Password Tips for 2016

password1Passwords – Is mine strong enough?  How do I know?  Every time I write a password article I feel as if this subject has already been done to death by me and others.  But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions:

  • Use different passwords for personal and work systems.  That way ...
Continue Reading →
0

What is Security In A Box?

linux-logoAt the November meeting of Penguins Unbound, the local Linux Users Group, I was introduced to a group of people from CryptoPartyMN.  These guys and gals are serious about anonymity on the web.  On of the resources they discussed was a great website called Security in a Box.  If you would like to learn how to be more secure in your online communications, this is certainly a ...

Continue Reading →
0

Tips From FBI To Lower Your Online Profile

ic3I am getting posts from the FBI and the Internet Crime Complaint Center (IC3), and received this interesting warning on November 18th of last year.  This warning was sent to law enforcement and public officials, but if you have come to the point in your life were you are feeling a bit overexposed on the Internet, these tips can help you too.

For some of us, a few of these suggestions are ...

Continue Reading →
0

Facebook Offers Two-Factor Authentication

facebookFacebook has joined the crowd of major web services that allow you to set up two-factor authentication (2FA or TFA).  I just finished setting it up on my account, and I was please to see that it works with Google Authenticator.  According to the instructions, it will also work with the Facebook smartphone app for Android or iPhone.  Tech Republic has a great step by step tutorial, so I won’t ...

Continue Reading →
0

Amazons Offers Two-Factor Authentication

Amazon-LogoOne of the security practices that I am always looking for is two-factor or multi-factor authentication.  This is when you need a user name, a password, and a special code or device to provide the second authentication factor.

I have been using Google Authenticator with my extensive set Google accounts and with the password manager LastPass.  I was happy to learn that I can finally ...

Continue Reading →
0

Junkin’ Jack Flash

flash-logoAdobe’s Flash program has been a security nightmare. A favorite among malware writers for ages, Flash is useful for doing things like creating fake security pop-up alerts and conning computer users into buying security programs that don’t work and carry malicious content.  And it seems that there is another “zero-day” vulnerability discovered every three days.

Do we really need Flash?  No we don’t.  iPhones and iPads ...

Continue Reading →
0

The End Is Near For IE10

IE logoIf you or your company is still using Internet Explorer 10 or older versions of IE, then it is important that you move to IE11 (at a minimum) before January 12 2016.  Microsoft will officially end support for browser products older than Internet Explorer 11.  Many businesses are using older versions of IE to provide compatibility with older line-of-business and internal web applications.  If you are not updating those apps ...

Continue Reading →
0

Fair Use Reaffirmed by Library of Congress

DMCAThere has been a running battle on the subject of copyright in the digital age, between content creators and their customers, the content consumers.  The doctrine of Fair Use has protected consumers who engage in making copies of protected works for their own use or for backup purposes.  The content creators and the companies and lawyers that serve them have been trying to reduce or restrict the doctrine of fair use.

Back ...

Continue Reading →
0
Page 35 of 42 «...1020303334353637...»