LAD: LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources

Resources

The Gloves Fit, But Aren’t Yours: When Someone Else Uses Your IP Address

Whether they have hacked your Wifi or are spoofing your IP address, someone else using your IP address to download or distribute images of exploited children and other illicit or illegal content is a serious situation that can lead to criminal and legal entanglements… [read more]

Hunting for the Needle in the Network

While many network problems usually manifest themselves only intermittently, their effects can cascade far beyond their initial cause, making it difficult to separate the cause from the effects. Narrowing down the problem to the specific piece of failing equipment, misconfigured… [read more]

Why Close the Curtains? Your TV Is Showing Your Dirty Underwear to the World

It’s not just celebrities who get their private pictures stolen and published for all to see. It’s an equal opportunity hack and could happen to anyone with a computer, tablet or smart TV connected to the Internet. It’s a very simple scenario: someone hacks into your… [read more]

When Your Computer Becomes the Scammer's Accomplice

Computers are useful tools, but they are dumb. Somehow computer technology has not yet evolved enough for computers to make judgement calls (of any sort). Whether a dinky low-powered laptop or a speedy, overclocked desktop, computers can only do what they are… [read more]

Don’t Mix Business and Pleasure: Top Tips for Securely Working from Home

With telecommuting and freelance work from home on the rise, data security is a top priority. No working relationship could be improved by spreading malware and computer viruses from your home network to the corporate network of your employer or client… [read more]

Worse than the Flu: How Not to Infect Your Workplace Because Your Kids Were Careless on the Internet

You thought you did everything right: you were processing payroll or working with corporate secrets from home on a dedicated, password-protected computer that no one else was allowed to touch, and you didn’t use it for anything but work… [read more]

Securely Working From Home: Practical Concerns

Aside from managing the interruptions and distractions that will occur when you work from home (especially if you have kids), the biggest practical concern is how to do it securely. A home computing environment is very far removed from a corporate network… [read more]

No “Expert” Needed: Computer Network Management at Your Fingertips

Large technology corporations catering their expensive (“elite”) wares to the select few have forgotten that it is the small businesses and the scrappy bootstrappers that are the backbone of the US economy. We remember, and we know that with the right tools… [read more]

The Secret Life of Computer Networks

The average traffic on a home computer network today tops what was typical for a small office ten years ago. Back then home users did not generate much network traffic, but today with Internet-connected “smart” TVs, entertainment systems and gaming consoles… [read more]

When Your Irreplaceable Software Reaches End-of-Life

While many legacy apps continue to provide value, maintaining and securing them presents a challenge to IT security teams, since patches and upgrades are no longer available after they reach end-of-life status. Add in the many attacks targeted toward end-of-life platforms… [read more]

When Too Many Bytes Leave You with Fragments

The standard Ethernet payload/MTU size? 1500 bytes. The packet payload size used on many networks? Also 1500 bytes. Easy, peasy, right? Not so fast. When sent out to the Internet, those packets with 1500-byte payloads that seamlessly sped around within … [read more]

Is Your “Smart” TV Watching You? FBI Warning

As the holidays near and deals tempt, shoppers are carting home all manner of tech gifts, including “smart” TVs. Whether the TVs are smart or not, the manufacturers certainly have additional ideas on how to get value out of making them, beyond the one-time sale to the… [read more]

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. You can get it already preinstalled on a computer from your own vendor or you can download it directly from this website. The software is the same either way, though the version might be different.