Welcome - Internet Technologies Made Simple
A Technical Blog from:
  • David Keener
  • Steve Keener
  • Facebook
  • Twitter
  • Articles Feed
Git, for Real
David Keener just conducted an educational session on git for software developers and system engineers at General Dynamics Mission Systems. The slides will be published online in the next few weeks.
David Keener March 13, 2017
David Keener at Balticon 2017 External Link
David Keener has been invited to participate in the Programming track at Balticon 2017. He may even be conducting one of his workshops there, although details are still up in the air.
David Keener March 04, 2017
Workshop: Bringing Settings to Life
David Keener ran a workshop, "Bringing Settings to Life," for the Loudoun County SF and Fantasy Writers group.
David Keener August 07, 2016
A/V for TLI at Verizon
David Keener was Technical Chair in charge of A/V and technical operations for the Toastmasters District 29 Toastmasters Leadership Institute (TLI) on July 23, 2016. Held at the Verizon headquarters in Ashburn, VA.
David Keener July 23, 2016

The brain starts working the moment you are born and never stops until you stand up and speak in public.

SiteMeter is Now Dodgy
My web site recently started periodically interrupting navigation by redirecting users to advertising pages hosted by Go.goadvs.com. Needless to say, I was not pleased.

Go.goadvs.com is a notorious example of the "advertising spam" category of malware. Generally, it infects people's browsers by installing its own browser extension.

However, in the particular case, I traced it to the SiteMeter widget that I've been using since 2010. It's clearly been compromised in some way, so I've removed it from the web site.
More Than 100K Views
Every once in a while, I toddle on over to SlideShare, where I post most of my presentations, and just check to see how many views my presentations have had.

This time, I was gratified to see that I've crossed one of those significant boundaries. My presentations have been viewed more than one hundred thousand times.

Come see what my all-time Top Ten presentations are...
My Love/Hate Relationship with Static Code Analysis Tools
I have a love/hate relationship with static code analysis tools. On the one hand, they're great at helping teams eliminate substandard code practices, especially those that may potentially result in security problems. On the other hand, they're widely misunderstood and misused, as well, and often by management.

Find out more...
In the Slideshare Top 5% for 2014
I've got twenty of my presentations up on Slideshare. My most popular presentation of the year was Social Networking: The Next Weapon Against Bad Actors, which is about how social networking technologies can be leveraged to assist in cyber security. I first presented this at the government's GFIRST Cyber Security Conference.

My second most popular presentation was 21st Century Writer. This one discusses changes in the publishing industry brought on by the advent of electronic books.
Speaking at DevIgnition

My friend and fellow conference organizer, Gray Herter, just sent me a picture he took of me speaking at the DevIgnition Conference at Booz Allen Hamilton’s Newman Auditorium in McLean, VA. This is another of the 37 plus places that I’ve spoken at, although it was a very, very nice venue. There were roughly 150 attendees present at the event.
Interesting Email Chain
An interesting email chain from work (with the names changed to protect the innocent), into which I just HAD to slip an esoteric movie reference...
RubyNation 2014 Logo Preview
Here's a preview of the new RubyNation 2014 logo. This year's challenge was to integrate an iconic Washington DC landmark with the ubiquitous ruby gemstone motif that's so prevalent in the Ruby language community.

A more line-oriented version of this logo is going to look awesome on the conference T-shirts next week.
In the SlideShare Top 2% for 2013
I was just notified that I was one of the Top 2% Most Viewed for 2013 on SlideShare. I have a total of 19 presentations posted online, and they've been generating some great traffic all year.

About the Target Attack
For those who might be interested in what really happened during the recent Target retail attack, where information about 40 million credit cards was stolen (including mine), here’s a really interesting article from Security Week:


In a nutshell, the attackers used a RAM scraper to pull credit card information that was stored “in the clear” within memory.

And yes, I was issued a new card because of this whole fiasco.
Domain Names Made Easy for Non-Techies
One of my non-technical friends, a writer and motivational speaker, bought a new domain name recently, then asked me how to get it pointed to her soon-to-be-rebranded website. The ensuing discussion revealed that she, like most non-techies, knew next to nothing about domain names, other than that "she needed one."

Since I suspect there are many other people around just like her, I thought it might be a good idea to demystify domain names. So, let's go on a tour through the wild, wild badlands of the Internet.
The Magic Incantation
If you're a system administrator, please don't read this article. It contains highly sensitive and technical information of general use only to software engineers. Also, please note that when I say "software engineer," I mean individuals who actually develop software.

Um, and by "developing software," I mean individuals who actually write code. So, basically, this article is for the roughly 10% of software engineers and system engineers that actually build things (I'm not actually being snarky; this is the rough percentage that I'm seeing in government consulting).

If you're still with me, read on...
Using Social Networking to Fight Bad Actors
Check out my cyber security presentation from GFIRST 2012...

GFIRST was a 1500-person conference hosted by the Department of Homeland Security. I conducted this presentation in round-robin fashion with my two partners in crime, Dave Roberts and Jonathan Quigg.