From Pinterest
A follow up to last Sundays musings on human-computer relations
Continue Reading →JUL
From Pinterest
A follow up to last Sundays musings on human-computer relations
Continue Reading →One of the most important and easily implemented security protections is data backup. That’s right, backup is a part of a well crafted security program. Because whatever the disaster, whether cyber-attack, theft, data corruption, hardware failure, fire, flood, or bad weather, having a good backup program means that you can recover from disaster and continue operations.
And one of the most important things ...
Continue Reading →Not sure what’s happening, can’t find any news on it, but according to the web site “Is It Down Right Now?” Like to buy a couple computers today…
Continue Reading →One of the best ways for protecting your employees, and your kids for that matter, from malware laden websites and other NSFO (not suitable for the office) websites is to subscribe to a service called OpenDNS. We have used them with several of our clients and found them to be a great way to filter web content, at just $28 per user per year.
The product that you want to look ...
Continue Reading →With all the personal data that has been stolen over last couple of years making headlines, prime time news stories, and an endless barrage of hacker-themed TV programs (Scorpion, Person of Interest, Mr Robot, etc.), cybersecurity has become a mainstream topic of interest. Everyone wants to know how to protect themselves and their data from attack. Encryption is beginning to ...
Sorry for this post, as it is not really funny at all, at least not for the 22 year old German factory worker who was killed in a Volkswagen plant by a factory robot at the beginning of July. But happening as it did around the release of Terminator Genisys, the irony is tough to ignore.
Ever since I finished ...
Continue Reading →In the last couple of weeks we have read about two new security issues with Apple’s OSX operating system. The first was about a new threat named “CORED” or “XARA” (for Cross-App Resource Access). In this exploit a rogue app on the App Store could use the elevated privileges of another installed app to execute malicious code at a higher ...
I finished Bruce Schneier’s latest contribution to the realm of corporate and governmental surveillance. This book is a great read if you want to understand just who IS spying on you. Turns out it is not just the NSA, but big corporations are collecting all data they can on customers and potential customers, and this information is sold and exchanged. Then there is the unholy alliance between corporate American and Big Government surveillance.
At the end, he recommended solutions in the ...
Continue Reading →As ironic as it may seem, since Google knows more about us than even the NSA, Google has stepped up with a new tool called My Account to help people control their online privacy. If you have been lamenting the loss of personal privacy in the Internet age, here at last is something you can do about it. It may not address all your concerns, but here is a start.
You will be able to control Sign-in and Security, Personal ...
Continue Reading →If you went to see Jurassic World, or even if you only saw the trailers on TV, you saw this image of Chris Pratt training the velociraptors.
It turns out that zookeepers have been inspired to create similar images, such as the one below.