top of page
Search

SIM SWAPPING: Explained
SIM Swapping Explained
boneymaundu
Jul 26, 20244 min read
2 views
0 comments

LOGIC BOMBS: Explained
Logic bombs - cyber security
Boney Maundu
Jun 16, 20244 min read
1 view
0 comments

SECURING YOUR WI-FI FROM NEIGHBOURS
It can happen gradually, or you may realize all of a sudden that you experience frustratingly constant video buffering or that websites...
boneymaundu
Jun 3, 20245 min read
3 views
0 comments

Bluejacking, Bluesnarfing & Bluebugging Explained
Bluejacking, Bluesnarfing & Bluebugging Explained
boneymaundu
Apr 15, 20243 min read
2 views
0 comments

IS YOUR PHONE BEING TRACKED?
Espionage is a fully-fledged information mining industry, and often, people would go to great lengths to acquire information in whatever way
boneymaundu
Feb 17, 20245 min read
2 views
0 comments

DATA COMPRESSION
Data compression is the process of encoding, restructuring, and modifying digital data files in order to reduce their size.
Boney Maundu
Jan 20, 20243 min read
2 views
0 comments


SOCIAL ENGINEERING
Social engineering refers to a range of malicious acts carried out through human interactions where tricksters use psychological manipulatio
Slim Bz TechSystems
Dec 24, 20234 min read
1 view
0 comments

CCTV REMOTE ACCESS & INTERNET BANDWIDTH
When it comes to remote viewing, internet upload speed is even more important than download speed.
Boney Maundu
Dec 24, 20235 min read
9 views
1 comment

TYPES OF CCTV SECURITY CAMERAS
Home and business owners are wrong to assume that any CCTV camera would work in any application, and a guide to the types of CCTV cameras
Boney Maundu
Oct 16, 20235 min read
15 views
1 comment


CAR KEY FOB HACKING
key fob hacking is where an individual copies the signal transmitted by the key fob using an RF transmitter and use it to unlock a vehicle
Boney Maundu
Oct 4, 20235 min read
18 views
1 comment

FAIL-SAFE VS. FAIL-SECURE LOCKS
The terms “fail safe” and “fail secure” describe what happens when the access control system stops working or when the device loses power.
Boney Maundu
Sep 28, 20235 min read
32 views
1 comment

CREDIT CARD CLONING
Card cloning is the duplication of a card through the physical or digital copying of the information from the original card onto a new one
Boney Maundu
Sep 21, 20234 min read
12 views
0 comments

DO SECURITY WARNING SIGNS REALLY DETER CRIMINALS?
While a plethora of security systems and devices, like security cameras, alarm systems, and video doorbells, exist that act as deterrents...
Boney Maundu
Sep 6, 20235 min read
4 views
1 comment


WIRELESS CAMERA JAMMERS
Wireless Camera Jammers
Slim Bz TechSystems
Aug 31, 20233 min read
2 views
0 comments

PHYSICAL ACCESS CONTROL SYSTEMS
Physical Access Control Systems Physical Access Control Systems (PACS) are electronic systems that control entry and exit into physical...
Boney Maundu
Aug 30, 20234 min read
6 views
0 comments


SURVEILLANCE HARD DRIVE vs COMPUTER HARD DRIVE
Surveillance Hard Drives vs. Desktop Hard Drives: What’s the Difference? Can one work in place of the other? How can I tell one from the...
Boney Maundu
Aug 24, 20233 min read
1 view
0 comments


EZVIZ SMART WIFI CAMERA
USER GUIDE HOW TO INSTALL AND CONFIGURE THE EZVIZ WI-FI CAMERA TO YOUR SMART PHONE POWER Connect the USB power cord that came with the...
Boney Maundu
Aug 10, 20232 min read
7 views
1 comment


ANALOG vs. IP CCTV SYSTEMS
Understanding the differences between Analog and IP CCTV Systems With the proliferation of CCTV security systems and devices on the...
Boney Maundu
Aug 9, 202313 min read
16 views
0 comments

Home CCTV Systems: Buyer's guide & Best practices
Buyer's Guide: Home CCTV Security System
Slim Bz TechSystems
Apr 25, 20219 min read
18 views
0 comments
bottom of page