Saturday, December 20th, 2008
This is a great list of various things you can do to protect your data. Here's a quick summary:
10. Wipe that iPhone (or BlackBerry) before trading in.
9. Use virtual credit cards for iffy online buys.
8. Hide data inside files with steganography.
7. Plan for the worst.
6. Get smarter on security questions.
5. ...
Posted in Internet, Privacy, Security | No Comments
Sunday, December 14th, 2008
Older versions of the popular Wordpress plugin WP-DP-Backup leaves the copy of your entire database in a public folder for all to see. The databases were stored in wp-content/backup/ and a quick Google search today still returns many databases of sites, including some as recent as a few days ago:
http://www.google.com/search?num=100&hl=en&suggon=0&safe=off&q=intitle%3A%22index+of+%2Fwp-content%2Fbackup%22&btnG=Search
For ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Sunday, November 9th, 2008
The viewing of porn at work can result in lost time, creativity, productivity, and employer profitability. More importantly, it can help create a hostile work environment and can be considered sexual harassment, in violation of Title VII of the Civil Rights Act of 1964. Naturally, corporations want to avoid the ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, November 5th, 2008
Today, a major feature was added to the pre-release versions of Firefox 3.1, called Private Browsing. I've been working for quite some time on this, so I thought it may be a good time to write about what this feature is and how to use it.
As you may know, while ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Tuesday, October 21st, 2008
Computer keystrokes can be snooped from afar by detecting the slight electromagnetic radiation emitted when a key is pressed, according to new research.
Other security experts have theorised keyboards were vulnerable to such detection, wrote Sylvain Pasini and Martin Vuagnoux, both doctorate students with the Security and Cryptography Laboratory at the ...
Posted in Hardware, Privacy | No Comments