Microsoft Updates Logo

It has been 25 years since Microsoft introduced the 4 color waving flag logo with Windows 95.  They have announced plans to update it in conjunction with the release of Windows 8.  The new logo is shown below.

Microsoft new logo

While this log is still quite similar to the previous version, it shares the same tiled look as the Windows 8 user interface.  You can see the short video on YouTube or read more ...

Continue Reading →
0

Using the TOR Network to Stay Anonymous Online

In an article post from Tech Gurus’ Moyo Ogunjale, where he discusses the issue of searching the deep web or hidden web, he goes into some detail on how to use the TOR Network not only to search for the hidden web, to to communicate anonymously online.

The TOR network stands for The Onion Router, and is named presumably because as you peel back the layers looking for the identity of the user, you just get another layer.  The ...

Continue Reading →
0

Hotel Locks Easily Hacked

As someone always travels with a laptop, smartphone, and other expensive toys, and who spends a bit of time staying in hotels from time to time, I am always reluctant to leave my trove in the room, usually opting to take my laptop with me and keep it locked in the car truck (like that is really more secure.)

We recently stayed at a Holiday Inn in Rochester MN where this issue was brought to mind.  The keys that the registration ...

Continue Reading →
0

Philips Passwords Exposed by r00tbeer

A new hacktivist group named “r00tbeersec” cracked some databases at Philips, the huge Dutch electronics company, and published them on the Internet.  As reported on Sophos, this trove included on database of 400 passwords that was stored in plain text.  This is just bad management by the IT folks at Phillips.  The interesting bit is some of the passwords in the list were just so simple to begin with.  What follows are excellent examples of just plain bad ...

Continue Reading →
0

Mobile Devices and Security

A tip of the cap to the blog of Johnson McCann Insurance for this article.  Here are three great ideas for managing the risk of owning a mobile data device such as a smart phone or a tablet.

Physical Damage:  The biggest threat to the safety of your device is accidental damage that occurs when you drop your phone or tablet, or sit on it, or slam it in a car door or trunk lid.  The best idea here ...

Continue Reading →
0

Creating and Using a Strong Password

Here are some guidelines for creating a bulletproof password.

  • Longer is Better – almost all password cracking is done by a group of machines that is simply trying all possible combinations.  A three character password can be cracked in seconds, but a 14 character password takes longer, like 2,000 millennia.
  • No More Words – using words that can be found in the dictionary, or the names of you spouse, kids, street, computer monitor, or whatever just makes the cracking process simpler.  ...
Continue Reading →
0

New eBay Rule Bans Sales of “Advice, Spells, and Curses”

A new eBay rule is banning the sale of "advice, spells, curses, hexing, conjuring, magic, prayers, blessing services, magic potions, [and] healing sessions."

Who knew this was even available on eBay?  I am not sure why I find this surprising.  I use eBay primarily to buy and sell computer parts and peripherals, but it has become my go to place for comparison shopping for almost anything.  Lots of new stuff for sale on eBay as well.

Anyway – if you were planning ...

Continue Reading →
0
Page 243 of 272 «...220230240241242243244245...»