SOCIAL MEDIA

Translate


 

You get a new wifi router, open up your internet service provider account, and you are excited to have access to your network.  Setting up your wifi network for the first time can be both an exciting and complex experience. Access to a reliable internet service is a game changer, as you are putting yourself in the driver's seat to acquire more opportunities with it.  Whether technically savvy or need step-by-step instructions; to set up your network,  identify your SSID, and set up the password, I want to assist you with how to better protect and gatekeep your access to your wireless network. 

From a security standpoint, you protect that which you value. While wireless connectivity isn't a "tangible" asset, access to it is. As stated before, having reliable access to it opens up a world of opportunities for you and everyone else who get's a hold of it. Securing your SSID, along with other aspects of your home wireless network, is not only necessary but essential to get the most out of your internet service. Below are the steps you need to take and why they're necessary. 

Stop Broadcasting your network SSID-  This means the name of your wireless network, upon set-up, needs to not broadcast and be visible to anyone looking to connect to any available wireless network in a radius of them. In short, they can't hack something that they can't see. The easiest way to do this is to log into your router by navigating to the admin portal IP Address (while connected to your home network) and signing into it with the credentials. 




Change the default admin password- On your router to something more familiar to you. While you're at it, change the name of the SSID too for your network. You want to make it very hard for anyone who is looking for a wireless network to hack to be able to access yours/ Changing the SSID from the default routers name to something more familiar to you stops anyone who is familiar with your router from being able to google and guess the default admin and password to log into that router.    

Set up a guest network- On your router, so when people come over, they have their own network to connect to. It's a win-win as if you're unsure how secure their devices are; they can still have a connection, and you can keep your own network safe. As with your original SSID, don't broadcast it, either.   






Set up your own Vlan- This is a more advanced step as it requires a little more configuration, but this is another layer of security with its added benefits. If you'd like to create your own ad hoc home network with your wireless connection, doing so will increase your ability to secure access to your home network. You can do this by logging into the router and go the advanced tab, click the security tab and then go to the mac filtering section and manually add each devices' mac address. This will keep unauthorized devices out of your network. 







Set up your own VPN- A VPN is a virtual private network that encrypts your connection from a remote location back to your home network. This is important when you are accessing documents and files located on your home network. This is integral in hardening your network against outside attacks from hackers. Before doing so make sure you update your firmware and generate the certificate needed to set it up. 

 

You can get to the VPN settings by clicking the advanced settings, scrolling down to the VPN tab and selecting which VPN option you want to setup.






Make sure you upgrade the firmware: You can do so by clicking the advanced tab, then system tools and then firmware option. In the resulting box, click the option to upgrade the firmware. 




To be the most secure, I advise doing all the above to ensure the best chances of securing your network and all its access points. For more in-depth information on the philosophy behind hardening your network and testing to see if your home network can be hacked, refer to the video here

     





How to stop broadcasting your SSID

27.12.22


 

 Phone hacking is one of the more sophisticated technical ways of acquiring your personal and financial information. It's not much different than hacking into your computer, because smartphones are just that. Portable, mobile computers. With the increased use of smartphones, how easily accessible the internet has become, along with the advent of social media platforms, it's not hard to see how easily personal information can be shared and utilized to impersonate someone to gain access to other accounts, attached to their name.

 

 

 This is why it's imperative that you be more vigilant than ever, when it comes to safeguarding your stuff; including your identity. Most hackers and scammers tend to go for the easiest target first, and then work their way up, from there, in terms of level of difficulty. This happens as a result of what the hacker stands to gain from successfully accessing your financial and personal information. Since this is a never-ending always evolving practice, I have listed below some pointers' that suggest your device might have picked up some malware that aids in transmitting your information, unknowingly, thus making you an easier target. 

 

 

If you notice your phone is running slower than usual- While this can be the result of several things; normally you can pinpoint the exact chain of events that lead to your phone slowing down, overtime. Whether's it's accumulated updates throughout the lifetime of ownership of your device, the amassed data, that's stored on your phone from all of the apps downloaded; or even the regular data that's taking up space such as pictures and other files. In the absence of these factors, your phone slowing down suddenly and tremendously is a good indicator that malware or spyware is on your phone and feeding your info to an external source. That process is what is causing/ contributing to the degraded performance of your phone.  

