View M. James Hall's profile on LinkedIn

Uncategorized category: scannable-resumescannable-resume slugScannable Resume title

filed undedr submitted by mjameshall authoron August 16, 2016 date thumbnail

Include your address. Many programs will kick your resume to the curb without a postal address. Locations may even be included as keywords in the screening process. Just make sure you don’t only include it in the header or footer, which most algorithms ignore completely. Do not place your contact information in the header of […]

excerpt


Security category: hackable-personal-email-yay-you-probably-dohackable-personal-email-yay-you-probably-do slugHackable personal email? Yay, you probably do. title

filed undedr submitted by mjameshall authoron August 15, 2016 date thumbnail

Easiest and first steps to hack a personal emai – security questions. Yep. Remember 7 years ago when you first setup your email account? Remember the step of answering 3 personal security questions? Remember what they weren’t? No? It was probably the city you grew up in. The same hometown city posted in your social […]

excerpt


Security category: mac-os-x-freezes-when-loading-internet-accountsmac-os-x-freezes-when-loading-internet-accounts slugMac OS X Freezes when Loading Internet Accounts title

filed undedr submitted by mjameshall authoron date thumbnail

SOLUTION – Delete a file and kill a process Solution to Preferences freezing when Loading Internet Accounts was found within Apple Support Communities courtesy of user bthomp2420. https://discussions.apple.com/message/25003487#25003487 From the post: Delete the contents of ~/Library/Caches/com.apple.iCloudHelper Kill the com.apple.iCloudHelper process in the Activity Monitor

excerpt


Security category: tweak-font-on-a-mactweak-font-on-a-mac slugTweak font on a MAC title

filed undedr submitted by mjameshall authoron date thumbnail

To implement this tweak: 1. Start a new Terminal session (in Finder click Applications > Utilities > Terminal). 2. To set this to Strong, type (or copy and paste) the following command: defaults write NSGlobalDomain AppleFontSmoothing -integer 4 To set this to Smoother, type (or copy and paste) the following command: defaults write NSGlobalDomain AppleFontSmoothing -integer 3 […]

excerpt


Security category: fully-disable-protection-and-gatekeeperfully-disable-protection-and-gatekeeper slugFully disable Protection and Gatekeeper. title

filed undedr submitted by mjameshall authoron date thumbnail

Fully disable Protection and Gatekeeper. Follow these steps to disable SIP: 1. Restart your Mac. 2. Before OS X starts up, hold down Command-R and keep it held down until you see an Apple icon and a progress bar. Release. This boots you into Recovery. 3. From the Utilities menu, select Terminal. 4. At the […]

excerpt


Security category: cloud-securitycloud-security slugCloud Security title

filed undedr submitted by admin authoron date thumbnail

< ![CDATA[One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you […]

excerpt


Security category: back-up-your-filesback-up-your-files slugBack up Your Files title

filed undedr submitted by admin authoron August 12, 2016 date thumbnail

< ![CDATA[Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.]]>

excerpt


Security category: what-is-malwarewhat-is-malware slugWhat is Malware title

filed undedr submitted by admin authoron August 11, 2016 date thumbnail

< ![CDATA[Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on […]

excerpt


Security category: dont-login-on-untrusted-computersdont-login-on-untrusted-computers slugDon’t Login on Untrusted Computers title

filed undedr submitted by admin authoron August 10, 2016 date thumbnail

< ![CDATA[A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The […]

excerpt


Security category: conversationsconversations slugConversations title

filed undedr submitted by admin authoron August 9, 2016 date thumbnail

< ![CDATA[When traveling, it is very easy to forget where you are when discussing business with colleagues. That airport, taxi, restaurant or hotel lobby may have individuals nearby eavesdropping on your conversation. When discussing confidential information, agree to hold off on the conversation until you can be assured of privacy. Also, be careful not to […]

excerpt


Older Posts »

Resume

See my Resume, BIO, Bravos, Awards, Letters of Recomendations and Publication.

Apps

Check out my security and non-security applications that I developed.

Security Blog

Ill Post great news, tidbits and other security related items - plus more!