Identity Verified Thinker in Technology / Internet / Infrastructure
Mike Dailey
Mike Dailey
Mike Dailey is the owner of, an Information Technology consulting firm specializing in the design, integration, and management of Internet website and security technologies. He can be reached through the claroPoint website at


This Blog has no active categories.
Jun. 30, 2011 11:11 pm
The U.S. District Court has ruled that a law suit filed against Google can proceed, paving the way for a potential class-action lawsuit against the search engine giant for the illegal interception of open residential wireless access point transmissions. Judge James Ware rejected Google's argument that a dismissal of the case was warranted because the wireless signals intercepted by Google were...  Read More
Jun. 29, 2011 10:16 pm
I have a family, a wife and three teenage children. Like most families, we have disagreements of opinion, we debate, and sometimes arguments become heated. As any parent can attest, quite a few of these times can be attributed to the stern will of teenagers who apparently have figured everything out and understand the meaning of life at around 16 years of age. When I was a teenager, I am sure my...  Read More
Jun. 28, 2011 7:49 pm
While surfing through my usual news and technology sites I ran across a great article on CircleID by Steve Atkins. Steve explained how the use of URL shortening services such as and can result in your emails being flagged and blocked by spam filters. Following through on Steve's article I found that he is the founder of an anti-spam consultancy, Word to the Wise , focusing...  Read More
Jun. 28, 2011 10:11 am
Microsoft is advising customers to reinstall if their desktop OS becomes infected with a new rootkit that hides in the PC boot sector. This new variant of a Trojan Microsoft calls "Popureb" can infect the system at such a deep level that the only way to remove the malware is to reinstall Windows, Chun Feng, an engineer with the Microsoft Malware Protection Center (MMPC), said last week on the ...  Read More
Jun. 27, 2011 9:33 pm
Being a successful IT consultant requires more than just being a techie who provides professional or expert advice. To be successful you need not only the technical skills but the technical tools to get the job done. I could write at length about the times I've watched other consultants struggle in front of a client because they were not prepared with the right tools to meet the need. A client...  Read More
Jun. 26, 2011 11:56 am
Microsoft held true to their marketing reputation this week by taking advantage of an opportunity to push Internet Explorer after an apparent bout of in-fighting erupted at Mozilla. Apparently some on the Mozilla development team are not concerned whether the Firefox browser is positioned well in the enterprise network, preferring rather that the focus be in supporting the needs of the average...  Read More
Jun. 25, 2011 11:07 pm
Since its launch in October, 2004 Project Honey Hot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to...  Read More
Jun. 25, 2011 11:58 am
In this multipart series we will be discussing the process and procedure for configuring an iptables firewall under Linux. This series will guide Linux users with any level of networking experience through the entire process of installing and configuring a complete iptables firewall. Included in the final firewall configuration will be leading industry-standard best practices for firewall traffic...  Read More
Jun. 21, 2011 12:18 pm
The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software. The library, crypt_blowfish , allows for fast two-way password encryption. The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that include the...  Read More
Jun. 19, 2011 11:43 pm
When it comes to protecting the data stored on your home or small business computer, if you are like most of us the cheapest and easiest solution is the one you use. Unfortunately, data loss occurs much more frequently than most people realize. According to many industry researchers a complete loss of data occurs so often that it costs U.S. businesses $12 billion annually. The cost is...  Read More
Jun. 18, 2011 2:43 pm
Microsoft announced on Thursday the findings of a survey which revealed that over 7000 Windows home and business customers in several countries--including the United States, United Kingdom, Ireland, and Canada--have been targeted by a phone phishing scam. According to Microsoft, "the scam works by criminals posing as computer security engineers and calling people at home to tell them they are at...  Read More
Jun. 17, 2011 11:03 pm
For many of us in the technology field the preventative measures we take to keep ourselves and our systems safe online can become second nature. We become comfortable with the drill, so comfortable, in fact, we sometimes forget that not everyone may have the resources and technical information that we have at our disposal. Keeping this in mind I spent some time searching for and collecting a...  Read More
Jun. 16, 2011 10:13 pm
When we moved to a new town a few years ago one of the many tasks on our list was finding a family-oriented church in the local community. Our new home was too far from our old church to commute to services, so we began to take a look at the many churches in the area. The first church we attended was a little too formal, a little "too religious" for us. After attending for a few months, my...  Read More
Jun. 13, 2011 2:40 pm
Now that the first glimpses of Windows 8 have been released by Microsoft, it is anyone's guess how the market will react to some of the dramatic changes being proposed in this latest desktop OS. Reading some of the recent news article comments and blog posts it is easy to see that the initial reaction is not what Microsoft had hoped for. At the heart of the new OS is a user interface that draws...  Read More
Jun. 12, 2011 3:36 pm
According to a recent Homeland Security News Wire article , nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically--primarily as a cost savings effort--the risk and exposure of our private medical information increases while our...  Read More
Return to Main Blog Page
Latest Ebooks