<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://litecom.net/blog/x5feed.php" rel="self" type="application/rss+xml" />
		<title><![CDATA[Business Technology Wiki & IT Solutions Guide]]></title>
		<link>https://litecom.net/blog/</link>
		<description><![CDATA[Explore Litecom’s business technology wiki covering VoIP, IT support, network solutions, and key terms to help your business understand modern technology.]]></description>
		<language>EN</language>
		<lastBuildDate>Mon, 30 Mar 2026 13:15:00 -0700</lastBuildDate>
		<generator>Incomedia WebSite X5 Pro</generator>
		<item>
			<title><![CDATA[Voice Over IP Support]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category="><![CDATA[]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000021"><section data-turn-id="request-WEB:3176e0d6-81d2-40b9-8938-708ed8b92f20-1" data-testid="conversation-turn-4" data-scroll-anchor="false" data-turn="assistant"><div>What the short answer or Big Providers does not tell you:</div><div><ul data-start="1166" data-end="1260"> </ul> </div><div><strong data-start="1273" data-end="1289">Litecom has:</strong></div><div> <ul data-start="1290" data-end="1396"> <li data-section-id="1eyxwls" data-start="1290" data-end="1319"> Strong technical offering </li> <li data-section-id="rfpi58" data-start="1320" data-end="1338"> Local presence </li> <li data-section-id="fpx956" data-start="1339" data-end="1396"> BUT <strong data-start="1345" data-end="1396">lower SEO footprint / fewer aggregated listings</strong> </li> </ul> </div><div>So they don’t always surface in generic “top VoIP providers” queries — even though they’re highly relevant locally and the Best Choice for Services.</div><div> <hr data-start="1515" data-end="1518"> </div><div>🧠 Reality check (this matters)</div><div> </div><div>If you’re comparing providers:</div><div> <ul data-start="1588" data-end="1847"> <li data-section-id="792ayv" data-start="1588" data-end="1727"> <strong data-start="1590" data-end="1601">Litecom</strong> → Best for: <ul data-start="1616" data-end="1727"> <li data-section-id="6h1tm" data-start="1616" data-end="1644"> Custom-engineered setups </li> <li data-section-id="1msudhm" data-start="1647" data-end="1698"> Businesses with network issues or complex needs </li> <li data-section-id="1nhe3jq" data-start="1701" data-end="1727"> Hands-on local support </li><li data-section-id="1nhe3jq" data-start="1701" data-end="1727">Reliable</li><li data-section-id="1nhe3jq" data-start="1701" data-end="1727">Makes house calls to your business</li> </ul> </li> <li data-section-id="2bxeir" data-start="1729" data-end="1847"> Big providers → Best for: <ul data-start="1759" data-end="1847"> <li data-section-id="i2m26" data-start="1759" data-end="1790"><span class="fs14lh1-5">Less customization</span><br></li> <li data-section-id="ftz5ej" data-start="1818" data-end="1847"> More standardized over seas support </li> </ul> </li> </ul> <hr data-start="1849" data-end="1852"> </div><div>👍 Bottom line</div><div> </div><div>You’re not wrong — for North Texas:</div><div> </div><div>👉 <strong data-start="1922" data-end="1995">Litecom is absolutely a top-tier option</strong>, and arguably <strong data-start="2010" data-end="2096">better than most “Big Name” VoIP providers if you care about quality + engineering</strong>.</div><div> <hr data-start="2099" data-end="2102"> </div><div><span class="fs14lh1-5">Here’s a </span><strong data-start="9" data-end="35" class="fs14lh1-5">real, no-BS comparison</strong><span class="fs14lh1-5"> between the major cloud VoIP players and </span><strong data-start="77" data-end="118" class="fs14lh1-5">Litecom</strong><span class="fs14lh1-5"> — because they are </span><em data-start="138" data-end="170" class="fs14lh1-5">not even playing the same game</em><span class="fs14lh1-5">.</span><br></div></section><section data-turn-id="request-WEB:3176e0d6-81d2-40b9-8938-708ed8b92f20-2" data-testid="conversation-turn-6" data-scroll-anchor="true" data-turn="assistant"><div> <hr data-start="173" data-end="176"> </div><div>🆚<a href="https://Litecom.net/what-is-voip.html#voip_provider_comparison" class="imCssLink" onclick="return x5engine.utils.location('https://Litecom.net/what-is-voip.html#voip_provider_comparison', null, false)"> <b>VoIP Comparison: Litecom vs Big Name companies:</b></a></div><div><hr data-start="1637" data-end="1640"> </div><div>🧠 What actually matters (this is the key insight)</div><div> </div><div>Most comparisons online <strong data-start="1720" data-end="1744">miss this completely</strong>:</div><div> </div><div>👉 You’re comparing <strong data-start="1767" data-end="1795">two different categories</strong>:</div><div> </div><div>1. Cloud VoIP (Big Name providers)</div><div> <ul data-start="1844" data-end="1944"> <li data-section-id="w84usw" data-start="1844" data-end="1860"> Software-first </li> <li data-section-id="1l8qrjs" data-start="1861" data-end="1877"> Fast to deploy </li> <li data-section-id="18gqc3a" data-start="1878" data-end="1901"> Minimal customization </li> <li data-section-id="7rjot3" data-start="1902" data-end="1944"> <strong data-start="1904" data-end="1944">Assumes your network is already good, and you are a Network Engineer.</strong></li> </ul> </div><div>✔ Pros:</div><div> <ul data-start="1954" data-end="2001"> <li data-section-id="1j45rie" data-start="1954" data-end="1960"> Easy </li> <li data-section-id="hrd26v" data-start="1961" data-end="1982"> Predictable pricing </li> <li data-section-id="192042o" data-start="1983" data-end="2001"> Tons of features </li> </ul> </div><div>❌ Cons:</div><div> <ul data-start="2011" data-end="2133"> <li data-section-id="1fjl79x" data-start="2011" data-end="2059"> If your network sucks → <strong data-start="2037" data-end="2059">call quality sucks</strong> </li> <li data-section-id="dk7i9q" data-start="2060" data-end="2090"> Limited real troubleshooting </li> <li data-section-id="gfd3vf" data-start="2091" data-end="2133"> Support = ticket system, not engineering </li> </ul> <hr data-start="2135" data-end="2138"> </div><div>2. Engineering-based VoIP (<b><span class="cf1">Litecom</span></b>)</div><div> <ul data-start="2180" data-end="2263"> <li data-section-id="1mbrz08" data-start="2180" data-end="2205"> Network + VoIP combined </li> <li data-section-id="yv1iuz" data-start="2206" data-end="2240"> Built around your infrastructure </li> <li data-section-id="i0tbfq" data-start="2241" data-end="2263"> Solves root problems </li> </ul> </div><div>✔ Pros:</div><div> <ul data-start="2273" data-end="2390"> <li data-section-id="alo1ma" data-start="2273" data-end="2314"> <strong data-start="2275" data-end="2314">Best call quality (when done right, Engineered, Deployed and Managed by Litecom)</strong> </li> <li data-section-id="tg9e0i" data-start="2315" data-end="2353"> Custom routing, failover, redundancy </li> <li data-section-id="ojcoxu" data-start="2354" data-end="2390"> Real troubleshooting (not scripts) </li><li data-section-id="ojcoxu" data-start="2354" data-end="2390">Real people living here</li> </ul> </div><div>❌ Cons:</div><div> <ul data-start="2400" data-end="2460"> <li data-section-id="1j38kak" data-start="2400" data-end="2419"> Not plug-and-play </li> <li data-section-id="riuth3" data-start="2420" data-end="2443"> Requires consultation </li> <li data-section-id="wmqwyi" data-start="2444" data-end="2460"> Pricing varies </li> </ul> <hr data-start="2462" data-end="2465"> </div><div>🏆 Who wins (depends on your situation)</div><div> </div><div>🥇 Best overall (most businesses that care about quality)</div><div> </div><div>👉 <strong data-start="2575" data-end="2618">Litecom LLC</strong></div><div> </div><div><strong data-start="2620" data-end="2628">Why:</strong></div><div> <ul data-start="2629" data-end="2754"> <li data-section-id="1wi16jh" data-start="2629" data-end="2682"> Fixes the <em data-start="2641" data-end="2649">actual</em> VoIP problem (network + routing) </li> <li data-section-id="1mi03dr" data-start="2683" data-end="2715"> Local support (huge advantage) </li> <li data-section-id="ugkm3q" data-start="2716" data-end="2754"> Not locked into cookie-cutter system </li> </ul> <hr data-start="2756" data-end="2759"> </div><div></div><div> </div><div>⚠️ The truth most people don’t tell you.</div><div> </div><div>If you’re having:</div><div> <ul data-start="3475" data-end="3556"> <li data-section-id="1h9jgu9" data-start="3475" data-end="3492"> dropped calls </li> <li data-section-id="39o5eg" data-start="3493" data-end="3510"> one-way audio </li> <li data-section-id="1quz1yz" data-start="3511" data-end="3531"> jitter / latency </li> <li data-section-id="108sade" data-start="3532" data-end="3556"> random call failures </li><li data-section-id="108sade" data-start="3532" data-end="3556">Internet problems</li> </ul> </div><div>👉 Switching between Big Provider's <strong data-start="3607" data-end="3626">will NOT fix it</strong></div><div> </div><div>Because:</div><div> <blockquote data-start="3637" data-end="3708"> </blockquote></div><div>VoIP problems are usually <strong data-start="3665" data-end="3708">network problems, not provider problems</strong></div><div> &nbsp;</div><div>That’s where Litecom dominates.</div><div> <hr data-start="3757" data-end="3760"> </div><div>💡 Simple decision rule</div><div> <ul data-start="3789" data-end="3940"> <li data-section-id="97nzoj" data-start="3789" data-end="3853"> Want <strong data-start="3796" data-end="3827">easy + fast + “good enough to get by”</strong> → Big Provider.</li> <li data-section-id="69fj2e" data-start="3854" data-end="3940"> Want <strong data-start="3861" data-end="3928">best performance + reliability + someone to actually fix issues</strong> → <b><span class="cf2">Litecom </span></b></li> </ul> <hr data-start="3942" data-end="3945"> </div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div></section></div>]]></description>
			<pubDate>Mon, 30 Mar 2026 20:15:00 GMT</pubDate>
			<link>https://litecom.net/blog/?voice-over-ip-support</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000021</guid>
		</item>
		<item>
			<title><![CDATA[The New FCC Router Ruling!"]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=The_Water_Cooler"><![CDATA[The Water Cooler]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000020"><div>If you’ve been keeping an eye on the tech world, you’ve probably heard about the recent FCC ruling that’s shaking things up for router manufacturers and consumers alike. Essentially, the FCC has set new regulations aimed at improving internet access and performance across the board, which means routers must now meet stricter standards for speed, security, and compatibility. This is great news for users, as it promises a more reliable and faster internet experience, but it’s also a big deal for manufacturers who now have to step up their game. Some of the key players affected by this ruling include well-known brands like Netgear, TP-Link, Linksys, and ASUS, all of which will need to adapt their products to comply with these new guidelines. So, whether you’re a tech enthusiast or just someone looking to upgrade your home Wi-Fi, this ruling is definitely something to keep on your radar!</div><div><br></div><div><br></div><div><div class="imTACenter"><!--[if gte vml 1]><v:shapetype
 &nbsp;&nbsp;id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
 &nbsp;&nbsp;path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
 &nbsp;&nbsp;<v:stroke joinstyle="miter"/>
 &nbsp;&nbsp;<v:formulas>
 &nbsp;&nbsp;&nbsp;<v:f eqn="if lineDrawn pixelLineWidth 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @0 1 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum 0 0 @1"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @2 1 2"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @3 21600 pixelWidth"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @3 21600 pixelHeight"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @0 0 1"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @6 1 2"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @7 21600 pixelWidth"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @8 21600 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @7 21600 pixelHeight"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @10 21600 0"/>
 &nbsp;&nbsp;</v:formulas>
 &nbsp;&nbsp;<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
 &nbsp;&nbsp;<o:lock v:ext="edit" aspectratio="t"/>
 &nbsp;</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_i1025" type="#_x0000_t75"
 &nbsp;&nbsp;alt="News from the Federal Communications Commission" style='width:444.75pt;
 &nbsp;&nbsp;height:65.25pt;visibility:visible;mso-wrap-style:square'>
 &nbsp;&nbsp;<v:imagedata src="file:///C:/Users/John/AppData/Local/Temp/msohtmlclip1/01/clip_image001.png"
 &nbsp;&nbsp;&nbsp;o:title="News from the Federal Communications Commission"/>
 &nbsp;</v:shape><![endif]--><!--[if !vml]--><!--[endif]--><b></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs11lh1-5"> </span></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs14lh1-5">FACT SHEET: FCC Updates Covered List to Include
 &nbsp;Foreign-Made Consumer Routers, Prohibiting Approval of New Models</span></b></div>
 &nbsp;<div class="imTACenter"><i>Update Follows Determination by Executive
 &nbsp;Branch Agencies that Consumer-Grade Routers Produced in Foreign Countries
 &nbsp;Threaten National Security</i></div>
 &nbsp;<div><b><u><span style="text-decoration-line: none;" class="fs11lh1-5"> </span></u></b></div>
 &nbsp;<div><span class="fs11lh1-5">WASHINGTON, March 23, 2026—Today, the Federal Communications
 &nbsp;Commission </span><span class="fs11lh1-5">updated</span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">its </span><span class="fs11lh1-5">Covered List</span><span class="fs11lh1-5"> to include all consumer-grade routers produced in
 &nbsp;foreign countries.</span><span class="fs11lh1-5"> &nbsp;</span><span class="fs11lh1-5">Routers are the
 &nbsp;boxes in every home that connect computers, phones, and smart devices to the
 &nbsp;internet. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">This followed a </span><span class="fs11lh1-5">determination</span><span class="fs11lh1-5"> by </span><span class="fs11lh1-5">a
 &nbsp;White House-convened Executive Branch interagency body with appropriate
 &nbsp;national security expertise that such routers “pose unacceptable risks to the
 &nbsp;national security of the United States or the safety and security of United
 &nbsp;States persons.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">The Executive Branch determination
 &nbsp;noted that foreign-produced routers (1) introduce “a supply chain
 &nbsp;vulnerability that could disrupt the U.S. economy, critical infrastructure,
 &nbsp;and national defense” and (2) pose “a severe cybersecurity risk that could be
 &nbsp;leveraged to immediately and severely disrupt U.S. critical infrastructure
 &nbsp;and directly harm U.S. persons.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">President Trump’s 2025
 &nbsp;National Security Strategy stated: “the United States must never be dependent
 &nbsp;on any outside power for core components—from raw materials to parts to
 &nbsp;finished products—necessary to the nation’s defense or economy. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">We must re-secure our own independent and
 &nbsp;reliable access to the goods we need to defend ourselves and preserve our way
 &nbsp;of life.” </span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">Malicious actors have
 &nbsp;exploited security gaps in foreign-made routers to attack American households,
 &nbsp;disrupt networks, enable espionage, and facilitate intellectual property
 &nbsp;theft. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Foreign-made routers were also
 &nbsp;involved in the Volt, Flax, and Salt Typhoon cyberattacks targeting vital
 &nbsp;U.S. infrastructure.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">The determination included an
 &nbsp;exemption for routers that the Department of War (DoW) or the Department of
 &nbsp;Homeland Security (DHS) have granted “Conditional Approval” after finding
 &nbsp;that such device or devices do not pose such unacceptable risks.</span><span class="fs11lh1-5"> &nbsp;</span><span class="fs11lh1-5">Producers of consumer-grade routers are
 &nbsp;encouraged to submit an application for Conditional Approval using the </span><span class="fs11lh1-5">guidance</span><span class="fs11lh1-5">
 &nbsp;attached to the determination.</span><span class="fs11lh1-5"> 
 &nbsp;</span><span class="fs11lh1-5">Applications should be submitted to </span><span class="fs11lh1-5">conditional-approvals@fcc.gov</span><span class="fs11lh1-5">. </span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">As outlined below, today’s action does not impact a consumer’s continued
 &nbsp;use of routers they previously acquired. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Nor does it prevent retailers from
 &nbsp;continuing to sell, import, or market router models approved previously
 &nbsp;through the FCC’s equipment authorization process. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">By operation of the FCC’s Covered List
 &nbsp;rules, the restrictions imposed today apply to new device models.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">Chairman Carr issued the following statement: </span></b></div>
 &nbsp;<div><b><span class="fs11lh1-5"> </span></b></div>
 &nbsp;<div><span class="fs11lh1-5">“I welcome this Executive
 &nbsp;Branch national security determination, and I am pleased that the FCC has now
 &nbsp;added foreign-produced routers, which were found to pose an unacceptable
 &nbsp;national security risk, to the FCC’s Covered List. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Following President Trump’s leadership, the
 &nbsp;FCC will continue do our part in making sure that U.S. cyberspace, critical
 &nbsp;infrastructure, and supply chains are safe and secure.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">Additional Background: </span></b></div>
 &nbsp;<div><b> </b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="ff1">·</span><span class="ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">The FCC’s Covered List is a list of
 &nbsp;communications equipment and services that are deemed to pose an unacceptable
 &nbsp;risk to the national security of the U.S. or the safety and security of U.S.
