SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page

What Is ‘Email Spoofing’? How Does Spoofing Work?

by Joseph Forbes | Feb 1, 2019 | Blog, Blog Entry, HACKING, INTERNET

Question: What Is an ‘Email Spoof’? Is It a Type of Phishing Attack? Answer: Email spoofing, like phone spoofing, is fraud and deception.  Spoofing is the most common form of the modern con game called ‘phishing’. The word “spoof” means...

School Projects for IT and Computer Networking Students

by Joseph Forbes | Oct 9, 2018 | Blog Entry, INTERNET, REVIEWS, Technicals

High school and university students studying computer networking and Information Technology are sometimes asked to complete class projects as part of their course work. These projects may be designed by the instructor or ones that the students choose for themselves....

What Is the Internet of Things? (IoT)

by Joseph Forbes | Oct 4, 2018 | Blog Entry, Cloud Apps, HARDWARE, INTERNET, SECURITY, SOFTWARE, Technicals

The term Internet of Things (often abbreviated IoT) was coined by industry researchers but has emerged into mainstream public view only more recently. Some claim the Internet of Things will completely transform how computer networks are used for the next 10 or 100...

4 Tips for Recognizing a Social Engineering Attack

by Joseph Forbes | Sep 21, 2018 | Blog Entry, EDUCATION, INTERNET, Internet Scam Notices, SECURITY

Generally speaking, we as humans want to help our fellow humans out. Unfortunately, this fact is abused by what are known as social engineers. Think of social engineering as people hacking. Social engineers attempt to manipulate people to get things they want, whether...
Popular Phishing Scams and What To Do About Them

Popular Phishing Scams and What To Do About Them

by Joseph Forbes | Sep 15, 2018 | Blog Entry, Emailed, INTERNET, Internet Scam Notices, SECURITY

1 What is phishing? Magictorch/Getty Images Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or eCommerce provider. The email often uses fear tactics in an effort to entice the intended victim into visiting a fraudulent...
Gallery of Home Network Diagrams

Gallery of Home Network Diagrams

by Joseph Forbes | Sep 10, 2018 | Blog Entry, HARDWARE, INTERNET, SECURITY, Technical Support, Technicals

1 Wireless Router Network Diagram Common layout for WiFi-based home networks Wireless Home Network Diagram Featuring Wi-Fi Router. Common layouts for home computer networks Thousands of different home network layouts exist. Fortunately, most are small variations on a...
« Older Entries

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy