Main Menu

Date / Time

 

About Me

post8-1080x715.jpg

Our Motto is "Nothing is Impossible."   Just ask us, we will build you anything.  - Todd W. Byars, Founder

Read more..

Recent Posts

Technology

The Cloud Failed. "I came to bury it, not praise it." The solution to hacking and ransomware is - Virtualization and Hardware Based clustering.

on 03 Jul 2021  Posted by CorpRattX  Category: Technology  Comments: 0
New_T_Shirt_Logo_2017.png

The Cloud FAILED and is now an Obsolete Architecture.    You can quote me on that if you like:  Todd W. Byars,  July 1, 2021

All Clouds should be replaced immediately with a hardware based solutions and FULL Virtualization.   Modern, real time, incremental backups are recommended too.

How to Implement a Switch from Clouds to Hardware Clusters running full Virtualization:

  • Create Transition Plan to move from Clouds to Hardware Clusters.    VMware is our primary recommendation.  VMware in Command Line Interface, CLI, without all the GUI controls, gauges and services.
  • Select Micro-ITX or smaller motherboard computers that run cool or even fanlessly. Select Linux Load (preferred) or Windows Load or Other Load Procedure
  • Build Hardware, Setup and Test with Dummy Loads and Dummy Database.  After burn in and load testing run your pentesting and QA
  • Migrate Data to new Hardware Based Clustering.
  • Test, Run Live, Stress Test, PenTest and verify those backups.
  • Turn Clouds Off.

This problem is LARGE and GLOBAL.  So, The Computer Dudes, Inc and I, once again, GIVE you the procedure to use and share.   

It is for everyone, everywhere, including our competition who we consider as brothers and sisters in IT rather than competition.  So PLEASE SHARE!  

Who's your pal?  ;)  Todd  
www.thecomputerdudesinc.com 

printer friendly

Computer Dudes - Stand Down for 30 Days, Large Contract for Security Products Pending

on 14 Jun 2021  Posted by CorpRattX  Category: Technology  Comments: 0
New_T_Shirt_Logo_2017.png

Computer Dudes - Stand Down for 30 Days, Large Contract for Security Products Pending

Continue All Projects.   Continue all Contracts.  Check on your clients. Verify Backups.  

No new clients for 30 days as Enterprise Level - International Security Group considers security product purchase and production.

We will continue to post on our line of Monolithic Solar Supercomputers, which are Polymorphic.    The Computer Dudes, Inc are still on track to the worlds first outdoor
off grid Data Center made of Granite Monoliths, requiring no wired connections that is sensor platform or public information kiosk friendly.

The primary benefit of our Solar One Monolith system is No Data Center Cost, No Electric Bill, No Air Conditioners, no hurricane proof buildings, no
need for huge backup generators with thousands of gallons of fuel. #solaronemonolith on LinkedIn 

That and it is designed to last 100 year with spare parts which are modular and preprogrammed for each client.  

Todd W. Byars
Field Engineer, Founder, Inventor, Teacher
The Computer Dudes, Inc
a Dunn and Bradstreet listed company

printer friendly

The Computer Dudes offer our solution to the wave of Hacking and Ransomware hitting the United States and World

on 07 Jun 2021  Posted by CorpRattX  Category: Technology  Comments: 0
CDudes_JPG_Logo_for_Art_2020.jpg

Here at Computer Dudes we believe everyone is in this together.    That it is good people and good corporations vs bad people and bad corporations.

We believe all Computer Techs, Architects, Engineers, Server Techs, Security Companies and even other Companies in any of these fields NOT to be our 
competition, but as our Brothers and Sisters. In that spirit, I give to your our current procedures for cleaning a home or office that has been hacked.

Read, Enjoy and PLEASE SHARE.   This is for computer users, phone users, techs and families too.   Print out a copy if you want.

Computer Dudes Standard House/Office Sweep with Data Capture and Reset of All Devices.

Procedure: 

  • Once a site or client has been hacked, enter the location and do a full scan of all Wi-Fi Signals, Sources, IP Numbers, Routers, Network and Devices.   (software Wireshark, Wi-Fi Analyzer App on Phone)
  • After data is recorded and your paperwork/report has been started, turn off all Routers, Devices, Phones, TVs and everything else that uses the network or Wi-Fi or Bluetooth. Repeat Scans. Locate items and turn them OFF.
    Repeat Scans until everything is clear. Make your notes.
  • Setup laptop for Nmap capture. Reactivate client's Main Router. Capture for 30 minutes.
  • Look at your data for abnormalities, strange IPs, scripts, hack attempts and signals from any hacker attempting to reconnect to the hacked devices, their IP, location, time and ISP. Copy all reports and data and submit to law enforcement.
  • Factory reset EVERY device in the house. Then, do Firmware Upgrades and test. Have the client set much longer and stronger passwords and remind them to change those from time to time and NOT to share them.
  • File Report and/or Invoice.   Have your people contact the ISP where the hacker accessed and get them cut off.   Block all IP's from the hackers or even by region.
  • Train Client on Basic Safety.
  • Present Client with Final Reports and/or Invoices.
  • Clean and Reset Laptop You Used to Clean Network and Capture Data so it is ready for the next job. 