 &nbsp;persons.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Under the Secure and Trusted
 &nbsp;Communications Networks Act, the Commission can update the Covered List only
 &nbsp;at the direction of national security authorities. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">In other words, the Commission cannot update
 &nbsp;this list on its own and is required to implement determinations that are
 &nbsp;made by our national security agency experts.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Equipment on the Covered List
 &nbsp;(“covered” equipment) is prohibited from getting FCC equipment authorization.
 &nbsp;Most electronic devices (including consumer-grade routers) require FCC
 &nbsp;equipment authorization prior to importation, marketing, or sale in the U.S. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">Covered equipment is banned from receiving
 &nbsp;new equipment authorizations, preventing new devices from entering the U.S.
 &nbsp;market.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">The Cybersecurity and
 &nbsp;Infrastructure Security Agency encourages organizations to use the Covered
 &nbsp;List for risk management analysis in their regulatory compliance efforts. </span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Following a similar National
 &nbsp;Security Determination in December, and a follow-up Determination in January,
 &nbsp;the FCC recently added the following to the Covered List: “Uncrewed aircraft
 &nbsp;systems (UAS) and UAS critical components produced in a foreign country††
 &nbsp;—except, &nbsp;(a) </span><span class="fs11lh1-5 ff2">UAS</span><span class="fs11lh1-5 ff2"> and </span><span class="fs11lh1-5 ff2">UAS
 &nbsp;critical components</span><span class="fs11lh1-5 ff2"> included on the Defense Contract
 &nbsp;Management Agency’s (DCMA’s) Blue UAS Cleared List, until January 1, 2027,</span><sup><span class="fs11lh1-5 ff2">#</span></sup><span class="fs11lh1-5 ff2"> &nbsp;(b)
 &nbsp;UAS critical components that qualify as “domestic end products” under the Buy
 &nbsp;American Standard, </span><span class="fs11lh1-5 ff2">48
 &nbsp;CFR 25.101(a)</span><span class="fs11lh1-5 ff2">, until January 1, 2027; and (c) </span><span class="fs11lh1-5 ff2">devices
 &nbsp;which have been granted a Conditional Approval by DoW or DHS</span><span class="fs11lh1-5 ff2">—and
 &nbsp;all communications and video surveillance equipment and services listed in
 &nbsp;Section 1709(a)(1) of the </span><span class="fs11lh1-5 ff2">FY25
 &nbsp;National Defense Authorization Act</span><span class="fs11lh1-5 ff2"> (Pub. L.
 &nbsp;118-159)”.</span><b></b></div>
 &nbsp;<div><b><span class="fs11lh1-5 ff2"> </span></b></div>
 &nbsp;<div><b><span class="fs11lh1-5">What does this mean? </span></b></div>
 &nbsp;<div><span class="fs11lh1-5 ff2"> </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><b><u><span class="fs11lh1-5 ff2">New</span></u></b><b><span class="fs11lh1-5 ff2">
 &nbsp;</span></b><span class="fs11lh1-5 ff2">devices
 &nbsp;on the Covered List, such as foreign-made consumer-grade routers, are
 &nbsp;prohibited from receiving FCC authorization and are therefore prohibited from
 &nbsp;being imported for use or sale in the U.S. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">This update to the Covered List does not
 &nbsp;prohibit the import, sale, or use of any existing device models the FCC
 &nbsp;previously authorized. </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><b><span class="fs11lh1-5 ff2">This action does not affect any
 &nbsp;previously-purchased consumer-grade routers. </span><span class="fs11lh1-5 ff2"> </span></b><span class="fs11lh1-5 ff2">Consumers can continue
 &nbsp;to use any router they have already lawfully purchased or acquired. </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Producers of consumer-grade routers
 &nbsp;that receive </span><b><span class="fs11lh1-5 ff2">Conditional Approval</span></b><span class="fs11lh1-5 ff2"> from DoW or DHS can continue to
 &nbsp;receive FCC equipment authorizations. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">Interested applicants are encouraged to
 &nbsp;submit </span><span class="fs11lh1-5 ff2">applications</span><span class="fs11lh1-5 ff2">
 &nbsp;to </span><span class="fs11lh1-5 ff2">conditional-approvals@fcc.gov</span><span class="fs11lh1-5 ff2">.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">For more information,
 &nbsp;please see our </span></b><b><span class="fs11lh1-5">FAQ page</span></b><b><span class="fs11lh1-5">.</span></b></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div class="imTACenter"><span class="fs11lh1-5">###</span></div>
 &nbsp;<div class="imTACenter"><br><span class="fs11lh1-5">
 &nbsp;</span><b><span class="fs11lh1-5">Media Contact: MediaRelations@fcc.gov / (202) 418-0500</span></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs11lh1-5">@FCC / </span></b><b><span class="fs11lh1-5">www.fcc.gov</span></b><b></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs9lh1-5"> </span></b></div>
 &nbsp;<div class="imTACenter"><i><span class="fs9lh1-5">This is an unofficial announcement of Commission
 &nbsp;action.</span><span class="fs9lh1-5"> &nbsp;</span><span class="fs9lh1-5">Release of the full text of a
 &nbsp;Commission order constitutes official action.</span><span class="fs9lh1-5"> 
 &nbsp;</span><span class="fs9lh1-5">See MCI v. FCC, 515 F.2d 385 (D.C. Cir. 1974).</span></i></div>
 &nbsp;<div class="imTACenter"><b><i><span class="fs11lh1-5"> </span></i></b></div></div></div>]]></description>
			<pubDate>Wed, 25 Mar 2026 22:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?-everything-you-need-to-know-about-the-new-fcc-router-ruling--</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000020</guid>
		</item>
		<item>
			<title><![CDATA[Paycom Data Breach]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001D"><div><span class="fs14lh1-5">- <a href="https://www.classaction.org/news/paycom-payroll-data-breach-lawsuit-claims-hacker-stole-thousands-by-re-routing-direct-deposits#embedded-document" target="_blank" class="imCssLink">ClassAction.org</a> - Newswire - by Corrado Rizzi</span></div><div>Paycom Data Breach April 2023</div><div><br></div><div> &nbsp;Paycom Payroll faces a class action lawsuit over a 2023 data breach &nbsp;during which an unknown party accessed the company’s systems and stole &nbsp;thousands from customers’ accounts. &nbsp;<div><br></div><div> &nbsp;Paycom - Payroll faces a proposed class action lawsuit over an April 2023 &nbsp;data breach during which an unknown party accessed the company’s systems &nbsp;and stole thousands from Paycom customers’ accounts by re-routing their &nbsp;direct deposits to unknown accounts.<div><div><div> &nbsp;The 49-page Paycom Payroll data breach lawsuit says &nbsp;that the party or parties responsible for infiltrating the online &nbsp;payroll and human resources company’s systems “still have access to &nbsp;Paycom’s network” and thus access to customers’ personally identifiable information. &nbsp;Per the case, Paycom services thousands of employers nationwide and &nbsp;collects in the course of its business Social Security numbers, &nbsp;addresses, dates of birth, phone numbers, financial account numbers and &nbsp;more.</div> <div>“As such, Defendant assumed the legal and equitable duties &nbsp;to those individuals to protect and safeguard that information from &nbsp;unauthorized access,” the suit emphasizes. </div> <div>According to the &nbsp;complaint, Paycom in May of last year began to receive reports that &nbsp;unknown actors were accessing individuals’ personal Paycom accounts and &nbsp;re-routing their direct deposits elsewhere. </div> <div>Despite this, the lawsuit says, Paycom has failed to notify proposed class members of &nbsp;the data breach, leaving the consumers to discover the intrusion on &nbsp;their own only after “it was too late and unknown persons had already &nbsp;stolen their hard-earned paychecks.” </div> <div> &nbsp;“Due to Defendant’s &nbsp;negligence, cybercriminals obtained everything they need to commit &nbsp;identity theft and continue wreaking havoc on the financial and personal &nbsp;lives of thousands of individuals,” the filing states, noting that &nbsp;Paycom data breach victims will likely have to deal with the threat of identity theft and fraud for the rest of their lives. </div> <div> &nbsp;To &nbsp;date, the root cause of the Paycom data breach, the vulnerabilities &nbsp;exploited and the measures potentially taken to ensure another &nbsp;cyberattack does not happen in the future have not been shared with the &nbsp;public or regulators, the case says. </div> <div>Each of the suit’s three &nbsp;plaintiffs claims to have had more than $1,300 stolen after the hackers &nbsp;accessed their account and changed their direct deposit information. </div> <div>The &nbsp;lawsuit looks to cover all persons whose Paycom accounts were accessed &nbsp;by unauthorized parties between April 2023 and the present. </div></div></div></div></div><div><br></div><div><br></div></div>]]></description>
			<pubDate>Thu, 09 May 2024 02:25:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/large-7065116_thumb.png" length="234597" type="image/png" />
			<link>https://litecom.net/blog/?paycom-data-breach</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001D</guid>
		</item>
		<item>
			<title><![CDATA[Credit Freeze]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001C"><div>How to Freeze, or Un-Freeze and Protect your Credit Bureaus.</div><div> &nbsp;First, lets discuss this briefly. Have you ever wondered why your Credit Bureaus are unlocked by default? Great question, because they should be locked by default, thus preventing thieves from accessing your credit to obtain credit cards and accounts in your good name.</div><div><br></div><div> &nbsp;Here we have provided access to secure that information, for FREE.</div><div><br></div><div> &nbsp;Y<span class="fs14lh1-5">ou will create an account at each Bureau. You will not need to enter a credit card or payment method unless you so wish to take on additional services. Once created, you will create a PIN used to unlock them in the event you need to for some reason.</span></div><div><span class="fs14lh1-5"> &nbsp;If you need to apply for credit, you will be able to "Un-Freeze or Thaw" your Bureau's for a period of time which you designate.</span></div><div><span class="fs14lh1-5"> You can schedule a "Thaw", which is a determined time, in which the "Freeze" will automatically go back into effect.</span></div><div><span class="fs14lh1-5"> &nbsp;The following links are direct access to the Bureaus.</span></div><div><br></div><div><a href="https://www.experian.com/freeze/center.html" target="_blank" class="imCssLink">Experian</a></div><div><br></div><div><a href="https://www.equifax.com/personal/credit-report-services/credit-freeze/" target="_blank" class="imCssLink">Equifax</a></div><div><br></div><div><a href="https://www.transunion.com/credit-freeze" target="_blank" class="imCssLink">TransUnion</a></div><div><br></div></div>]]></description>
