top of page
Search


The Dark Web: Explained
the dark web explained

boneymaundu
Aug 5, 20245 min read
1 view
0 comments


SIM SWAPPING: Explained
SIM Swapping Explained

boneymaundu
Jul 26, 20244 min read
2 views
0 comments


GUEST NETWORK: Explained
Wifi guest network

boneymaundu
Jul 8, 20243 min read
1 view
0 comments


LOGIC BOMBS: Explained
Logic bombs - cyber security

Boney Maundu
Jun 16, 20244 min read
1 view
0 comments


SECURING YOUR WI-FI FROM NEIGHBOURS
It can happen gradually, or you may realize all of a sudden that you experience frustratingly constant video buffering or that websites...

boneymaundu
Jun 3, 20245 min read
3 views
0 comments


Bluejacking, Bluesnarfing & Bluebugging Explained
Bluejacking, Bluesnarfing & Bluebugging Explained

boneymaundu
Apr 15, 20243 min read
2 views
0 comments


STARLINK INTERNET
Starlink Internet: The basics

boneymaundu
Mar 22, 20244 min read
6 views
0 comments


POE: Passive vs Active
Basics of Active and Passisve POE

Boney Maundu
Feb 24, 20244 min read
3 views
0 comments


IS YOUR PHONE BEING TRACKED?
Espionage is a fully-fledged information mining industry, and often, people would go to great lengths to acquire information in whatever way

boneymaundu
Feb 17, 20245 min read
2 views
0 comments


MIMO
MIMO is a wireless communication antenna technology that utilizes multiple antennas at both ends of the communication circuit, i.e., at the

Boney Maundu
Feb 6, 20243 min read
1 view
0 comments


DATA COMPRESSION
Data compression is the process of encoding, restructuring, and modifying digital data files in order to reduce their size.

Boney Maundu
Jan 20, 20243 min read
2 views
0 comments


Why some countries use 110v while others use 220v electricity
The two main electricity voltages used worldwide lie in the 110-volt range and the 230-volt range.

Boney Maundu
Jan 17, 20243 min read
1 view
0 comments


BLUETOOTH: Explained
Bluetooth is a fairly secure low-bandwidth Personal Area Network that relies on short-range RF

Boney Maundu
Jan 14, 20244 min read
1 view
0 comments


ELECTRICAL FIRES
Electrical fires can be some of the hardest to predict, prevent, and extinguish, making them among the most devastating.

Boney Maundu
Jan 2, 20245 min read
1 view
0 comments


SOCIAL ENGINEERING
Social engineering refers to a range of malicious acts carried out through human interactions where tricksters use psychological manipulatio

Slim Bz TechSystems
Dec 24, 20234 min read
1 view
0 comments


CCTV REMOTE ACCESS & INTERNET BANDWIDTH
When it comes to remote viewing, internet upload speed is even more important than download speed.

Boney Maundu
Dec 24, 20235 min read
9 views
1 comment


INTERNET vs. WWW
A simple way to conceptualize this would be to think of the internet as a series of roads that connect cities to each other, while the World

Boney Maundu
Nov 7, 20232 min read
5 views
0 comments


HOME STRUCTURED CABLING
A structured cabling system is an organized collection of copper, fiber, video, and low-voltage wiring that connects all the home’s electron

Boney Maundu
Oct 18, 20236 min read
12 views
0 comments


CAR KEY FOB HACKING
key fob hacking is where an individual copies the signal transmitted by the key fob using an RF transmitter and use it to unlock a vehicle

Boney Maundu
Oct 4, 20235 min read
18 views
1 comment


FAIL-SAFE VS. FAIL-SECURE LOCKS
The terms “fail safe” and “fail secure” describe what happens when the access control system stops working or when the device loses power.

Boney Maundu
Sep 28, 20235 min read
32 views
1 comment
bottom of page