This is our Standard Operating Procedure for June 2021.

Todd W. Byars
Computer Dudes
A Dunn and Bradstreet Listed Company
Local, State, Regional, National, International 

printer friendly
Go to page  1 2 3 4 5 6 

Welcome

Username or Email:

Password:



[ ]
[ ]
[ ]

Chatbox

You must be logged in to post comments on this site - please either log in from the Login box or from here.



CorpRattX
1 day ago
Military version of Anti-Drone / Drone Defense Courses

https://lnkd.in/gWMnjUTM

As for Computer Dudes' "Civilian" Drone Defense Course we have techniques weapons not know to the military. As the video in the link shows the military has weapons and methods civilians and companies can not use at this time.

Like the military Computer Dudes' Drone Defense course uses a "layered" defense. :)T

CorpRattX
2 days ago
MyrtlewoodPlantation dot com

In Thomasville, Georgia about 40 minutes drive to the North of Tallahassee, Florida.

Hunting and Fishing! Including Sporting Clays, Quail Hunting, and Shotgun Training.

It is that time of year! :)Todd

CorpRattX
2 days ago
Fascinating.
Some of the small WiFi Bridge equipment, with directional antennas, can be used to "jam" or "block" a WiFi router, transmitter, or small area of WiFi service.
It is not a new concept or function - its just the last time we experimented with WiFi jamming the Yagi antenna, transmission, and monitoring equipment weighed several hundred pounds.
Current to 2024 WiFi "Bridge" equipment works off a phone and the antenna's are the size of a tea cup. Cool Stuff! :)T

CorpRattX
3 days ago
Today we are working on Industrial Robot Control interfaces and methodology with the Meta Quest 3

https://www.youtube.com/watch?v=jWdW-4n7G48

This morning we used the headset to configure workstations and virtual workstations in a 3D digital copy of the International Space Station, the ISS. :)T

CorpRattX
4 days ago
Hello atlagax1 dot starlink dot net - Welcome to the party... :)T

CorpRattX
4 days ago
Only the Computer Dudes dares to bring FPV Simulators and Trainers - to the real world!!

Freestyle - pilot vs pilot and drone vs drone on indoor and outdoor courses.

Our "Dogfight" drone game is the most fun in my experience.

We use the manual controllers but are modding things for VR and Mixed Reality Headset Use.

Dont have a drone yet? Use some of the FPV or other training simulations and instructions on youtube. Have fun! :)T

https://www.youtube.com/watch?v=fRYfTYOuHlg

CorpRattX
5 days ago
Why Muon Beams are important - from Fermilab discussion:

Radio Waves and Light(laser) have been mastered as "carrier waves" for audio, video, and data.

What might be the "next" carrier wave? One not blocked by Matter or Time?? ;)T

https://www.npl.washington.edu/av/altvw161.html

CorpRattX
1 week ago
Why is Computer Dudes "Global Operations and Space"?

Ask these visitors to our website last week:
Sanford dot Edu
Spectrum dot Com
mit dot edu
Applebot dot Com
Bing dot Com
Googlebot dot Com
Googlecontentuser dot Com
Worldcall dot Net dot PK
Telepak dot PT
ahrefs dot com
FSU dot Edu
NASA dot gov
sperious dot com
Metronetinc dot net
Myvzw dot com

and a few dozen more.

Global Research and Design are now the current trend. Researchers working on Computer Projects, Security, CubeSats, Radio, Antennas, Physics, Sensors, Drones, Automation, AI and more find our website during their research.

Sometimes they consult with us, other times they hire us to do their research or project.

Regards
Todd W. Byars
Computer Dudes
Global Operations and Space
Research and Development 2024

CorpRattX
1 week ago
Our Generative AI research and development has found the "Soylent Green" which proves Generative AI is not an AI but of Human Origin.
We found the "humans" doing the work on the "back end" as well as how to crash their fake AI's and their Databases.
Sadly less than 1 person in 1000 who reads this post will understand what was said or why it is significant. ;)T

CorpRattX
1 week ago
We just added a whole Layer to Drone Defense now including special rounds and techniques for fighting Droneships and Dronesubs on the surface or in shallow water.
We have no secure way to share it with Law Enforcement or the Military so we will include it as an EXTRA in our upcoming Anti-Drone Training.
Our Drone Training is on HOLD until FDLE, the Florida Department of Law Enforcement, clears the backlog of requests for simple gun and ammo purchases so we can get our training materials.
More Soon... :)T

© 2007 - 2024 The Computer Dudes Inc    Proudly powered by e107 which is released under the terms of the GNU GPL License.    Back to top ↑
e107 Theme by veskoto