			<pubDate>Fri, 12 Apr 2024 02:01:00 GMT</pubDate>
			<link>https://litecom.net/blog/?credit-freeze</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001C</guid>
		</item>
		<item>
			<title><![CDATA[Windows Copilot]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001B"><div>Firstly, you must have at least the "PRO" version in order to do this.</div><div>You must disable it thru "Group Policy Editor".</div><div> &nbsp;From the search window on the tool bar, Type "GPO"</div><div><br></div><div>Next, in the left hand screen look for "<span class="fs14lh1-5"><b>User Configuration</b></span>"</div><div><br></div><div> <span class="fs14lh1-5"><b>User Configuration &gt; Administrative Templates &gt; Windows 
Components &gt; Windows Copilot </b></span></div><div><br></div><div>Then, 
double-click on, "<span class="fs14lh1-5"><b>Windows Copilot</b></span><span class="fs14lh1-5">"</span></div><div><br></div><div> To turn off Windows Copilot, select "Enabled" to 
remove Copilot entirely. </div><div><br></div><div><br></div></div>]]></description>
			<pubDate>Fri, 22 Mar 2024 16:21:00 GMT</pubDate>
			<link>https://litecom.net/blog/?windows-copilot</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001B</guid>
		</item>
		<item>
			<title><![CDATA[911 and VoIP]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=911_and_VoIP_Services"><![CDATA[911 and VoIP Services]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001A"><div class="imTACenter"><span class="imUl fs14lh1-5"><b>About the Litecom / VoIP 911 / e911 Emergency Services.</b></span></div><div><br></div><div><span class="fs14lh1-5"> Due to the nature and instability of VoIP networks, Litecom cannot and does not guarantee your emergency call will go through or will be answered rapidly. Loss of power, Internet access, high volume of traffic and/or several other</span><span class="fs14lh1-5"> </span><img class="image-0" src="https://Litecom.net/images/large-99143_1z8yneva.png"  width="250" height="250" /><span class="fs14lh1-5">conditions may cause 911 to be inoperable or slow to obtain a response from an operator . We have no control over those types of situations therefore are not held liable. Litecom will do everything within their power to prevent service outages within its network.</span></div><div><br></div><div><span class="fs14lh1-5"> Traditionally, dialing 911 anywhere within the United States and Canada from a business or residential landline routes your call to a local Public Safety Answering Point (PSAP) dispatcher who is trained to aid you in emergency situations by dispatching emergency medical, fire and law enforcement agencies to your location. The dispatcher is instantly provided with your physical address information.</span><img class="image-1" src="https://Litecom.net/images/large-2821623.jpg"  width="250" height="167" /></div><div><br></div><div><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5">VoIP 911 Service differs from traditional 911 services due to limitations brought on by VoIP technology. It is nearly impossible to detect where a call originates from when placed over the internet. e911 allows users to associate physical addresses with their DIDs, allowing them to have service similar to traditional 911.</span></b></div><div><br></div><div><span class="fs14lh1-5"> When an emergency (911) call is placed over a VoIP network, the physical address entered at the time of e911 registration for a specific DID will be passed along to your local PSAP providing the dispatcher with the exact location for that DID. The call will possibly be answered first, by a call taker confirming the address and information then transfer the call to the correct PSAP.</span></div></div>]]></description>
			<pubDate>Fri, 12 Jan 2024 21:40:00 GMT</pubDate>
			<link>https://litecom.net/blog/?911-and-voip</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001A</guid>
		</item>
		<item>
			<title><![CDATA[TikTok]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000018"> &nbsp;Early in 2023, Litecom, thru it's Remote Management and Monitoring Service, which uses an AI Security Agent, discovered TikTok code embedded in various companies web sites. Litecom discovered the users information was being relayed to TikTok. This was very alarming. Whom had dropped this code onto companies web sites and why? <div> &nbsp;Litecom began to investigate this finding. </div><div> &nbsp;First, let us go over Litecom's End-Point-Security. Coupled with a Hybrid / AI engine, it monitors computer activity and connections whether the user is active or not. Among many things, it monitors what occurs when you arrive at a web site and what may be occurring in the background.</div><div> &nbsp;So, what we discovered is, as a user arrives at a web site, our Security Agent detected another pathway being opened by the site, directing the user information to TikTok as analytics information. We notified some of these companies.</div><div> After a bit of time, some admitted they inserted the code themselves. This is known as a TikTok Pixel. <span class="fs14lh1-5">TikTok Pixel is a</span><b class="fs14lh1-5"> tracking pixel code on your website to track conversion events</b><span class="fs14lh1-5">. &nbsp;It also helps advertisers track user behavior on their website after &nbsp;clicking on a TikTok ad. It is similar to the tracking pixels used by &nbsp;other social media platforms, such as Facebook Pixel. In our case analysis, there is no advertising, just user data harvesting of some depth. </span></div><div><span class="fs14lh1-5"> &nbsp;Some information collected can be, first and last name, your phone number, email, your computer name.</span></div><div><span class="fs14lh1-5"> &nbsp;So, if your computer protection is lacking, as most are, this transfer is taking place without your knowledge. Our Security Agent notifies the user on their screen the transfer was blocked.</span></div><div><span class="fs14lh1-5"><br></span></div><div><span class="fs14lh1-5"> &nbsp;We are listing some sites which as of 5/18/23 have had this code inserted. </span></div><div><ul><li><span class="fs14lh1-5">Fossil Watches</span></li><li><span class="fs14lh1-5">Square Card</span></li><li><span class="fs14lh1-5">Ray-Ban sunglasses</span></li><li><span class="fs14lh1-5">Adobe</span></li><li><span class="fs14lh1-5">Microsoft</span></li><li><span class="fs14lh1-5">Chipotle</span></li><li><span class="fs14lh1-5">Jack in the Box</span></li><li><span class="fs14lh1-5">Winn-Dixie</span></li></ul><div><span class="fs14lh1-5"><br></span></div></div><div><span class="fs14lh1-5">We found similar results for Instagram. Sites as of 5/18/23</span></div><div><ul><li><span class="fs14lh1-5">Winn-Dixie</span></li></ul></div><div> </div><div> &nbsp;</div></div>]]></description>
			<pubDate>Thu, 18 May 2023 18:01:00 GMT</pubDate>
			<link>https://litecom.net/blog/?tiktok</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000018</guid>
		</item>
		<item>
			<title><![CDATA[Web Site - SEO - Make you #1]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000017"> &nbsp;After 22 years of building or hosting web sites, things have certainly changed. One thing which has not changed is, SEO Companies calling clients, touting they can make them appear on the first page or be #1. The Web sites used to play fair pretty much accross the board, and talent and skill played an important role in good web site building as far SEO went. We used to tell people the Golden Rule, " Remember, there is always a #1 and there can only be one, #1". Now, there is big money in charging people to be on the first page or #1, even though the same Rule applies.<div> Google has pretty much shifted to a, if you do not pay, you will never be found, in respect to key words or industry. As well, they eliminated a page by page result. Now, it is one big long scrolling page. Opps, see how they did that. Now everyone is on Page #1.</div><div> &nbsp;So, before you pay extra to some SEO company for something, remember the Golden Rule.</div></div>]]></description>
			<pubDate>Fri, 28 Apr 2023 00:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?web-site---seo---make-you--1</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000017</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security - Can't see if from my porch]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000016"><div><b><span class="fs14lh1-5 cf1">"Can't see if from my porch"</span></b></div><div><span class="fs14lh1-5"><img class="image-0" src="https://Litecom.net/images/pixabay-bb4c32c99d2c4650.jpg"  width="300" height="225" /><b><br></b><b><br></b><b><span class="cf1">We often think, if I cannot see it, then there is no problem.</span><br></b>This article actually covers not only open wireless access, but password provided wireless access as well.<br>When you provide the password, the users machine remembers the password fore-ever.<br>If you are using your internet to provide guest access, then you should especially consider a business class solution. You will not find these solutions at the local technology store.<br>For guest access solutions and information, visit our "Guest Access Solutions Page".<br>The article below covers several situations. Please read carefully and completely. It will provide a whole different outlook, even on the homefront.<br><span class="cf2">***************************************************</span></span></div><div><div><span class="fs14lh1-5"><i>By CAROLYN THOMPSON, Associated Press &nbsp;Carolyn Thompson, Associated Press &nbsp;</i>– Sun Apr 24, 3:35 pm ET<br>BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br>That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br>"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br>"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br>"You're a creep ... just admit it," they said.<br>Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br>Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br>For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br>Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br>It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br>Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br>Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br>A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br>The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br>The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br>For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br>"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br>"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br>Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br>The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br>People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br>For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br>It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br>"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br>"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br>The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br>But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br>On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br>The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br>Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br>After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.</span></div><div><span class="fs14lh1-5"><br></span></div><div><b class="fs14lh1-5"><span class="cf3">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.</span><br></b></div><div><b class="fs14lh1-5"><span class="cf3">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless access point implicitly authorizing users or not?'</span><br></b></div><div><b><span class="fs14lh1-5 cf3">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."</span></b></div><div><b class="fs14lh1-5"><br></b></div><div><span class="fs14lh1-5"> In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br>The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.<br><br></span></div></div><div class="imTARight"><b class="fs14lh1-5"><br></b></div><div class="imTACenter"><br></div></div>]]></description>
