top of page
Search
Boney Maundu
Jun 16, 20244 min read
LOGIC BOMBS: Explained
Logic bombs - cyber security
1 view0 comments
boneymaundu
Jun 3, 20245 min read
SECURING YOUR WI-FI FROM NEIGHBOURS
It can happen gradually, or you may realize all of a sudden that you experience frustratingly constant video buffering or that websites...
3 views0 comments
boneymaundu
Apr 15, 20243 min read
Bluejacking, Bluesnarfing & Bluebugging Explained
Bluejacking, Bluesnarfing & Bluebugging Explained
2 views0 comments
boneymaundu
Feb 17, 20245 min read
IS YOUR PHONE BEING TRACKED?
Espionage is a fully-fledged information mining industry, and often, people would go to great lengths to acquire information in whatever way
2 views0 comments
Boney Maundu
Jan 20, 20243 min read
DATA COMPRESSION
Data compression is the process of encoding, restructuring, and modifying digital data files in order to reduce their size.
2 views0 comments
Slim Bz TechSystems
Dec 24, 20234 min read
SOCIAL ENGINEERING
Social engineering refers to a range of malicious acts carried out through human interactions where tricksters use psychological manipulatio
1 view0 comments
Boney Maundu
Dec 24, 20235 min read
CCTV REMOTE ACCESS & INTERNET BANDWIDTH
When it comes to remote viewing, internet upload speed is even more important than download speed.
7 views1 comment
Boney Maundu
Oct 16, 20235 min read
TYPES OF CCTV SECURITY CAMERAS
Home and business owners are wrong to assume that any CCTV camera would work in any application, and a guide to the types of CCTV cameras
15 views1 comment
Boney Maundu
Oct 4, 20235 min read
CAR KEY FOB HACKING
key fob hacking is where an individual copies the signal transmitted by the key fob using an RF transmitter and use it to unlock a vehicle
18 views1 comment
Boney Maundu
Sep 28, 20235 min read
FAIL-SAFE VS. FAIL-SECURE LOCKS
The terms “fail safe” and “fail secure” describe what happens when the access control system stops working or when the device loses power.
32 views1 comment
Boney Maundu
Sep 21, 20234 min read
CREDIT CARD CLONING
Card cloning is the duplication of a card through the physical or digital copying of the information from the original card onto a new one
12 views0 comments
Boney Maundu
Sep 6, 20235 min read
DO SECURITY WARNING SIGNS REALLY DETER CRIMINALS?
While a plethora of security systems and devices, like security cameras, alarm systems, and video doorbells, exist that act as deterrents...
4 views1 comment
Slim Bz TechSystems
Aug 31, 20233 min read
WIRELESS CAMERA JAMMERS
Wireless Camera Jammers
2 views0 comments
Boney Maundu
Aug 30, 20234 min read
PHYSICAL ACCESS CONTROL SYSTEMS
Physical Access Control Systems Physical Access Control Systems (PACS) are electronic systems that control entry and exit into physical...
6 views0 comments
Boney Maundu
Aug 24, 20233 min read
SURVEILLANCE HARD DRIVE vs COMPUTER HARD DRIVE
Surveillance Hard Drives vs. Desktop Hard Drives: What’s the Difference? Can one work in place of the other? How can I tell one from the...
1 view0 comments
Boney Maundu
Aug 10, 20232 min read
EZVIZ SMART WIFI CAMERA
USER GUIDE HOW TO INSTALL AND CONFIGURE THE EZVIZ WI-FI CAMERA TO YOUR SMART PHONE POWER Connect the USB power cord that came with the...
7 views1 comment
Boney Maundu
Aug 9, 202313 min read
ANALOG vs. IP CCTV SYSTEMS
Understanding the differences between Analog and IP CCTV Systems With the proliferation of CCTV security systems and devices on the...
16 views0 comments
Slim Bz TechSystems
Apr 25, 20219 min read
Home CCTV Systems: Buyer's guide & Best practices
Buyer's Guide: Home CCTV Security System
18 views0 comments
bottom of page