Open Source Graphic Design
open source graphic design

How Open Source Graphics can be used to edit InDesign documents. Opening an InDesign document in Scribus Graphic design often requires an understanding of computer forensics to get the job done. I read a few blogs on how to edit InDesign files: Create an .EPS from InDesign and open it as an editable file in Scribus. That did not […]

Read more
Accolades on My Master’s Program
utica college

Utica College: Master’s Degree in Computer Forensics and CyberSecurity From my professors: Outstanding paper on cyber bullying. This is not only one of the best in the class, but one of the most thorough and historical accounts on the subject that I have read. Jeff, You absolutely nailed this discussion forum. Your response to the […]

Read more
Meta Descriptions of Colleges
University of Michigan

When revving up the Googler and searching for colleges, the browser shows a snippet of information it gleans from the site’s source code. This is the meta description that is embedded in the website’s HTML code. Ideally, that information should be no more than 160 characters. It can be longer, but it will be truncated […]

Read more
Cyberbullying: Crime or Hysteria?
Emily Osment in Cyberbully

Cyberbullying is a new twist on an old problem. There have always been bullies—people who were stronger—or thought they were—would harass the weaker ones. Sometimes it was for retribution or just to humiliate their victim. (I wrote this as a research project for my Master’s in Cybersecurity and Computer Forensics at Utica College in 2014). […]

Read more
Email Spam: Since 1844
Samuel F.B. Morse sends the first email spam in 1844

“I don’t believe in email. I’m an old-fashioned girl. I prefer calling and hanging up.” —Sarah Jessica Parker It is staggering to think just pervasive email is in our lives. In 2012, there were 2.2 billion email users worldwide, 144 billion email traffic worldwide per day, 68.8% of it spam, and of that, 51% was […]

Read more
Cybersecurity Complacency

It is human nature that we do ourselves harm or neglect ways to keep ourselves healthy even when we know it is against our best interest. We fool ourselves by thinking “it won’t happen to me,” or “why bother.” We smoke, we text and drive, we consume mass quantities of alcohol—and we neglect our own […]

Read more
The Dark Side of Online Games

I am addicted to playing “Scrabble” online. I get up early and usually devote an hour to it instead of doing something constructive like watching “Kimmie Schmidt” on Netflix. I grew up playing board games with friends and family. Monopoly, 21, Checkers, and Chess (sounds like an REM song) and, of course, Scrabble. I’m good […]

Read more
James Madison: Cyber Warrior
James Madison

It’s great when you find your special interests converge. I have always had an interest in American history and especially American Presidents. And now, my new interest is cybersecurity and computer forensics after completing my Master of Science in Cybersecurity and Computer Forensics at Utica College. I had not realized this, but our Founding Fathers were […]

Read more