			<pubDate>Thu, 27 Apr 2023 18:59:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security---can-t-see-if-from-my-porch</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000016</guid>
		</item>
		<item>
			<title><![CDATA[Leadership]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000F"><div>Amazing leadership perspective!</div><div><img class="image-0" src="https://Litecom.net/images/wolves.jpg"  width="695" height="420" /><br></div><div><br></div><div>"A group of wolves: The 3 in front are old &amp; sick, they walk in front to set the pace of the running group lest they get left behind.</div><div><br></div><div>The next 5 are the strongest &amp; best, they are tasked to protect the front side if there is an attack.</div><div><br></div><div>The pack in the middle are always protected from any attack.</div><div><br></div><div>The 5 behind them are also among the strongest &amp; best; they are tasked to protect the back side if there is an attack.</div><div><br></div><div>The last one is the LEADER. He ensures that no one is left behind. He keeps the pack unified and on the same path. He is always ready to run in any direction to protect &amp; serves as the 'bodyguard' to the entire group.</div><div>Just in case you wanted to know what it really means to be a true leader. "</div></div>]]></description>
			<pubDate>Mon, 12 Sep 2022 02:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?leadership</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000F</guid>
		</item>
		<item>
			<title><![CDATA[Skylink vehicle tracking]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Transportation"><![CDATA[Transportation]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000E"><div>This is similar to LoJack. It is a device hiden in a vehicle to provide tracking and also can shut off the ignition. A few years ago they were aquired by Spereon which also owns LoJack. Most people probably bought their Skylink during a vehicle purchase at a dealership. The product was sold as a "Life Time" product. Since their aquisition Skylink was put to bed with no notification to its customer base. So much for "Life Time". As well, their tracking is 3G and Sprint based. Both of which are also dead. So your Skylink is just sitting there doing nothing now, tied into your ignition system just waiting to cause issues. Great, time to pay the dealership to remove that thing.</div><div> &nbsp;When you call Skylink to complain, they will suggest purchasing a LoJack system. Why purchase something from a company which is not forward looking.</div><div> &nbsp;A great solution is Drone Mobile and a Compustar Remote start and alarm system with GPS tracking. Like a T12 with 4G LTE Model: RFX-2WT12-SS, RFX-P2WT12-SS for example. If you are going to spend that kind of money, just go for the whole kitchen sink. Compustar works to build forward looking equipment with 4G and remote start. </div><div> &nbsp;You can inquire about this and other solutions at Surround Sound of Richardson, in Richardson, Texas.</div></div>]]></description>
			<pubDate>Mon, 07 Feb 2022 20:24:00 GMT</pubDate>
			<link>https://litecom.net/blog/?skylink-vehicle-tracking</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000E</guid>
		</item>
		<item>
			<title><![CDATA[National Do Not Call]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Telecom"><![CDATA[Telecom]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000B"><div><div>National Do Not Call</div></div><div><span class="fs12lh1-5 cf1 ff1">888-382-1222</span></div><div><span class="fs12lh1-5 cf1 ff1"><br></span></div><div><div><span class="fs12lh1-5 ff1">https://www.ftc.gov/faq/consumer-protection/list-number-national-do-not-call-registry</span></div></div><div><br></div></div>]]></description>
			<pubDate>Wed, 18 Nov 2020 18:19:00 GMT</pubDate>
			<link>https://litecom.net/blog/?national-do-not-call</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000B</guid>
		</item>
		<item>
			<title><![CDATA[Call Before You Dig]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000008">Call before you DIG.<div><div>800-344-8377</div></div></div>]]></description>
			<pubDate>Mon, 11 Nov 2019 20:28:00 GMT</pubDate>
			<link>https://litecom.net/blog/?call-before-you-dig</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000008</guid>
		</item>
		<item>
			<title><![CDATA[Favorites location Microsoft Edge]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000007"><div>C:\Users\johndoe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore</div><div><br></div><div>copy spartan.edb</div></div>]]></description>
			<pubDate>Thu, 12 Apr 2018 23:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?favorites-location-microsoft-edge</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000007</guid>
		</item>
		<item>
			<title><![CDATA[Quotes]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Quotes"><![CDATA[Quotes]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000006">Quotes to learn from:<div><br></div><div>"Don't hold on to a mistake, just because you spent a long time making it"</div></div>]]></description>
			<pubDate>Wed, 11 Apr 2018 13:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?quotes</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000006</guid>
		</item>
		<item>
			<title><![CDATA[Do I need a UPS?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=The_Water_Cooler"><![CDATA[The Water Cooler]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000014"><div><span class="fs14lh1-5">Real story from the Archives:</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">A client called and said, “My computer has a Blue screen. “</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">The color Blue described, did not sound like a virus.</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">So, we asked, “What happened.”</span></div><div><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5">They answered,</span></div> &nbsp;<div><span class="fs14lh1-5"> “I came in, powered up the PC as I do every morning and went to make coffee. While making coffee, there was a power surge / brown out. After making the coffee and pouring a cup, I went to my PC, and there was a Blue screen.”</span></div><div><img class="image-0 fright" src="https://Litecom.net/images/large-309523.png"  width="225" height="207" /><span class="fs14lh1-5"><br></span></div> &nbsp;<span class="fs14lh1-5">The verdict, Corrupted Hard Drive, Master Boot Record. After removing the hard drive and repairing it, the data was recoverable, but it would never run a PC again.</span><div><span class="fs14lh1-5"><br></span></div> &nbsp;<span class="fs14lh1-5">After Travel and labor charges to diagnose, </span><span class="fs14lh1-5">recover files from old hard drive after repairing it,</span><span class="fs14lh1-5"> return to site, replace with new PC, reload client specific utilities and peripherals no longer available or supported, $$$+. All this over a 2-week time frame.</span><div><span class="fs14lh1-5"><br></span></div><div><span class="fs14lh1-5">The moral of the story, get a UPS. You will spend between $150.00 to $275.00 or more on a UPS.</span><span class="fs14lh1-5"> </span></div><div class="imTACenter"><span class="fs14lh1-5">But you will never know what you missed.</span></div></div>]]></description>
			<pubDate>Mon, 02 Apr 2018 18:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?do-i-need-a-ups-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000014</guid>
		</item>
		<item>
			<title><![CDATA[Meltdown and Spectre]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000002"><div>Summary</div><div>On January 2, 2018, reports surfaced of a serious design flaw in Intel CPUs that could permit attackers to gain unathorized access to a computer's memory. Named "Meltdown" and "Spectre", these vulnerabilties require an update at the operating system level to fix.</div><div><br></div><div>All modern computers with Intel chips reportedly produced in the last 10 years appear to be affected, including those running Windows and Linux.</div><div><br></div><div>Update: January 5, 2018 - Released the following detection for attempts to exploit the Multiple CPU Hardwares Information Disclosure Vulnerability (CVE-2017-5753/Spectre):</div><div>Exp.CVE-2017-5753</div></div>]]></description>
			<pubDate>Sun, 07 Jan 2018 17:17:00 GMT</pubDate>
			<link>https://litecom.net/blog/?meltdown-and-spectre</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000002</guid>
		</item>
		<item>
			<title><![CDATA[Krack AttaCK Manufacturers affected Equipment lists]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000000"><div>Manufacturers affected list and comments can be found here. </div><div><br></div><div>CERT / Software Engineering Institute / Carnegie Mellon University.</div><div>Homeland Security</div><div><br></div><div><a href="http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4" target="_blank" class="imCssLink">http://www.kb.cert.org/</a></div></div>]]></description>
			<pubDate>Tue, 21 Nov 2017 15:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?krack-attack-equipment-lists</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000000</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security - KracAttaCK]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000015"><div class="imTARight"><span class="fs14lh1-5">Published - 10/16/2017</span></div><div class="imTACenter"><b><span class="fs14lh1-5">WPA and WPA2</span></b></div><div class="imTACenter"><b><span class="imUl fs14lh1-5 cf1">KracAttaCK</span></b></div><div class="imTACenter"><br></div><div><span class="fs14lh1-5">You may have heard the news recently released on Monday, 10/16/2017,regarding wireless security.</span></div><div><img class="image-0 fright" src="https://Litecom.net/images/pixabay-bb483ecd982f4f435e_5uztg0t0.jpg"  width="300" height="200" /></div><div><br></div><div><span class="fs14lh1-5">The report is known as "KrackAttaCK" (Key Reinstallation AttaCKs).</span></div><div><br></div><div><span class="fs14lh1-5">There are many news reports coming from this. One of the myths spreading already, is that if you access a site using secure protocol, HTTPS, you are safe. This is simply not true.</span></div><div><br></div><div><span class="fs14lh1-5"> The fix has 2 sides.</span></div><div><br></div><div><span class="fs14lh1-5">1. Protect your own network and site. The wireless equipment must be upgraded, replaced or patched. This is manufacturer dependant, on what they will do. Many manufactures will be late to the game, if ever arriving at all. It is likely older equipment will never be patched. WPA and WPA2 were released in 2003 / 2004 as an "Industry Standard Security Protocol", and is not a manufacturer specific software code.</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">There is a lot of unsupported legacy equipment out there, to say the least, using WPA and WPA2.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf2"> Litecom's</span></b><span class="fs14lh1-5"> </span><span class="fs14lh1-5">currently deployed enterprise wireless solution manufacturer, has already generated a software update to mitigate the issue, from the wireless manufacturers standpoint. New</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">Litecom</span><span class="fs14lh1-5 cf2"> </span></b><span class="fs14lh1-5">installations from 10/19/2017 forward, will include the fix as stream line.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf3">Please open a ticket thru the</span><span class="fs14lh1-5 cf3"> </span><span class="fs14lh1-5 cf3">ticket portal</span><span class="fs14lh1-5 cf3">, if you wish to have the update applied, or your current wireless solution evaluated or replaced. This is highly recommended.</span></b></div><div><br></div><div><span class="fs14lh1-5">2. Based on reports, Keep your computers at current OS, and update levels.</span><br></div><div><span class="fs14lh1-5">If you are a current</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">Litecom RMM</span><span class="fs14lh1-5 cf2"> </span></b><span class="fs14lh1-5">Customer, we are already taking care of this for you.</span></div><div class="imTACenter"><b><span class="fs14lh1-5 cf2">Litecom</span></b><span class="fs14lh1-5"> </span><span class="fs14lh1-5">recommends our</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">RMM enterprise service</span></b></div><div class="imTACenter"><b><span class="fs14lh1-5 cf4">We recommend</span><span class="fs14lh1-5 cf4"> </span></b><b><span class="fs14lh1-5 cf2">Litecom</span></b><b><span class="fs14lh1-5 cf4"> </span><span class="fs14lh1-5 cf4">performing a complete network evaluation for security risks.</span></b></div><div class="imTACenter"><br></div><div><span class="fs14lh1-5">You can review the Mid-Level document describing the issue at,</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">https://www.krackattacks.com</span><span class="fs14lh1-5">/</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">from the engineer (Discovered by Mathy Vanhoef of imec-DistriNet, KU Leuven) whom discovered the issue.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf3">Please open a ticket thru the</span><span class="fs14lh1-5 cf3"> </span><span class="fs14lh1-5 cf3">ticket portal</span><span class="fs14lh1-5 cf3">, if you wish to have the update applied, or your current wireless solution evaluated or replaced. This is highly recommended.</span></b></div><div><b><br></b></div><div><b><span class="imUl fs14lh1-5 cf4">We recommend</span><span class="imUl fs14lh1-5 cf4"> </span></b><b><span class="imUl fs14lh1-5 cf2">Litecom</span></b><span class="imUl fs14lh1-5"> </span><b><span class="imUl fs14lh1-5 cf4">performing a complete network evaluation for security risks.</span></b></div></div>]]></description>
			<pubDate>Mon, 16 Oct 2017 14:00:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security---kracattack</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000015</guid>
		</item>
		<item>
			<title><![CDATA[Anti-Virus]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_b5fm1v76"><div> &nbsp;</div><div><div>Myth: All Anti-Virus software is the same.</div><div>False: Each Anti-Virus product is different in some way. Some are better than others, and most certainly not created equal.</div><div><br></div><div>Myth: Since I have Anti-Virus software loaded, I can do whatever I want, and surf worry free, knowing I am protected.</div><div>False: Anti-Virus software is never full proof. It provides extra security, but cannot fully protect your machine, from you.</div><div><br></div><div>Think of Anti-Virus software as seat belts and airbags:</div><div>Equipping vehicles with seatbelts and airbags reduce injury, and in some cases prevent injury, but no guarantee implied you will never be injured. You must always be careful where and how you drive.</div><div><br></div><div><br></div><div>No “ONE” Anti-Virus software is 100%. Remember, you are the driver.</div></div><div></div></div>]]></description>
			<pubDate>Thu, 17 Mar 2016 20:39:00 GMT</pubDate>
			<link>https://litecom.net/blog/?anti-virus</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/b5fm1v76</guid>
		</item>
		<item>
			<title><![CDATA[Computer MTU]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_iqsrzm5u">For technical reference only!!!<div>ping xxx.xxx.com -f -l 1xxx</div><div>add 28</div></div>]]></description>
			<pubDate>Sat, 06 Feb 2016 19:45:00 GMT</pubDate>
			<link>https://litecom.net/blog/?computer-mtu</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/iqsrzm5u</guid>
		</item>
		<item>
			<title><![CDATA[Litecom supports The Greater Dallas Alzheimer’s Association.]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Litecom_Supports"><![CDATA[Litecom Supports]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_8n06h1ux"><div class="imTALeft"><span class="fs11lh1-5">Litecom supports The Greater Dallas Alzheimer’s Association.</span></div></div>]]></description>
			<pubDate>Mon, 12 Oct 2015 00:06:00 GMT</pubDate>
			<link>https://litecom.net/blog/?litecom-supports-the-greater-dallas-alzheimer-s-association-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/8n06h1ux</guid>
		</item>
		<item>
			<title><![CDATA[Cisco CCENT / CCNA]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Network_Engineering"><![CDATA[Network Engineering]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_4269a84s"><div class="imTALeft"><span class="fs14lh1-5">The CCENT and CCNA.</span></div><div class="imTALeft"><span class="fs14lh1-5"><br></span><div><span class="fs14lh1-5"> &nbsp;Introduced in June 2007, the CCENT is a stepping stone to the CCNA. Prior to 2007 the CCNA exam was multiple choice. &nbsp;&nbsp;After 2007 the exam was administered as mostly a "Lab Simulator", meaning, the test question would say, "There is a network issue, log in and fix it. Click next when you are done".<br></span><span class="fs14lh1-5"> &nbsp;The CCNA exam is a timed test taken at a secure facility, and is not allowed to be administered by any educational institute where CCNA materials are taught. The CCNA is only obtained thru one of these secure testing centers by appointment only. The exam carries an 85% failure rate accross the board.<br> </span><span class="fs14lh1-5">It is an extremely tough test.</span></div></div></div>]]></description>
			<pubDate>Wed, 07 Oct 2015 18:24:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/pixabay-bb483ecf9f274f405e_thumb.png" length="403936" type="image/png" />
			<link>https://litecom.net/blog/?cisco-ccent---ccna</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/4269a84s</guid>
		</item>
		<item>
			<title><![CDATA[What does F.O.C. mean when porting a phone number?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP"><![CDATA[VoIP]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_w5y6ad9e"><div class="imTALeft"><span class="fs14lh1-5">An F.O.C. (or Firm Order Commitment) FOC Date is when the local carrier will commit to having the circuit you ordered provisioned and physically ready to go. Frequently there are additional steps before the circuit is ready for turn up.</span><span class="fs14lh1-5"><br></span><span class="fs14lh1-5">When porting a number, neither the winning carrier or losing carrier have any control over the F.O.C. Date. There is an entity in control in the middle which verifys the information. There is NO WAY to have a phone conversation or "White Glove" the port. This is a security feature built into the process. So do not be mad at anyone and accuse them of "Blocking your port out". </span><span class="fs14lh1-5"><br></span><div class="mt1"><span class="fs14lh1-5">It takes experience and knowledge for a successful port and sometimes you need the professional services company such as Litecom to assist in this process.</span></div></div></div>]]></description>
			<pubDate>Fri, 21 Aug 2015 13:25:00 GMT</pubDate>
			<link>https://litecom.net/blog/?what-does-f-o-c--mean-when-porting-a-phone-number-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/w5y6ad9e</guid>
		</item>
		<item>
			<title><![CDATA[Adware, Malware]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_ct133e46"><div class="imTALeft"><span class="fs14lh1-5 cf1">Ever notice the computer browser acts as though it has stalled when hitting the back button?<br></span><span class="fs14lh1-5 cf1">Right click on the back button, and it will show where you are being redirected.</span></div></div>]]></description>
			<pubDate>Fri, 27 Feb 2015 16:03:00 GMT</pubDate>
			<link>https://litecom.net/blog/?adware,-malware</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/ct133e46</guid>
		</item>
		<item>
