Kids, Tech

5 Tips for Protecting Yourself and Your Kids from “Free” Children’s Games on the iPhone or iPad

iOS devices are great for kids. They’re easy to use, and there are a bevy of solid educational apps that children can understand and use without a tremendous amount of effort. They’re also a great way to introduce children to computing, and give them something (at times) constructive to do in those life moments where they need a distraction. That…

Continue Reading

Tech, Web, Work

Defending against WordPress brute-force attacks using built in features of IIS

Throughout the past week, a very large network of compromised computers has been pounding away at sites using the WordPress content management platform, attempting to access those sites by continually attempting logins using default WordPress usernames, along with a combination of passwords. For these attacks to work, the attacking machines have to continually try various combinations of passwords, throwing request…

Continue Reading

Personal

Choose Your Own Adventure

Most of the time, I’m a pretty firm believer in eyes forward, one foot in front of the other, just keep swimming, etc. No sense looking back with regret at the past, as there’s little you can do to change it and all of that. Every once in a while, though, you’ll come across someone from your past who made…

Continue Reading

Life

OMG I am so shocked

I doubt the veracity of this article. “The likes themselves are a combination of obvious and baffling. Liking “Kathy Griffin,” “Juicy Couture,” or the musical “Wicked” were found to be strong indicators that a man was gay, while liking sports-related topics, “Bruce Lee” and “Being Confused After Waking Up From Naps” were more popular with straight men, according to the…

Continue Reading

blackboard

Adding CAS SSO to Blackboard Learn 9 With a Different Username/User ID

Recently I completed work on adding single sign-on functionality to our Blackboard Learn environments by integrating the login with our CAS server. To understand how this works, you first need a basic understanding of the authentication architecture that was being used prior to adding CAS to the mix. Our environment provides users with two primary methods of authenticating to services…

Continue Reading