by Isaac Johnson | Dec 5, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source, Outsource
I recently did a presentation for a high school computer science class. One topic we touched on was cyber security, penetration testing, and the fundamentals of hacking. I promised to put up a list of software used for hacking/penetration testing so here is a list of...
by Isaac Johnson | Oct 15, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source
Recently, ironically as it is, myself and some other IT professionals were answering a question on Linkedin about creating social networks for churches. There are probably quite a few people out there wondering the same thing… and with good reason, as churches...
by Isaac Johnson | Oct 2, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source
If you are reading this, you are probably using Linux or Unix already. Your Android phone: Linux, your iPhone/iPad: Unix, your Mac: Unix, your router: Linux, the HTML server hosting GeekOut Technologies: Linux. Basically, over the years Linux/Unix has been sneaking...
by Isaac Johnson | Jul 16, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source
This post isn’t so much about a technology issue so as it is a post that hopefully inspires people to go out and do things that they are being called to do. If you have that nagging-tugging feeling that you are meant to be doing something and have been avoiding...
by Isaac Johnson | Jul 9, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source
I recently read an article written by a computer technician in the UK where he relayed a story about a virus intruding into his client’s network via phishing e-mail and then managing to infect all their computers in the course of a few hours. He mentioned if...
by Isaac Johnson | Jul 9, 2013 | Business, Churches, Information Technology, Missions, Nonprofit, Open Source
I recently read an article written by a computer technician in the UK where he relayed a story about a virus intruding into his client’s network via phishing e-mail and then managing to infect all their computers in the course of a few hours. He mentioned if...