Author's posts
Analyze Trends and Technologies
[Abstract] The purpose of this document is to analyze trends and technologies based upon the recommendation I made for a company to utilize a collaboration system in order to improve communications throughout their organization. The recommendation was made based upon a scenario of a company called Kucera Clothiers whose IT strategy was to improve IT …
Business Trends
[Abstract] The purpose of this document is to describe two different business trends and determine if current business trends have a positive or negative affect on the company by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy of …
Affairs
First Affair A married man was having an affair with his secretary. One day they went to her place and made love all afternoon. Exhausted, they fell asleep and woke up at 8 PM. The man hurriedly dressed and told his lover to take his shoes outside and rub them in the grass and dirt. …
1st Day on the Job
So after landing my new job as a Wal-Mart greeter, a good find for many retirees, I lasted less than a day…… About two hours into my first day on the job a very loud, unattractive, mean-acting woman walked into the store with her two kids, Yelling obscenities at them all the way through the …
Strategic Information Management in Corporate Strategy
[Abstract] The purpose of this document is to critically examine the role of information management in corporate strategy by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three …
Strategic Information Management
[Abstract] The purpose of this document is to provide a basic understanding of managing information systems by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three projects under …
Grandma & Grandpa
Grandma and Grandpa were visiting their kids overnight. When Grandpa found a bottle of Viagra in his son’s medicine cabinet, he asked about using one of the pills. The son said, “I don’t think you should take one Dad; they’re very strong and very expensive.” “How much?” asked Grandpa. “$10.00 a pill,” Answered the son. …
Cyber Crime Offenders
[Abstract] The purpose of this document is intended to discuss motives, opportunity, and means of typical cyber offenders. Also included within this document are three different reasons of why some cyber crime offenders are prosecuted, while others are not. This document is intended for anybody looking to gain a basic understanding of why different people …
Justice System and Forensic Investigators
[Abstract] The purpose of this document is to discuss three elements of the United States justice system and how they relate to a forensics investigator. This document is intended for anybody looking to gain a basic understanding or knowledge of how the justice system applies to forensic investigators. [Content] Since the advent of the Internet …
Mikey from American Chopper
Today I was walking down the street in Waikiki and I saw Mikey Tuttle from the t.v. show American Chopper. That was pretty cool, but unfortunately I didn’t get my camera out in time to take a photo. It was probably good that I didn’t take a photo anyway. I’m sure people like him get …
Hilton Hawaiian Village
I got roped into going on a business trip for training and they twisted my arm to fly to Hawaii where I stayed in the Hilton Hawaiian Village. Overall this was a nice hotel with nice services, however it was a bit pricy and it seems as though it is a trap. The hotel has …
Hashing Algorithms and CRC Uses
[Abstract] The purpose of this document is to provide a basic understanding of how hashing algorithms and cyclic redundancy checks can be used for evidence, authentication, and filtering. This document is intended for anybody looking to gain a basic understanding or knowledge of how forensic investigators find evidence to be used in a court of …
Hostile Code and Forensic Investigators
[Abstract] The purpose of this document is to identify five different examples of hostile codes and how they impact information systems. Also included within this document is an explanation of how forensic investigators should find the sources of hostile code. This document is intended for anybody looking to gain a basic knowledge or understanding of …
Why I Fired My Secretary
Last week was my birthday and I didn’t feel very well waking up on that morning. I went downstairs for breakfast hoping my wife would be pleasant and say, ‘Happy Birthday!’, and possibly have a small present for me. As it turned out, she barely said good morning, let alone ‘ Happy Birthday.’ I thought… …
Areas Digital Forensic Investigators Find Evidence
[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …
Another Thawte Notary 10 Points
Today I took a train for 1 hour to a little place called Tsutsujigaoka. This is in Tokyo, but it is probably a part of Tokyo that I would not normally go to. When I got there I was met by a nice German guy who works for a bank. We went to a coffee …
Don’t Choke on Food in the South
Two hillbillies walk into a restaurant. While having a bite to eat, they talk about their moonshine operation. Suddenly, a woman at a nearby table, who is eating a sandwich, begins to cough, and after a minute or so, it becomes apparent that she is in real distress. One of the hillbillies looks at her …
Thawte Notary 10 Points
Today I took the train for about an hour and stopped at Kawasaki to meet a Japanese guy who worked at IBM. We filled out the necessary forms right there in the train station and then I had to fight rush hour traffic for an hour to get back home. That was my first time …
Thawte Notary
I have recently embarked on a new venture and it is to obtain a Thawte web of trust notary status. In order to obtain this status I have to accumulate 100 points by meeting with different people face to face and filling out paperwork that verifies we met face to face and showing my identification …
Billy Bob Gets Deflowered
In a small town in Tennessee, Big Bubba decides it’s time for his son, 14 year old Billy Bob, to learn the facts of life. He takes him to the local house of ill repute, which is fronted by a beauty parlor. Bubba introduces Billy Bob to the madam, and explains that it’s time for …
Internet Protocol Security (IPsec)
Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …