Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

(2) HIGH: Microsoft Windows Windows Kernel Networking Vulnerability

November 11, 2011 Author: Category: Greg's Blog

Category: Widely Deployed Software Affected: Windows Vista Windows Server 2008 Windows 7 View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security Gergory Evans

read more

Can OpenFlow break the hold of hardware on networking?

November 3, 2011 Author: Category: Greg's Blog

Can you program a network of multi-vendor switches and routers, all running different operating systems, command line interfaces and configuration routines, to work in concert when it comes to managing flows? The OpenFlow effort thinks you can. OpenFlow is an open source project borne of a six year research collaboration…

read more

Tech-Savvy Occupy Protesters Use Cellphone Video, Social Networking To Publicize Police Abuse

October 29, 2011 Author: Category: Greg's Blog

George Orwell once wrote that if you want a vision of the future, “imagine a boot stamping on a human face — forever.” Governments have suppressed citizen dissent for as long as there have been governments and citizens to dissent against them. But over the last decade, it has become…

read more

Frederick man sentenced to 30 months for importing and selling fake computer networking equipment

August 21, 2011 Author: Category: Greg's Blog

Donald H. Cone, 48, of Frederick, Md., was sentenced in Alexandria, Va., to 30 months in prison for his role in a conspiracy to import and sell counterfeit Cisco-branded computer networking equipment, according to a press release from the U.S. Justice Department. U.S. District Court Judge Gerald Bruce Lee also…

read more

Homenet group to set standards for IPv6 in home networking

July 8, 2011 Author: Category: Greg's Blog

The Internet Engineering Task Force is considering establishing a working group to smooth some of the impending issues around setting up and maintaining IPv6-based Internet connections into homes. “A collection of protocols needs to be agreed upon, so vendors of equipment used in home networks will have an interoperable suite…

read more

LIGATT: The answer is D. Making a wireless network into a subnet helps isolate other hosts/parts of the network from the many dangers of networking

November 16, 2010 Author: Category: Greg's Blog

LIGATT: The answer is D. Making a wireless network into a subnet helps isolate other hosts/parts of the network from the many dangers of networking View full post on Twitter / LIGATT

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved