top of page
Search





boneymaundu
Jun 3, 20245 min read
SECURING YOUR WI-FI FROM NEIGHBOURS
It can happen gradually, or you may realize all of a sudden that you experience frustratingly constant video buffering or that websites...
30

boneymaundu
May 23, 20243 min read
PHYSICAL INTRUDER DETECTION SYSTEMS
Intrusion detection systems (IDS) are a vital component of access control systems that prevent unauthorized access to secure facilities
50

boneymaundu
Apr 15, 20243 min read
Bluejacking, Bluesnarfing & Bluebugging Explained
Bluejacking, Bluesnarfing & Bluebugging Explained
20




boneymaundu
Feb 17, 20245 min read
IS YOUR PHONE BEING TRACKED?
Espionage is a fully-fledged information mining industry, and often, people would go to great lengths to acquire information in whatever way
20

Boney Maundu
Feb 6, 20243 min read
MIMO
MIMO is a wireless communication antenna technology that utilizes multiple antennas at both ends of the communication circuit, i.e., at the
10

Boney Maundu
Jan 20, 20243 min read
DATA COMPRESSION
Data compression is the process of encoding, restructuring, and modifying digital data files in order to reduce their size.
20

Boney Maundu
Jan 17, 20243 min read
Why some countries use 110v while others use 220v electricity
The two main electricity voltages used worldwide lie in the 110-volt range and the 230-volt range.
10


Boney Maundu
Jan 14, 20244 min read
BLUETOOTH: Explained
Bluetooth is a fairly secure low-bandwidth Personal Area Network that relies on short-range RF
10


Boney Maundu
Jan 2, 20245 min read
ELECTRICAL FIRES
Electrical fires can be some of the hardest to predict, prevent, and extinguish, making them among the most devastating.
10


Slim Bz TechSystems
Dec 24, 20234 min read
SOCIAL ENGINEERING
Social engineering refers to a range of malicious acts carried out through human interactions where tricksters use psychological manipulatio
10

Boney Maundu
Dec 24, 20235 min read
CCTV REMOTE ACCESS & INTERNET BANDWIDTH
When it comes to remote viewing, internet upload speed is even more important than download speed.
71

Boney Maundu
Nov 12, 20233 min read
AC vs DC: TESLA vs EDISON
One of the greatest business and technology battles of the nineteenth century was in the field of electricity, and each opposing side was le
61

Boney Maundu
Nov 7, 20232 min read
INTERNET vs. WWW
A simple way to conceptualize this would be to think of the internet as a series of roads that connect cities to each other, while the World
50

Boney Maundu
Oct 18, 20236 min read
HOME STRUCTURED CABLING
A structured cabling system is an organized collection of copper, fiber, video, and low-voltage wiring that connects all the home’s electron
120
bottom of page