Skip to main content

About Me


    Hello, my name is Rob and I am excited to start my academic and professional journey in the information technology world. My current background in this area is very slim and limited to just the basics as of right now. It wasn’t until recently that I decided to dive head first into this field of study. Even though I am just starting out, I am excited to learn and build a solid foundation in the field of information technology. Currently, I am taking online courses towards a degree in Cyber and Data Security as this is the particular area of information technology that I ultimately want to pursue as a career as it is a big part of today’s world. I am eager to understand the intricacies of data protection, network security, and threat mitigation from potential threats. I am aware this is a constant changing career field as cybersecurity faces new challenges often and the need to find new innovative solutions to solve problems is another concept that appeals to me as I like to try and solve problems and be a part of that solution. As I progress on this journey, I am confident that my dedication and passion for cybersecurity will enable me to contribute to the career field and make a positive impact.

Popular posts from this blog

Ping Commands, Viruses, and Phishing

       Ping commands are useful when it comes to troubleshooting and checking to see if a website is available and how fast you would be able to access it. However, ping can also be used for malicious intent. Today I will discuss an attack possible by means of ping commands. I will also get into computer security incidents like computer viruses and phishing and discuss what makes computers vulnerable to them, the damage they can inflict and protection methods for each. Ping Commands for Malicious Intent One major attack that can be accomplished by using ping commands is a denial of service attack. A denial of service attack is when a target website is basically overloaded to the point that it is rendered useless. By using the ping command, an attacker will send oversized data packets to a target website that will be too much for it to handle and causing the site to crash, not allowing legit users to use that site for a certain amount of time. An example of this ...

The Pros and Cons of Microsoft Word, Excel, and PowerPoint

    All throughout the information technology world you will at some point have to utilize applications such as Microsoft Word, Excel and PowerPoint. These are some of the most common and basic applications that are out there today. Today I will be discussing the advantages and disadvantages of each, and how they compare to one another. Microsoft Word Advantages: Versatility in Writing: Word is perfect for all writing purposes, whether you're drafting a book, essay, poetry, contract or work memorandum. Formatting: It offers a lot of formatting tools, including various font styles, sizes, alignments, customizable margins, and borders for a more appealing document. User Friendly: This application is really easy for the user to utilize, navigate and learn quickly. Disadvantages: Limited Data Formatting: Word excels in writing and formatting that text, however, it lacks the data formatting capabilities found in other applic...

Intro to Programming Languages

  Having very little IT experience, this project is my first steps towards a better background in that department. It is exciting and makes me nervous at the same time as I have never used nor even read about programming languages before. This was the same for the program Scratch, but the outcome was positive and gave me a better understanding of what program coding consists of. The following is the link to my Scratch program :  https://scratch.mit.edu/projects/1116622511 This was quite interesting, having never used the program Scratch, I found myself struggling a bit at first trying to figure out how all the different codes would affect the outcome. Once I had a decent grasp of that, I knew what I wanted to do but getting the figures to do it how I wanted was the challenge. The biggest challenge was getting the timing right for everything. I overcame this by simple trial and error. I would set a time for something, run the program and see if it needed to be slowed or sped up...