 

 


Your phone either heats up or overheats quickly- Temperature variables aside, similar to the previous point, if you notice your phone is heating up quickly and you're not overclocking, over utilizing or running a resource intensive application or game on your device, chances are whatever malware/spyware that's on your phone is feeding your information back to the host, externally. This action can contribute to the high temperatures being generated, while seemingly being in normal use by you.  

 

 

You are getting strange pop-ups, multiple unsolicited ads- If you're surfing the interwebs, on your device and notice that the websites you normally visit have more frequent and pervasive ad's and pop-ups, and there is a marked difference between your experience's there. This can indicate that something has downloaded on your phone is running in the background causing this distortion, to how it normally operates.  To test this, I often suggest going to the same website on other devices to see if the changes on your device, appear elsewhere. If so, then the website is to blame, if not, then run a virus scan on your phone immediately.


 

 

Frequently visited websites now look different in your browser-This is a dead giveaway that you have a virus or some form of malware on your device. If you notice that websites you frequently visit all of a sudden look "different", are redirecting to another website or just isn't loading or operating the way it used to before; your device is definitely infected with malware and you need to run a virus scan immediately.

 

 

You notice strange phone numbers, texts and e-mails that you didn't originate- Also includes seeing mysterious apps appear on your phone, where  you have no recollection, of downloading them. Often times, if a person has been hacked, this symptom is what I call the "calm" before the storm. Reason being is because by the time things get to this point, the hacker already has other personal information, from your device, in their possession.

 

 

Aside from running a virus scan immediately I highly suggest you check all of your bank and financial accounts (on another non-infected device) and put a lock on any and everything that may be accessible to anyone who has your username and password or any information, they can use to that end. This is a good time to change passwords and set up multi-factor authentication, including resetting your phone back to a factory reset.

 

 

While I personally advice having your data backed up and syncing elsewhere to a cloud account, I suggest this level of caution, as whatever is feeding your information to a third party; needs to be stopped immediately. While not knowing to what extent the damage that was done; the sooner we mitigate it, the better off you'll be.  

 

 

While this gives you a brief overview of how to avoid being hacked in general, you can still utilize the tips here to better protect yourself behaviorally, no matter what device you use. There are a few anti-virus software options (some are free) that you can employ to help scan for malware, spyware and worms and other viruses' on your desktop and mobile devices in addition to helping to get rid of them. One that I often employ is Avast. McAfee and Norton are also two other choices to pick from. These brand's have options that are available for download on both your laptop, desktop and mobile devices.

 

 

 

While surveying the habits and patterns that often put you at risk, I implore you to make the behavioral changes, as soon as you become aware of them. The quicker you implement what you learn, the faster it sticks and the more beneficial it is to you in the long run. There's always something you can do to protect yourself from being a target and making it harder for hackers to easily glean your personal information. For a shorthand way to keep these reminders accessible to you, please refer to the checklists below that denote if your mobile device has been hacked. 

 

How to tell if your Android is hacked

How to tell if your iPhone is hacked


How to tell if your phone's been Hacked.

26.10.22

 

During my latest exploration trip to D.C. one of the experiences that stuck with me was their smart card and how it works. I had a great time touring the city; click here for more about the trip itself. I stayed in a hotel in Maryland and drove to the Metro parking garage to park my car and took the train into the city. As with any city where I'm taking public transit around to explore the area, I always get their transit card and purchase their equivalent of a day pass. 

 

 

The smartrip card is a transit pass that instead of swiping to get through the turn-style, you have to place it on the RFID/NFC reader in order to open the gates. Since it's a tap-to-pay system, I'll be using this example to illustrate how it works. 

 

 

I was always fascinated and interested in exactly how this system works because no matter how long I've been in the tech field, I still get excited over being able to place a card, badge, phone app onto a device and watching something happen. I'll briefly go into how this particular technology works and how it contributes to the ease and convenience of every day activities. 

