There is really "never enough" security when it comes to protecting your online presence. This article is going to explain how to password protect the login script, the "wp-login.php" file. To better understand the task at hand, "wp-login.php" is a special login script associated with logging into WordPress. The first line of a brute force [...]
This article is going to help you change the built in WordPress 2019 Gutenberg Featured Image shading.
Revise erase repeat
The term Artificial Intelligence (or AI) was coined in the mid 1950s. The technology was heavily funded by the Department of Defense for many years. Unfortunately, the practitioners at the time were overly optimistic and failed to plan for some of the difficulties that they eventually faced. By the mid 1970s, funding was largely cut in [...]
This article explores basic ideas that you should keep in mind as you are starting or continuing your business. It is intended to provoke deeper thoughts for you and your executive team. From business continuity, to free coffee and free WiFi, we'll look into ideas that are important to businesses... and to customers.
Cloud Services are finally beginning to make the news in a very big way. Now may be the time for you to explore cloud services for your company. This document will help you understand cloud services, and explores some of the advantages and disadvantages of cloud compute models.
Attacking software is really attacking the software development process. The adversary is looking to take advantage of software defects before those defects are repaired. This paper explores the attack timeline.
Content Filtering companies have gained quite a bit of traction in the Computer Network Defense (CND) industry. The goal of content filtering is to attempt to stem the carnage that malicious sites can wreak on unsuspecting individuals and companies by blocking access to malware and other forms of ransomware. The filtering engines work by way [...]
Most of us are familiar with files, directories, and subdirectories. In the art of computer science, directories are a way to organize files into a meaningful hierarchy. WordPress relies on hierarchical file systems to organize the thousands of required files in a WordPress instance. History lesson! Hierarchical file systems were introduced in Microsoft's world with [...]
Our online identity IS our identity. Someone masquerading as you is potentially a dangerous situation, but it is at least creepy. The problem is, as sure as everyone will pay taxes this year, we will all have our online identity compromised. What do you tell your colleagues who have had their identity stolen? What do you tell your family who have not *yet* had their identity stolen? What should they do? And what should they have done in order to reduce the vulnerability? This paper will give you ideas on preventing problems in online identity theft, and also provide guidance on how to fix a problem if it happens.