Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress

Amazon Price: N/A (as of October 16, 2017 08:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

AN ACT

To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.
Continue reading “Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress”

Global Marketing Partners – METAGEEK WI SPY 2.4X SPECTRUM ANALYZER WITH EXTERNAL ANTENNA

Rating: 
Amazon Price: N/A (as of October 17, 2017 07:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

General Information Manufacturer/Supplier: MetaGeek, LLC Manufacturer Part Number: 2400x3v Brand Name: MetaGeek Product Line: Wi-Spy Product Model: 2.4x Product Name: Wi-Spy 2.4x Wi-Fi Finder/Tester Marketing Information: 2.4 GHz Spectrum Analysis The workhorse spectrum analyzer for Wi-Fi, MetaGeek's Wi-Spy 2.4x has become the industry standard for 2.4 GHz band troubleshooting. Packed with capability, versatility and portability, it helps users see the invisible – so they can zero-in on and mitigate RF interference and wireless setup problems. Since the 2.4 GHz band is increasingly crowded, the need for quick and effcient spectrum analysis is more important than ever. An easy to use, portable spectrum analyzer is needed to properly deploy wireless networks, and to keep them up-and-running. Product Type: Wi-Fi Finder/Tester Technical Information Test Services: The Wi-Spy 2.4x provides deep visibility into wireless environments – to discover noisy channels, fnd interfering devices, and enable optimum WLAN speed and performance Interfaces/Ports Ports: 1 x USB

12TB SAS/SATA Data Storage for IM Solo-4 Hard Drive Duplicator

Amazon Price: N/A (as of October 16, 2017 19:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

The 12TB SAS/SATA Data Storage System connects seamlessly to the IMSolo-4 (Expansion-Ready) unit with the Expansion Box and the included PCIe SAS Extender Controller Card to provide a large volume RAID storage space. The 12TB SAS/SATA Data Storage System is ideal for customers who own a Solo-4 (Expansion-Ready) unit and are looking for unlimited storage expandability by combining multiple systems together. *IM Solo-4 Unit and Expansion Box NOT INCLUDED

Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System: What They Are, How They Work, and How to Defend Your PC, Ma

Rating: 
Amazon Price: N/A (as of October 16, 2017 12:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer Virus Books We are witnessing on escalating computer-virus arms race – virus, vaccine, counter-virus – that has created a whole anti-virus industry.. software programs, consultants, and many books. The most reliable intelligence from this conflict has been collected in Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System, by John McAfee. When corporations in Silicon Valley discover a virus, they call McAfee, who arrives in a specially outfitted virus-buster van. " His book, written for the computer-security trade, gives a comprehensive dossier of all known viral strains, post and present (up to fall 1989), and much insider scuttlebutt that is very readable for the lay user. On the other hand, Virus! by Allan Lundell is a wild, irresponsible, and highly speculative book that dramatically exaggerates the subtle attributes of computer viruses, and therefore is the more revealing one, in a vaudeville way. It tackles the question, "What does a computer virus moon?" Treat what is said as well- founded rumor. There's probably more in these two books than most want to know, but for both computer crime- and computer life-watchers, the trail begins here.