TechnicalJones.com

Author

Leroy Jones, Jr. is the creator of Talking Technology with Leroy Jones, Jr.

July 2010 Archives

TECH TERM - MAILBOMB

| No Comments
TechTerm_Image 2008.png
Mailbomb

Definition:
The mail sent to urge others to send massive amounts of e-mail to a single system or person, with the intent to crash the recipient's system.

Mailbombing is widely regarded as a serious offense.



MailBomb_July 2010.jpg

Enhanced by Zemanta

TECH TERM - MAILBOMB

| No Comments
TechTerm_Image 2008.png
Mailbomb

Definition:
The mail sent to urge others to send massive amounts of e-mail to a single system or person, with the intent to crash the recipient's system.

Mailbombing is widely regarded as a serious offense.



MailBomb_July 2010.jpg

Enhanced by Zemanta

TECH TERM - TRIPWIRE

| No Comments

TechTerm_Image 2008.pngTripwire

Definition:
A software tool for security. Basically, it works with a database that maintains information about the byte count of files. If the byte count has changed, it will identify it to the system security manager.



Tripwire_July 2010.png

Enhanced by Zemanta

TECH TERM - TRIPWIRE

| No Comments

TechTerm_Image 2008.pngTripwire

Definition:
A software tool for security. Basically, it works with a database that maintains information about the byte count of files. If the byte count has changed, it will identify it to the system security manager.



Tripwire_July 2010.png

Enhanced by Zemanta

ALIVE & KICKING

| No Comments

Alive and Kicking . . .










Enhanced by Zemanta

ALIVE & KICKING

| No Comments

Alive and Kicking . . .










Enhanced by Zemanta

SURVEY EMR

| No Comments

SURVEY EMR

| No Comments

INTERNET OUT

| No Comments

INTERNET OUT

| No Comments

TECH TERM - PACKET FILTER

| No Comments


TechTerm_Image 2008.pngPacket Filter

Definition:  Inspects each packet for user defined content, such as an IP address but does not track the state of sessions.

This is one of the least secure types of firewall.



PacketFilter_July 2010.gif



TECH TERM - PACKET FILTER

| No Comments


TechTerm_Image 2008.pngPacket Filter

Definition:  Inspects each packet for user defined content, such as an IP address but does not track the state of sessions.

This is one of the least secure types of firewall.



PacketFilter_July 2010.gif



SENIOR FACES

| No Comments


SeniorFaces_July 2010.jpg

Seniors are find their way around the internet: 

AARP: Net-savvy, social networking seniors prefer Facebook


Folks may be growing older, but they are not about to be left behind by any technology!  :-)



SENIOR FACES

| No Comments


SeniorFaces_July 2010.jpg

Seniors are find their way around the internet: 

AARP: Net-savvy, social networking seniors prefer Facebook


Folks may be growing older, but they are not about to be left behind by any technology!  :-)



LIFE & DEATH ON THE INTERNET

| No Comments


LifeDeath_July 2010.jpg

The reality of life.

What happens to your online life when you pass on:



Something to think about.



LIFE & DEATH ON THE INTERNET

| No Comments


LifeDeath_July 2010.jpg

The reality of life.

What happens to your online life when you pass on:



Something to think about.



EHR LIFE

| No Comments

What do you think?


More information on EHR - Talking Technology with Leroy Jones, Jr.:

"E-HEALTH RECORDS" - NEW SHOW



OPEN EHR



E-MOVES



E-HEALTH GOLD



PERSONAL CONTROL OF E-HEALTH RECORDS



E-HEALTH TECHNOLOGY FOR THE BRAVE



HEALTH TERM - ELECTRONIC HEALTH RECORDS



E-SECURITY



ELECTRONIC MEDICAL RECORDS . . .

DOES IT HELP?


EHR TIMELINE


EHR BUSINESS



EHR LIFE

| No Comments

What do you think?


More information on EHR - Talking Technology with Leroy Jones, Jr.:

"E-HEALTH RECORDS" - NEW SHOW



OPEN EHR



E-MOVES



E-HEALTH GOLD



PERSONAL CONTROL OF E-HEALTH RECORDS



E-HEALTH TECHNOLOGY FOR THE BRAVE



HEALTH TERM - ELECTRONIC HEALTH RECORDS



E-SECURITY



ELECTRONIC MEDICAL RECORDS . . .

DOES IT HELP?


EHR TIMELINE


EHR BUSINESS



RURAL HEALTH & BROADBAND

| No Comments

RURAL HEALTH & BROADBAND

| No Comments

TECH TERM - NET SEND SPAM

| No Comments

TechTerm_Image 2008.pngNet Send Spam

Definition: Windows messenger vulnerability also known as net send spam, messenger spam or winpopup.

These types of ads usually take the form of a gray pop up box bearing spam (unsolicited advertisements) with an "OK" button.

NSS_July 2010.jpg

Enhanced by Zemanta

TECH TERM - NET SEND SPAM

| No Comments

TechTerm_Image 2008.pngNet Send Spam

Definition: Windows messenger vulnerability also known as net send spam, messenger spam or winpopup.

These types of ads usually take the form of a gray pop up box bearing spam (unsolicited advertisements) with an "OK" button.

NSS_July 2010.jpg

Enhanced by Zemanta

NEW SHOW - MOBILE ACCESS 2010

| No Comments



"TALKING TECHNOLOGY WITH
LEROY JONES, JR."

July 15, 2010

TOPIC:
 "NEW SHOW - MOBILE ACCESS 2010"

With:


ASmith_July 2010.JPGAaron Smith
Author of the Pew Internet & American Life Project
Report on Mobile Access 2010

Thumbnail image for PewInternet_Aug 2009.jpgFor more on the Report on
Talking Technology with Leroy Jones, Jr.
:

MOBILE + WIRELESS = THE INTERNET



NEW SHOW - MOBILE ACCESS 2010

| No Comments



"TALKING TECHNOLOGY WITH
LEROY JONES, JR."

July 15, 2010

TOPIC:
 "NEW SHOW - MOBILE ACCESS 2010"

With:


ASmith_July 2010.JPGAaron Smith
Author of the Pew Internet & American Life Project
Report on Mobile Access 2010

Thumbnail image for PewInternet_Aug 2009.jpgFor more on the Report on
Talking Technology with Leroy Jones, Jr.
:

MOBILE + WIRELESS = THE INTERNET



PHONE SMART

| No Comments



PhoneSmart_July 2010.jpgHow smart is your phone?:

The smart phone impact on consumer mobile usage habits

How smart are you?



Enhanced by Zemanta

PHONE SMART

| No Comments



PhoneSmart_July 2010.jpgHow smart is your phone?:

The smart phone impact on consumer mobile usage habits

How smart are you?



Enhanced by Zemanta

MOBILE AFRICA

| No Comments



Mobile Africa_July 2010.jpg

MOBILE AFRICA

| No Comments



Mobile Africa_July 2010.jpg

MOBILE + WIRELESS = THE INTERNET

| No Comments


MWI_July 2010.jpg
Things keep adding up.

Check this out:

Going wireless all the way to the Web

The world keeps changing . . .

More to come . .
.


Enhanced by Zemanta

MOBILE + WIRELESS = THE INTERNET

| No Comments


MWI_July 2010.jpg
Things keep adding up.

Check this out:

Going wireless all the way to the Web

The world keeps changing . . .

More to come . .
.


Enhanced by Zemanta

TECH TERM - SECURE SOCKETS LAYER

| No Comments


TechTerm_Image 2008.pngSecure Sockets Layer (SSL)

Definiton: A session layer protocol that provides authentication and confidentiality to applications.




SSL_July 2010.jpg


TECH TERM - SECURE SOCKETS LAYER

| No Comments


TechTerm_Image 2008.pngSecure Sockets Layer (SSL)

Definiton: A session layer protocol that provides authentication and confidentiality to applications.




SSL_July 2010.jpg


TECHNOLOGY & ALS

| No Comments

Making lives better.

Simple plan.

Simple goal.



Enhanced by Zemanta

TECHNOLOGY & ALS

| No Comments

Making lives better.

Simple plan.

Simple goal.



Enhanced by Zemanta

HEALTH CLOUD

| No Comments


HealthCloud_July 2010.jpg

Is the future of health care in the clouds?

Microsoft Aims To Alleviate Health IT Cloud Concerns

What do you think?





HEALTH CLOUD

| No Comments


HealthCloud_July 2010.jpg

Is the future of health care in the clouds?

Microsoft Aims To Alleviate Health IT Cloud Concerns

What do you think?





HEALTH CARE TECH CHALLENGE

| No Comments

HEALTH CARE TECH CHALLENGE

| No Comments

MOBILE HEALTH TOUCH

| No Comments


HarvardMed_FamilyVan_July 2010.jpg
"What can we learn from Mobile Health Care?":

A Little Van with a Big Impact

Harvard Med (Family Van) steps up to the plate.


More background on the story:

Harvard Medical School's Family Van Short on Funds




Enhanced by Zemanta

MOBILE HEALTH TOUCH

| No Comments


HarvardMed_FamilyVan_July 2010.jpg
"What can we learn from Mobile Health Care?":

A Little Van with a Big Impact

Harvard Med (Family Van) steps up to the plate.


More background on the story:

Harvard Medical School's Family Van Short on Funds




Enhanced by Zemanta

HAPPY 4TH OF JULY

| No Comments


DC_4th_July 2010.jpg
HAPPY 4TH OF JULY!

Enhanced by Zemanta

HAPPY 4TH OF JULY

| No Comments


DC_4th_July 2010.jpg
HAPPY 4TH OF JULY!

Enhanced by Zemanta

TECH TERM - ETHERNET SNIFFING

| No Comments
TechTerm_Image 2008.pngEthernet Sniffing

Definition: This is listening with software to the Ethernet interface for packets that interest the user.

When the software sees a packet that fits certain criteria, it logs it to a file.

The most common criteria for an interesting packet is one that contains words like login or password.

EthernetSniff_July 2010.jpg


TECH TERM - ETHERNET SNIFFING

| No Comments
TechTerm_Image 2008.pngEthernet Sniffing

Definition: This is listening with software to the Ethernet interface for packets that interest the user.

When the software sees a packet that fits certain criteria, it logs it to a file.

The most common criteria for an interesting packet is one that contains words like login or password.

EthernetSniff_July 2010.jpg


TECH TERM - DNS SPOOFING

| No Comments

TechTerm_Image 2008.png
DNS Spoofing

Definition: Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.



DNS SPOOF_July 2010.jpg


TECH TERM - DNS SPOOFING

| No Comments

TechTerm_Image 2008.png
DNS Spoofing

Definition: Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.



DNS SPOOF_July 2010.jpg


Main Index