 

 

Transit card for D.C. Metro


RFID- Stands for Radio Frequency Identification. This involves two devices that "communicate" with each other using coils (serves as antennae), the magnetic field of those two devices, that conducts the transfer of information wirelessly once within range of that magnetic field; and a small data-filled chip, whose information is transferred as a result of the first two components interacting with each other.

 

 

  

NFC- Stands for Near Field Communication. While this is a type of RFID, the benefit to this is since it only uses HF (high frequency) to transfer data you have to be closer to the magnetic reader to trigger that wireless data transfer. 


 

RFID uses a range of both LF (low frequency) and HF (high frequency) during it's wireless energy transfer any data that is present is also transmitted and carried over. NFC only uses HF to transfer data, and tends to be more secure as there is a limit to the amount of data that's transmitted, (it only has room for a small string of characters). While RFID tends to spit out all of it's data more "carelessly", when within range of the readers' magnetic field. 

 

 

Here's how this all comes together; the smartrip card has a chip in it that has the monetary balance that was paid to purchase the card, as the data on it. That card is then placed directly on the RFID reader, and similar to how an RFID tag and RFID reader interact once both components enter each other's magnetic field; the data on the card is transmitted wirelessly and the turnstyle gates open up, allowing entry.

 

This same process works for phones, digital business cards, apps etc. that also use NFC beaming and even bluetooth technology to transmit data.

 

It's really a cool sight to see, how technology has advanced to the point where you're able to send a document from your phone to one of your friends, by simply tapping the back of your phone to theirs.

 

Or even better yet, use bluetooth to connect to their phone and transfer documents to them from across the room. Prime example of this is Apple's "Airdrop" feature. 

 

 

Transit Card for L.A. Metro


The Smartrip card data is managed by the software used on the machines that you purchase the cards from. That software has a transaction ledger of the balances on the card and "writes" that data to the chip on the card. When the card is used, that data is transmitted to another device which utilized the same software to record the remaining balance of how much is used.This process repeats when the card is refilled.

 

 

While you can find a brief explanation of how RFID and NFC works here, let me know your thoughts below on whether this technology has helped to improve your life or if you feel that's it's not secure enough. Comment below.


How tap-to-pay actually works

28.9.22


*As this is an Affiliate Post, if you choose to purchase anything through the links below, I will receive a small comission from that sale, with no extra cost to you. it's not mandatory, but highly appreciated*

 During my trip to D.C. I decided to visit the neighboring state of Virginia while I was nearby. I took the metro from D.C. first to Arlington, VA, visited the famous National Cemetary, and then took the train further in to visit the Pentagon.

 

While exploring, I decided to take a break at a Starbucks, and while on my way there, I walked past an Amazon Fresh Supermarket. Until then, I had no idea that Amazon even had a supermarket. Much less any physical stores. My curiosity got the better of me, and I walked in to investigate. 

 

The first thing I noticed were several turnstiles with a scanner next to them with a sign requesting you to present your QR code for your prime account. Looking around, I saw a few of the employees, walked over, and questioned them about how many locations they had and how this supermarket worked. 

 

They told me that amazon prime members can shop here by scanning their QR code, picking up what they need, adding it to their cart, and scanning the same code to leave the store, sans cashier interaction. I was intrigued and made it my business to try it out for myself when I returned home. 


 

I visited the one in Paramus, NJ, to glean a first hand shopper experience from it. I pulled into the mall's outdoor parking lot and excitedly walked in. I saw several turnstiles with a QR code scanner and one entrance at the end that allowed you to walk in without scanning anything.  

 

 

I grabbed a cart walked in through the bigger gate,  picked up a loaf of french bread, and when I finally pulled up my QR code, walked back to the turnstile and scanned it. I was told by the store associate, in order to use the the store's technology; I had to first put the bread back, then scan the code so the technology can "sense" what I picked up around the store and add it to my account. I did that and continued shopping.  

 

 

While walking through the aisles, I saw an array of products that were priced similarly to what you would see in Shoprite, Target, and Wholefoods. Some items were cheaper, while some were more expensive, and while I picked up some much-needed household items, I looked up and saw the multitude of camera's stacked next to each other, descending from the ceiling, all over the store.

