Author: Carter Academy

  • Cyber Threat Maps

    These cyber threat maps all demonstrate reported and live cyber threats. My favorite to use in class is the Kapersky Cyberthreat Map Norse Attack Map FireEye Threat Map Kaspersky Cyberthreat Real-Time Map Bitdefender Global Protective Network Check Point Threat Map A10 Networks Threat Map Akamai Kona Site Defender Threat Map Trend Micro Threat Map SANS…

  • Basics of the Internet

    At its most basic, the internet is a network of wires connecting computers, enabling communication through servers and IP addresses, similar to how electricity works. Highlights

  • Ports (Not ships or connections)

    The Internet Assigned Numbers Authority (IANA) maintains a list of well-known ports that are standardized for specific types of network services and communication protocols. These ports help ensure that data is properly routed to the appropriate service or application running on a computer or network device. When you reach an IP address, a port is…

  • Browser Usage Worldwide

    Statcounter Source: StatCounter Global Stats – Browser Market Share

  • Screen Grabs Anybody?

    Here are some keyboard shortcuts to capture screenshots / screen grabs from Chrome OS, MAC OS, and Windows. Chrome OS When you need to grab screenshots of a website or your computer screen:  In Chrome Hold down the Ctrl + Switch window keys to capture a full screenshot. (For non-Chrome OS keyboards, press Ctrl +…

  • Your Deleted Files Still Exist

    When you delete something it does not permanently go away. The short video below shows what happens.

  • USB Types

    There are several different types of USB and different types of connections. If you look at the end of a USB Type A or B cable (or the jack on the computer) you will see a color and that will let you know what speed that connection is. Speeds TYPE COLOR SPEED USB 1.1 White…

  • Hiding in Plain Sight: Steganography

    Steganography is the art and science of hiding Information in plain sight. Using Steganography information is hidden within other, seemingly innocuous data. The goal of steganography is to conceal the existence of the hidden information, making it difficult for others to detect or decode. This handout will provide a brief overview of steganography, including common…

  • Character to Binary

    Binary is a system of numerical notion that uses only the digits 1 and 0. The state of a circuit is either on (1) or off (0). In computers each letter and number is represented by a set of eight 0s and 1s. This is referred to as ASCII Code. The chart below illustrates this.…

  • Malware Types

    Types of Malware: 1. Virus – A type of malware that infects a computer system by replicating itself and spreading to other computers. 2. Trojan – A type of malware that disguises itself as a legitimate program to gain access to a computer system and steal data. 3. Worm – A type of malware that…