LAD: LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources

Resources

The Gloves Fit, But Aren’t Yours: When Someone Else Uses Your IP Address

Whether they have hacked your Wifi or are spoofing your IP address, someone else using your IP address to download or distribute images of exploited children and other illicit or illegal content is a serious situation that can lead to criminal and legal entanglements… [read more]

Trust in the Digital Age: Working from Home on a Company Laptop

You have been provided a computer by your company. They trust you enough to work from home without direct supervision. You dot all your i’s and cross all your t’s, making sure to keep the company computer just for work, taking care… [read more]

And You Thought Online Ads Were Just About Marketing...

You were right when you thought online ads were about selling something, you just didn't know that they were about selling you. We first touched on this phenomena back in 2013, when we pioneered research into the use of online as by cybercriminals… [read more]

Why Should I Care About Keeping Apples Away From Oranges?

An odd question to ask in the context of networks? Perhaps. Yet, the same logic applies. You may have noticed how we frequently bring up the concept of segrating the computers and other devices on your network from each other… [read more]

How Intel’s J-1900 Can Help You With Network Management and Security

Intel released its 4-core J-1900 processor in 2013. The most remarkable thing about it was its low price. It also has very low power consumption – so low that a whole chassis with the J-1900 processor typically consumes only seven to nine watts, not including power draw… [read more]

Hunting for the Needle in the Network

While many network problems usually manifest themselves only intermittently, their effects can cascade far beyond their initial cause, making it difficult to separate the cause from the effects. Narrowing down the problem to the specific piece of failing equipment, misconfigured… [read more]

Why Close the Curtains? Your TV Is Showing Your Dirty Underwear to the World

It’s not just celebrities who get their private pictures stolen and published for all to see. It’s an equal opportunity hack and could happen to anyone with a computer, tablet or smart TV connected to the Internet. It’s a very simple scenario: someone hacks into your… [read more]

When Your Computer Becomes the Scammer's Accomplice

Computers are useful tools, but they are dumb. Somehow computer technology has not yet evolved enough for computers to make judgement calls (of any sort). Whether a dinky low-powered laptop or a speedy, overclocked desktop, computers can only do what they are… [read more]

Don’t Mix Business and Pleasure: Top Tips for Securely Working from Home

With telecommuting and freelance work from home on the rise, data security is a top priority. No working relationship could be improved by spreading malware and computer viruses from your home network to the corporate network of your employer or client… [read more]

Worse than the Flu: How Not to Infect Your Workplace Because Your Kids Were Careless on the Internet

You thought you did everything right: you were processing payroll or working with corporate secrets from home on a dedicated, password-protected computer that no one else was allowed to touch, and you didn’t use it for anything but work… [read more]

What Your VPN Doesn’t Know (Can Hurt You)

For a quick dash of security, companies set up many telecommuters with VPN clients to connect to the corporate server and other assets on the company’s computer network. Leaving aside the issues of expense, inconvenience and how good the VPN’s encryption actually is… [read more]

Securely Working From Home: Practical Concerns

Aside from managing the interruptions and distractions that will occur when you work from home (especially if you have kids), the biggest practical concern is how to do it securely. A home computing environment is very far removed from a corporate network… [read more]

No “Expert” Needed: Computer Network Management at Your Fingertips

Large technology corporations catering their expensive (“elite”) wares to the select few have forgotten that it is the small businesses and the scrappy bootstrappers that are the backbone of the US economy. We remember, and we know that with the right tools… [read more]

Why Your Computer Is Valuable to Hackers

A hacker’s desire for your computer likely has nothing to do with you specifically (nice as you are). It’s not just potential access to your financial accounts or the ability to unleash ransomware that makes hackers want to get into your computer. Your computer is valuable… [read more]

The Secret Life of Computer Networks

The average traffic on a home computer network today tops what was typical for a small office ten years ago. Back then home users did not generate much network traffic, but today with Internet-connected “smart” TVs, entertainment systems and gaming consoles… [read more]

When Your Irreplaceable Software Reaches End-of-Life

While many legacy apps continue to provide value, maintaining and securing them presents a challenge to IT security teams, since patches and upgrades are no longer available after they reach end-of-life status. Add in the many attacks targeted toward end-of-life platforms… [read more]

When Too Many Bytes Leave You with Fragments

The standard Ethernet payload/MTU size? 1500 bytes. The packet payload size used on many networks? Also 1500 bytes. Easy, peasy, right? Not so fast. When sent out to the Internet, those packets with 1500-byte payloads that seamlessly sped around within … [read more]

Is Your “Smart” TV Watching You? FBI Warning

As the holidays near and deals tempt, shoppers are carting home all manner of tech gifts, including “smart” TVs. Whether the TVs are smart or not, the manufacturers certainly have additional ideas on how to get value out of making them, beyond the one-time sale to the… [read more]