A folder on my desktop is named Resources. This folder is filled mostly with PDF print outs of websites. Whenever I find an interesting article, useful tutorial, or free resource, I make a PDF and save it. I don’t trust that the information will be on the website when I want to read it again,… Read more Do You Trust Information To Stay Online?
I have been critical of the cloud for some time. I’m still don’t like the idea of putting my data on someone else’s computer. You don’t have the usual control over the data. However, I heard an argument recently, that changed my view a bit in favor of the cloud. You don’t do your own… Read more Security In The Cloud
How often do you take a look at all the online accounts you have? I tend to create a lot of online accounts. Most of them are free anyways. I create accounts just to see what a new website is about. Often only using the account once and losing interest. Do you delete these old… Read more Digital Spring Cleaning
It’s a pretty common idea in a lot of fields (business, security, software development, etc..), try to avoid a single point of failure. Don’t create any system that can be completely taken down by one problem. This is the reason I don’t use a password manager. I don’t trust all my security to a single… Read more Single Point of Failure
Would you write in a notebook if it came with a warning that there is no guarantee that the ink will stay on the page or the pages won’t spontaneously combust? Or that there is no way to know if other people are reading your notes? That you don’t actually own the information you write… Read more Privacy In The Cloud
I’ve been wanting to write down some thoughts on biometric authentication for a while. It’s becoming more popular and prevalent in the technology we use everyday. And before we actually learn what is good and bad about it from experience, I wanted to write down my opinions.
Every week/day in the news there is a new attack on individuals or businesses data (emails, credit card information, social security numbers, etc…). These attacks all get categorized as cyber-attacks, but what is the actual source of the attack? Is it malware? A skilled hacker(s)? Social engineering? Outdated software? I want to know what is… Read more Sources of Data Breach