Home > Blogs > John Traenkenschuh

RSS Feed Subscribe  RSS details

1830 wasn't so long ago

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

Continue reading...

I’m ready, but the United State’s infrastructure is not.

I’m outside the Cades Cove visitor’s center, hearing acoustical instruments like bangos and hammered dulcimers play.  I have my MacBook Pro, alive—charged and ready.  My phone is charged and ready and has a tethering plan, just begging to be used.

I am signal-less.

Continue reading...

By John TraenkenschuhCommentsSeptember 17, 2014
Topics: Access, Data

Windows 9 When?

Traenk is looking forward to Windows 9:  Here's Why.

Continue reading...

How Long?

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

Continue reading...

Ethical Hacker

It's time to take back the term hacker from the wanna-be's...

Continue reading...

What would it take to sell you this Surface Pro 3 today?

Traenk wonders, what would it take to get someone to buy a Surface Pro 3?

Continue reading...

Gone with the passwords

How much can Digital Cryptography do?

Continue reading...

OpenSSL: More Problems. Again.

Traenk wonders what's missing in the OpenSSL message.

Continue reading...

Everything You've Heard is True

With TrueCrypt in the Crypt of its own making, what is the True story?

Continue reading...

Human Telematics II

Are you using a Jawbone UP or the Fitbit?  Useful?  Traenk weighs in on his experiences.

Continue reading...

Heartbleed? You're too late.

Traenk offers a friendly reminder that this is shape of things to come...

Continue reading...

Spot the Hacker (Part I)

Traenk wonders aloud at the changing face of Security--and Hacking.

Continue reading...

1 2 3 4 5 Next >