The next hour was spent browsing through each aisle and surveying everything they had in that store. To my surprise, I enjoyed how they had an Amazon package return center at the back of the store. It's where you go to return any item's you've ordered from Amazon.com. It's a nice little added convenience to your shopping experience. 

 

I walked over to that counter to return some shoes and noticed a section that had a computer for you to sign into with a "palm-reader" next to it. I was met with intrigue and suspicion over this item, because while an avid tech enthusiast, I do have my reservations about how far I'm willing to go with Biometric devices.  This same device was also available at the exits so you can scan your palms or your QR code to leave the store.

 

Overall my experience was a pleasant one. The ease of shopping, how easily the items were found and they had sturdy reusable bags at the end caps of the aisle, with two different types of shopping carts. One was a regular cart and the other was a computerized cart that scans all of your items as you put it into your cart and adds that item to your account.  

 

Despite the novelty of being able to walk in and out of the store without using cash or stopping by a cashier, this location had cashiers available to help with your purchases if needed. If you decide to shop there and glean your own experience, here's what to watch out for: 




  •  Don't pick up anything you don't plan on buying because if you don't want it, you might get charged for it. The sensors are triggered on what you pick up, but not always on what you put back.
  •  

 

  • Easy to over shop. Some items are really cheap while others are more expensive than target and shoprite. I guess it balances out. 
  •  

 

  • You can't return just any amazon ordered package as it depends on if amazon shipped it from their warehouse or if it came from outside their delivery jurisdiction. As was the case with my shoes. I was so annoyed that I had to make another stop to the UPS store to drop it off. 
  •  

 

  • When you finish shopping and leave the store you are sent a receipt to your e-mail detailing your purchases, the cost and total number of each item. You have three hours to make adjustments, dispute costs, make refund request for items you've picked up/ returned and the total amount of items overall.

 

  •  
  • Amazon Fresh and Amazon Go are two different stores. One is a supermarket grocery store similar to stop and shop and wholefoods, while the other is similar to a 7-11 store. Check out the differences here: Amazon Go/Fresh

 

 

 

Have you had a chance yet to visit these stores? If so, leave a comment below and let me know your experience. If you'd like to see for yourself what the hype is all about, click here for a free trial of Amazon Prime and take a look.



Amazon Fresh- The New Age Grocery Store

21.9.22

 

 

When I first started my blogging journey, I dived head first into the world of web design in the form of my own blog website layout. I didn't make any of the website themes, as I purchased them from an online marketplace; however, I did get pretty familiar with the HTML coding once I started editing the layout and colors to my liking.

 

My background in tech made me all the more willing to "get my hands dirty" and learn something new. While my zeal for this new endeavor, sustained me; it also carried me through all of the long nights, setbacks, roadblocks, and delays. 

 

It wasn't all hard times, though, as I've had more joy and triumphs every time I figured out how to resolve a tech issue on my own and received more inspiration to edit and make my website better and more visually interactive.

 

I must say I am pleased with the final result, as every account opened, software used, and new ideas explored were all used in tandem with each other. Nothing went to waste, and everything fit together. The software I used for one of the sections on my website is mentioned below.

 

If you ever find yourself wanting to create a website of your own and would like to make any of your pictures "clickable" to another link, consider using this website.

 

 

While there are other websites out there that do a similar job to this one, I liked this one because not only was the website easy to use and the sign-up process for a free account was quick and seamless; but they have a brief tutorial video readily available to show you what to do.

 

The fact that they have a live chat agent; that proactively pings you to offer assistance, and responds immediately upon your interaction with it, was also a nice touch. 

 

I utilized this website to attach the image of my checklists to the printable PDF document needed to utilize it physically. It was very easy to fill out the information required for the generated links, and it safely redirected you to a working copy of my checklist.

 

You can also use this website to make image cards that lead to any URL you'd like, including your own company's website, social media page, or any hosted document you'd like to share. For the latter, make sure you change the sharing permissions of the document before linking it, so everyone who wants to access it can do so easily.

 

Whether you're ready to design a website or blog of your own, or just working on a presentation and want to give your slides a little extra flair by having the images on it, lead elsewhere when clicked, give this website a try and make your projects that much better.