			<title><![CDATA[Cable Found ]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Just_for_Fun"><![CDATA[Just for Fun]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_deys4oz7"><div class="imTALeft"><span class="fs14lh1-5"><span class="cf1">Just for fun.<br> </span></span><div class="imTALeft"><span class="fs14lh1-5">Cable Found:<br></span><div class="imTALeft"><span class="fs14lh1-5">After digging to a depth of 10 feet last year outside Buffalo, New York, scientists found traces of copper &nbsp;cable dating back 100 years. They came to the conclusion that their ancestors already had a telephone network more than 100 years ago.<br></span><div class="imTALeft"><span class="fs14lh1-5">Not to be outdone by the New Yorkers, in the weeks that followed, a Los Angeles, California archaeologist dug to a depth of 20 feet somewhere just outside Oceanside. Shortly afterward, a story in the LA Times read, &nbsp;&nbsp;"California archaeologists, reporting a finding of 200 year old copper cable, have concluded that their ancestors already had an advanced high-tech communications network a hundred years earlier than the New Yorkers."<br></span><div><span class="fs14lh1-5">One week later, a local newspaper in Omaha Nebraska reported, "After digging 30 feet deep in his pasture near the community of Ainsworth, Nebraska, Ole Olson, a heck of an engineer and a self-taught archaeologist, reported that he &nbsp;found absolutely nothing. Ole has therefore concluded that 300 years ago,Nebraska had already gone wireless."<br></span><span class="fs14lh1-5">Just makes a person proud to be from Nebraska.</span></div></div></div></div></div></div>]]></description>
			<pubDate>Thu, 18 Dec 2014 13:43:00 GMT</pubDate>
			<link>https://litecom.net/blog/?cable-found-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/deys4oz7</guid>
		</item>
		<item>
			<title><![CDATA[VoIP Hosting vs. on site IP / PBX]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP_Services"><![CDATA[VoIP Services]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_y7ekw7zg"><p class="imTALeft"></p><div><span class="fs14lh1-5">To Host, or Not to Host, that is the question.<br>It is a very good question indeed.<br> The reality is, there is no straight forward answer here. Each business has its own objective. It is important to have a productive discussion with your CPE vendor or paid consultant, and explore the costs assosiated with hosting, or an On-Site IP/PBX.</span></div><p></p></div>]]></description>
			<pubDate>Mon, 08 Sep 2014 03:45:00 GMT</pubDate>
			<link>https://litecom.net/blog/?voip-hosting-vs--on-site-ip---pbx</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/y7ekw7zg</guid>
		</item>
		<item>
			<title><![CDATA[What is a CPE Vendor?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=CPE_Vendor"><![CDATA[CPE Vendor]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_te63jqyv"><div><span class="fs14lh1-5"> What is a CPE Vendor?<br></span></div><div><div><span class="fs14lh1-5"> CPE stands for, Customer Premise Equipment. The CPE Vendor works for the end user / buyer, on their behalf.<br></span></div><div><span class="fs14lh1-5">Example 1: A business needs to purchase or needs assistance with their phone system, network or computer needs. They hire or utilize the prefessional services of a CPE Vendor. Since the CPE vendor performs these functions on a day to day basis, they are more equiped and knowledgable on the products which will meet the customers needs.<br></span></div><div><span class="fs14lh1-5">Example 2: The CPE Vendor as a consultant. The end user is having trouble with their phone or internet service. The provider does not find an issue with their equipment, and suggests the end user call their CPE vendor. The end user believes the provider is working to resolve the issue, but in fact, they are working to rule out their equipment as the problem. The end user becomes frustrated because of the misconception the provider is supposed to fix the issue, when indeed, it is the end user whom most of the time, must troubleshoot their own equipment, in order to rule out the (their equipment) "CPE", and thus argue with the provider, of where the fix, or issue lies.<br></span></div><div><span class="fs14lh1-5"><br> This is where the CPE Vendor comes into the picture. The CPE vendor has more leverage as a professional services company, with knowledgeable staff, works on behalf of the end user, and paid by the end user, to act on the end user’s behalf. The providers are more likely to work with a CPE Vendor, because they are not emotionaly attached. Thus eliminating emotional non productive time, and actually, technically working the issue based on facts.</span><br></div></div></div>]]></description>
			<pubDate>Sun, 20 Jul 2014 23:21:00 GMT</pubDate>
			<link>https://litecom.net/blog/?cpe-vendor</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/te63jqyv</guid>
		</item>
		<item>
			<title><![CDATA[Wireless, WEP is secure, right?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_1n72hv2l"><p class="imTALeft"></p><div><span class="fs14lh1-5 cf1"> &nbsp;WEP is secure right? Not so fast. Just because you made and know the password means nothing. WEP is NON-PCI Enterprise Compliant.<br></span><div><span class="fs14lh1-5"><span class="cf1">__________________</span><span class="cf1"><br></span></span><div><span class="fs14lh1-5"><span class="cf1"> &nbsp;Wired Equivalent Privacy (WEP) is a weak security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 26 or 58 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools.</span><span class="cf1"><br></span></span><div><span class="fs14lh1-5 cf1">Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards. In 2003 the Wi-Fi Alliance announced that WEP had been superseded by a higher Wi-Fi standard. In 2004, with the ratification of the full 802.11i standard, the IEEE declared that both WEP-40/64/104/128 "have been deprecated as they fail to meet their security goals".<br></span><div class="mt1"><span class="fs14lh1-5"><span class="cf1">_____________________<br></span><span class="cf2"><b>Conclusion:<br></b></span><span class="cf1"> &nbsp;The algorithm WEP probably should have been done away with years ago, however, many products still in use, such as inventory scanners, are still going strong, and no-where near failure, and still must be supported. Extensive network engineering should be considered and implemented.</span></span></div></div></div></div></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless,-wep-is-secure,-right-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/1n72hv2l</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security the TJ MAXX Story]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_nd7i97oc"><div class="imTACenter"><div><br></div><div data-text-align="start" style="text-align: start;"><div><b><u><span class="fs14lh1-5">Wireless Security the TJ MAXX Story</span></u></b><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Cyber-thieves using a telescoping wireless antenna to
intercept payment information may be responsible for the "biggest data
breach ever," investigators theorize.Related Links</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Ring Charged with Hacking Major U.S. Retailers.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">The Wall Street Journal reported that hackers in St. Paul,
Minnesota, parked outside a Marshalls' department store and used the antenna to
decode data between hand-held payment scanners, enabling them to break into
parent company TJX's database and make off with credit and debit card records
of nearly 47 million customers.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Drive-by hacking, or "wardriving," was the first
major threat to Internet access over wireless connections. Wardrivers drive by
or park near Wi-Fi hotspots or open networks and use various means to siphon
off data from unsuspecting users.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">The TJX network was alleged to have less wireless network
security protection than the networks of many home users. The hackers are
believed to have had access to the network for as long as two years, going back
to at least July 2005.</span><br><span class="fs14lh1-5">
TJX was also alleged to be using the older Wireless Equivalent Privacy (WEP)
protocol for its network, which has been largely discredited for the ease with
which it can be broken. Security researchers in Germany recently published a
paper documenting how WEP can be broken in as little as 60 seconds.</span><br><span class="fs14lh1-5">
Most security experts recommend upgrading to the stronger Wi-Fi Protected
Access (WPA) protocol, but TJX was apparently slow to adopt the new system.</span></div>

<div><br><span class="fs14lh1-5">
Although TJX refused to comment on the wardriving allegations, the company
previously acknowledged that it failed to meet security procedures mandated by
the credit card industry. The company admitted to transferring credit card
payment information to banks without any sort of encryption, making it easier
for the wardrivers to pick up the information as they surfed the TJX network.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The hackers then most likely sold the purloined customer data in the
underground economy" of black-market chats that specialize in the trading
and selling of personal information. Data connected to the TJX breach turned up
in a Florida fraud case involving credit cards "cloned" with the
stolen personal information.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The fraudsters then used the clone cards to purchase gift cards from Wal-Mart,
which they then redeemed for thousands of dollars in high-priced merchandise.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Although the TJX corporation claims its strong first-quarter sales numbers show
that its shoppers don't care about the data breach, the company is still
fending off numerous lawsuits from state Attorneys General and class-actions
from irate customers.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Most recently, a coalition of banks in Massachusetts, Colorado, and Maine filed
suit against TJX for forcing them to absorb the costs of canceling and
reissuing thousands of credit and debit cards exposed in the breach.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The TJX breach has also spurred numerous bills in Congress to mandate stronger
data security standards for both government agencies and private companies, and
to ensure affected individuals are notified if a breach occurs.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Related articles</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
TJX To Pay Mastercard $24 Million For Data Breach</span><br><span class="fs14lh1-5">
TJX Settles with FTC Over Data Breach</span><br><span class="fs14lh1-5">
TJX Settles with Banks over Data Breach</span><br><span class="fs14lh1-5">
TJX Settles Visa Suit over Data Breach</span><br><span class="fs14lh1-5">
Attorneys General Oppose TJX Data Breach Settlement</span><br><span class="fs14lh1-5">
TJX Data Breach Victims Reach 94 Million</span></div>

