights is a data security issue...


How Hotspot overloading occurs

IN PROGRESS. How Hotspot overloading occurs...


More characteristics of your cell hotspot being compromised

IN PROGRESS. Another characteristic of your cell hotspot being compromised. If your...


Signs your email account has been compromised

IN PROGRESS. Signs your email account has been compromised. Have you ever gone a...


Why WiFi Data Usage should be disabled when not in use

IN PROGRESS. Why you should turn off your "Data Usage" button when away from your...


Has your cellphone been locked onto?

IN PROGRESS. How can you tell if your cellphone hotspot has been "locked onto" by...


VPNs only secure your network connection, not your system data

IN PROGRESS. Some people say a VPN can help "secure" your cellphone...


Characteristics of a compromised hotspot

IN PROGRESS. Characteristics of a compromised hotspot. Descriptions of various...


Shoulder surfing partial solution

IN PROGRESS. Shoulder surfing partial solution. There's a security assault type...


Keep your important data on an external drive

IN PROGRESS. For your data storage, use an external drive case with SSD(no associated...


Drawbacks to using always online cloud services

IN PROGRESS. Drawbacks to using cloud services for "available everywhere" data...


Defensive hotspot strategies

IN PROGRESS. Defensive hotspot strategies...


Problems with the Windows Push Update Service

IN PROGRESS. Problems with the Windows Push Update Service...


WiFi Offensive Defense

IN PROGRESS. WiFi Offensive Defense. Just what it says, attack your...


Review of major OS WiFi connect features

IN PROGRESS. An analysis of the WiFi connect features compared between all...


An Approach to naming your hotspot(s) for defensive measures

IN PROGRESS. An Approach to naming your hotspot(s) for defensive measures...


Backup strategies for your system drive

IN PROGRESS. Backup strategies for your system drive.


Other signs of man in the middle attacks

IN PROGRESS. Another characteristic of having been MITM attacked successfully...


Other signs the man in the middle attack has been used against you successfully

IN PROGRESS. Other signs the man in the middle attack has been used against...


How Man in the Middle Attack works

IN PROGRESS. How Man in the Middle Attacks work. Attacker makes their hotspot look like...


Please Support Our Effort

DataSecurityBootCamp.com/donate