 




How To Create Clickable Photos

21.7.22

 





I have had the privilege of working in the tech field for the last ten years. This journey has come with a lot of ups and downs while teaching me valuable lessons. I started out struggling to get and keep a job as a contractor, living in an overpopulated city, where there are more people than jobs available.

 

 

Now I landed a stable gig that allowed me to move to another state where the quality of living is better and they appreciate and "hold-onto" their techs. New York City is still the epicenter for the most sought-after tech jobs, I didn't get any traction in this industry until I took a job out of state.

 

 

I stumbled upon this industry back in 2013, after studying business in trade school. Once I learned that the skills taught would prepare me to be a receptionist/ secretary at best, I had to make a decision about what I was going to do next before I completed that program. I had previous employment as a secretary/ receptionist prior to entering that program, so imagine the time I would be wasting if I had gone straight home after completing that program.

 

 

That realization is why I chose to go to an advanced training tech program. I figured that was the closest transition I could make from my original field of study. I had no idea what to expect, but anything had to be better than being a receptionist. (No offense).
When I arrived at the program, I noticed I was one of three girls in a large sea of boys. Little did I know that this ratio would follow me through the early stages of my career. It wasn't easy being in the minority population of people, essentially paving the way for the others coming behind you.

 

 

My technical knowledge and ability was constantly questioned, patronized, and ignored; while constantly having to prove myself as a valuable resource in this field.

 

 

It used to frustrate me having to deal with the mix of condescending and fragile egos stemming from people who had nothing else to hold onto but this false sense of superiority. I learned quickly that if I was going to survive in this field, I had to be smart and strategic about how I handled them.

Since I have successfully traversed those hostile environments while gaining my experience through trials and errors; I'd like to give some tips on how to go about navigating a field that you're the minority in, while just starting out and still having a lot to learn.
Don't take anything personally
As I mentioned prior, I had to deal with my fair share of sarcasm, attitude, annoyance, and insecurity from different colleagues, from all walks of life. I stopped getting upset by it once I realized that their discomfort towards me, was due to them being unsuccessful and unfulfilled with their life.

 

 

Instead of them using that energy to better themselves, they'd rather spread their internal suffering to other people. That lack of priority is why they are where they are in their life. Laugh at them and move on. I can speak from experience, those people never progress any further than where you met them.

Learn something new every day:
Despite my rough start, I did find some people who were overjoyed and excited to have more women working in their department. They welcomed and embraced the change. Those are the ones who you should network with. Have conversations with them and pick their brain.

 

 

Find out how much they know about the field they are employed in and add them to an ever-growing list of resources that you can learn from. I have work friends to this day that I still reach out to and pick their brains. We challenge each other's perspectives and learn new things from each other each time we talk. It's a great feeling.

Always keep your eyes for opportunities open
My first tech job wasn't ideal, but it was necessary to get my foot in the door. I learned the art of upward mobility from balancing between working and job searching long enough to transition out. Doing both simultaneously have helped me master my multitasking and time management skills. I've heard the well-known rumor that it's easier to "get a job, when you already have a job".

 

 

I used to believe that too until the last transition from my last job to where I am now. While I finished my six-month stint at that contract, I was desperately looking for another opportunity to start working, before the current contract was up.

 

I took a position I didn't initially want (it was in another state) but time was winding down and I didn't have any more time to be picky. I don't think it's easier to find work, while already employed, it's that you don't notice how long you've been looking since, there's less urgency to find work.

Build your networks
The best part about starting out as a contractor is you get the chance to work in several different environments. The downside is, you're more vulnerable to the volatility of the tech market affecting you negatively.

 

 

Contractors are often the last hired and first fired during any economic downturns as well as, not always given working benefits comparable to what full-time employee's get. Being a contractor gives you  the chance to build your references and contacts list while traversing different job roles. Through the many environments I've worked in, I have collectively kept in contact with 40% of my former colleagues.

 

 

Whether through Linked in, facebook, Instagram, direct number exchange, I was able to utilize them as references and I was often called on to be a reference and a referral for them. I have been offered jobs through that network and have had doors open for me more easily because of my rapport with them.

Expand your skillset:
This goes for any industry you are employed in. No matter if your still a novice in your field, recently changed careers or are a subject matter expert featured in publications; always expanding your skillset will pay off majorly in the long-run.