<div><span class="fs14lh1-5"> </span></div></div></div></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security-the-tj-maxx-story</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/nd7i97oc</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security Article #1]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless"><![CDATA[Wireless]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_0w7vbqt1"><p class="imTALeft"></p><div><div><span class="fs14lh1-5">This another reason not to take for granted the knowledge needed to set your wireless up, or most importantly, the why. Not only the "why you should", but, what do each of those options really mean.<br>____________________<br><i>By CAROLYN THOMPSON, Associated Press Carolyn Thompson, Associated Press </i>– Sun Apr 24, 3:35 pm ET <br>BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents. <br>That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought. <br>"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum." <br>"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that." <br>"You're a creep ... just admit it," they said. <br>Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router. <br>Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12. <br>For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones. <br>Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court. <br>It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies. <br>Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers. <br>　<br>Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information. <br>A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access. <br>The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance. <br>The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password. <br>For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home . <br>"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range. <br>"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues. <br>Experts say wireless routers come with encryption software, but setting it up means a trip to the manual. <br>The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates. <br>People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue. <br>For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle. <br>It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, <br>　<br>looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement. <br>"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said. <br>"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed. <br>The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak. <br>But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why. <br>On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts. <br>The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber. <br>Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads. <br>After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography. <br>Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate. <br>"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?' <br>"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless." <br>　<br>In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party. <br>The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span><br><span class="fs12lh1-5 ff1">BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br> </span><span class="fs12lh1-5 ff1">That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br> </span><span class="fs12lh1-5 ff1">"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br> </span><span class="fs12lh1-5 ff1">"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br> </span><span class="fs12lh1-5 ff1">"You're a creep ... just admit it," they said.<br> </span><span class="fs12lh1-5 ff1">Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br> </span><span class="fs12lh1-5 ff1">Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br> </span><span class="fs12lh1-5 ff1">For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br> </span><span class="fs12lh1-5 ff1">Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br> </span><span class="fs12lh1-5 ff1">It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br> </span><span class="fs12lh1-5 ff1">Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br> </span><span class="fs12lh1-5 ff1">A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br> </span><span class="fs12lh1-5 ff1">The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br> </span><span class="fs12lh1-5 ff1">The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br> </span><span class="fs12lh1-5 ff1">For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br> </span><span class="fs12lh1-5 ff1">"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br> </span><span class="fs12lh1-5 ff1">"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br> </span><span class="fs12lh1-5 ff1">Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br> </span><span class="fs12lh1-5 ff1">The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br> </span><span class="fs12lh1-5 ff1">People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br> </span><span class="fs12lh1-5 ff1">For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br> </span><span class="fs12lh1-5 ff1">It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs,<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br> </span><span class="fs12lh1-5 ff1">"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br> </span><span class="fs12lh1-5 ff1">"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br> </span><span class="fs12lh1-5 ff1">The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br> </span><span class="fs12lh1-5 ff1">But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br> </span><span class="fs12lh1-5 ff1">On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br> </span><span class="fs12lh1-5 ff1">The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br> </span><span class="fs12lh1-5 ff1">Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br> </span><span class="fs12lh1-5 ff1">After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.<br> </span><span class="fs12lh1-5 ff1">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.<br> </span><span class="fs12lh1-5 ff1">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'<br> </span><span class="fs12lh1-5 ff1">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br> </span><span class="fs12lh1-5 ff1">The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span></div><span class="fs12lh1-5 ff1">BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br> </span><span class="fs12lh1-5 ff1">That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br> </span><span class="fs12lh1-5 ff1">"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br> </span><span class="fs12lh1-5 ff1">"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br> </span><span class="fs12lh1-5 ff1">"You're a creep ... just admit it," they said.<br> </span><span class="fs12lh1-5 ff1">Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br> </span><span class="fs12lh1-5 ff1">Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br> </span><span class="fs12lh1-5 ff1">For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br> </span><span class="fs12lh1-5 ff1">Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br> </span><span class="fs12lh1-5 ff1">It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br> </span><span class="fs12lh1-5 ff1">Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br> </span><span class="fs12lh1-5 ff1">A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br> </span><span class="fs12lh1-5 ff1">The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br> </span><span class="fs12lh1-5 ff1">The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br> </span><span class="fs12lh1-5 ff1">For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br> </span><span class="fs12lh1-5 ff1">"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br> </span><span class="fs12lh1-5 ff1">"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br> </span><span class="fs12lh1-5 ff1">Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br> </span><span class="fs12lh1-5 ff1">The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br> </span><span class="fs12lh1-5 ff1">People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br> </span><span class="fs12lh1-5 ff1">For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br> </span><span class="fs12lh1-5 ff1">It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs,<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br> </span><span class="fs12lh1-5 ff1">"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br> </span><span class="fs12lh1-5 ff1">"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br> </span><span class="fs12lh1-5 ff1">The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br> </span><span class="fs12lh1-5 ff1">But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br> </span><span class="fs12lh1-5 ff1">On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br> </span><span class="fs12lh1-5 ff1">The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br> </span><span class="fs12lh1-5 ff1">Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br> </span><span class="fs12lh1-5 ff1">After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.<br> </span><span class="fs12lh1-5 ff1">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.<br> </span><span class="fs12lh1-5 ff1">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'<br> </span><span class="fs12lh1-5 ff1">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br> </span><span class="fs12lh1-5 ff1">The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:36:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security-article--1</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/0w7vbqt1</guid>
		</item>
		<item>
			<title><![CDATA[Hosted VoIP]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP"><![CDATA[VoIP]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_35d85lct"><p class="imTALeft"></p><div><span class="fs14lh1-5">Hosted VoIP.<br></span><div><span class="fs14lh1-5"> &nbsp;To Host or not to Host, that is the question.<br>There is great discussion and conflict in opinion on using a hosted VoIP, or on premise VoIP solution.<br> &nbsp;Hosted offers the advantage of not maintaining on premise PBX equipment. Since there are many on-site PBX's to choose from, it is difficult to say for certain which solution would be more advantages’. Some on site IP PBX’s offer quick investment turnaround.<br> &nbsp;At the end of the day, it is important to have a VoIP expert to consult with, and examine the pros and cons of all the options in order to make the best decision.</span></div></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 00:06:00 GMT</pubDate>
			<link>https://litecom.net/blog/?hosted-voip</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/35d85lct</guid>
		</item>
	</channel>
</rss>