Blog Archives

Tox, Create Your Own Ransomware

A new ransomware framework named Tox allows you to create your own malware for free.  They take 20% of your haul.


IT SCHEDULED MAINTENANCE For Friday, May 22, 2015 SERVICES SUBJECT TO BEING PREEMPTED BY MAINTENANCE.  The maintenance tasks listed below, to ensure that all UTC information Technology services  provided to support the academic mission of the University will operate at optimal levels,  will be performed during the regularly monthly scheduled Friday maintenance time beginning at 5:30pm.  During this maintenance period you are welcome to use all available services,  subject

Tagged with:

How could we use technology to better our campus space?

NPR has an interesting article on productivity and work space. How do you think we could apply this technology to better our work and student campus spaces? Email your ideas to  

Tagged with:

New SSL downgrade attack named LogJam, Freak’s cousin

A requirement from the US Govt, issued in the 90s, can downgrade the strength of the encryption used during SSL communication.

Ask the CIO

Save the Date! Next week IT will host our monthly Ask the CIO  lunch and learn format.  Dan Chase will provide training on “Peering into the Black box that is UTC’s Website.” Have you ever wondered what was behind a website you are visiting? What does it take to make it ‘tick’? Come see an overview of the UTC website architecture, the hardware, software and organization it takes to

Tagged with:

RSA Conference – Six New Attack Techniques

If you’re interested in IT Security, you should watch this RSA Security Conference .

Apple Certified Associate: Mac Management 10.10

Information Technology is proud to announce that Marcus Myers, Ben Hoge, Stuart French, and Josh Smith have all received their Apple Certified Associate: Mac Management 10.10 certifications.   Marcus Myers states, “This certification deepened our understanding of Mac management in the enterprise.  Since Macs are not designed for the enterprise, it is very important for the support consultants to have and maintain efficient management strategies for our Mac customers at

Tagged with:

Flaw found in virtual floppy code used by Virtualbox, Xen, KVM

A new flaw could allow the bad guys to exploit some modern virtualization environments based on QEMU.

Intel Study, Only 8% can correctly id 10 out of 10 phishing emails.

A study from Intel paints a rough picture of the state of email security awareness.

Firefox 38 supports DRM tech

So now  you can watch Netflix with Firefox.