 

 

Challenge yourself to keep learning about the different aspects of your field. Even if it's something you're not interested in, become familiar enough with it, to be able to explain it to someone else who might be interested in it.

 

 

Doing this, will keep you in a valuable and marketable enough position, where you control your next move. Who knows you might discover something else that peaks you're interest, and is worth pursuing. In which case I'd say Go for it!


I still employ these tips to this day and it has allowed me to not only remain in a job that I love, at a company that valued and fought to keep me; But to enjoy the satisfaction of seeing the smiles and ease of anxiety of the people I help everyday.

 

 

The stability here, afforded me the chance to fully explore and expand my skillset to other areas within the tech field. While I am still deciding where I'm going next from here, I am grateful for the opportunity to be in a position where I am truly in control of what happens next. It's an incredible feeling.


Hey guys, this post is a small departure from the content that I usually make. But recent events have caused me to rethink and re-evaluate how to go about conducting myself and how I operate with my superiors, the client support aspect, and even other people at work. I went through the unfortunate experience of losing a colleague. He was my direct report and we worked together side by side for three and a half years. 



I noticed his health was on the decline after we returned to the office during covid; and while I professionally inquired about his well-being, I didn't want to be rude and "push" any further into  his business, as I didn't wanna come-off as unprofessional. 


I knew he wasn't being all the way truthful, but I didn't know what else to do.  Fast forward, I noticed for a period of time, that he was breathing very heavily. It was labored and loud. My concern grew and when I would casually ask him how he was feeling, it was met with a nonchalant "I'm fine, I'm good" and nothing more. I continued to ignore any lingering questions I had, despite hearing his labored breathing continue. 



The day came when he didn't come into the office as he wasn't feeling well, and while I didn't think much of him being out sick, I started to worry once I saw the e-mail going around that he was going into surgery, after he saw the doctor. He didn't return to the office for two weeks. When everyone asked me about him, I relayed what I knew and the immediate response to my statements were "what's he getting surgery for?" I couldn't tell them, as whenever I asked him if he was ok, (via text, I didn't feel comfortable calling) He replied right away, saying he "was good".

 


While that was his default response, I felt ashamed that he never wanted to disclose what was going on and I wasn't in a position to pry that type of information out of him. I continued to tell everyone what I knew so far, while silently worrying about how he was doing. It was the longest he had been out of the office and every passing day I was wondering if something had gone wrong during surgery, and was I going to hear some troubling news.  


When you love tech but hate tech management

4.6.22

 


 Credit Card Scams are an all too commonplace issue. The frequency of this doesn't always stem from anyone's laziness or incompetency with safeguarding their stuff. While you may be putting forth your best efforts; there are cracks, loopholes, and technicalities, that can leave you exposed to being exploited by even the most amateur of scammers. 

 

 

I didn't realize how easily information can be stolen until an incident happened that hit home. While I was reeling from the loss of a colleague, who was my direct report, my friends and I decided to head out to dinner on a Saturday night to lift my spirits a bit. We went to a boathouse in West Orange, NJ and overall we had a great night. 

 

 


So imagine my surprise when my friend alerted me, six days later that someone at that restaurant had "skimmed" his card information and decided to purchase $8,000 dollars worth of Versace merchandise. I saw the screenshots and was appalled. I immediately went into warrior mode and threatened to sue the establishment.

 

I felt an overwhelming sense of guilt and anger, as I was the one who picked the place. It was all our first time there and  I loved the ambiance and the view of the lake. So for that memory to be tarnished like this, didn't sit right with me. 

 

 

 

I visited the restaurant the next day and spoke with the manager on shift about the incident. They were very understanding and concerned and I explained the issue while taking care not to directly place blame on our waiter that night, as we really have no proof that it was them.

 

 

The manager understood the necessity of addressing this issue and putting this complaint on file.

 

 

If the perpetrator gets away with doing this and isn't put on notice it will become a pattern and damage the restaurant's reputation, if this news gets out.  I exchanged the contact information for both the on-shift manager and the regional manager with my own as well as my friends'.   

 


Instagram