Skip to main content

Home/ Information Security/ Group items tagged IT

Rss Feed Group items tagged

shalani mujer

Enjoying Worry-Free Computer Use - 1 views

As an executive of a medium-sized company in Oakland, life has always been hectic to me except on weekends. Nevertheless, when I have some work that needs to be rushed, I am forced to do it at home...

tech support

started by shalani mujer on 08 Jul 11 no follow-up yet
par7133

Juniper | Open Gallery - 1 views

  •  
    Juniper Gallery - if you like it use your voice to let it round the world of mouth
Secure Life

Best Home Alarm Systems and Alarm Reviews - 0 views

  •  
    Let's face it - with the proliferation of company "microsites," it's awfully hard to find an unbiased review of a product or service these days. The same goes for home security systems, as most of them are run by the alarm companies themselves. If you search for "best home security system" how do you know half the results aren't run by a giant alarm company (hint: they are)? Here at A Secure Life, it all began when our analyst's neighbor's house was broken into. Their neighborhood had become increasingly insecure, so we began our search for a solid alarm system provider. http://www.asecurelife.com/best-home-alarm-system
Bart TheGuard

Kaspersky Lab discovers one of the most significant cyber-attacks ever! - 0 views

  •  
    Kaspersky Lab issued an important report on Monday (01.14.2013) about a major, extremely complicated cyber-attack that may have been operating since the year 2007. The famous antivirus company reported that it identified a sophisticated cyber espionage campaign, which targeted a wide range of government and diplomatic organizations located in Eastern Europe and Central Asia as well as in North America and Western Europe. That's some very powerful malware!
Albert Steno

Custom Flash Drives as Wedding Give-aways - 1 views

You might be surprised but yes we use Promotional USB Drives as our give-aways in our wedding last Saturday. My wife and I decided that we want to be different this time and since most of our guest...

USB custom flash drives computer tools

started by Albert Steno on 28 Mar 12 no follow-up yet
Kiran Kuppa

Google looks to kill the password using tiny cryptographic card | Ars Technica - 0 views

  •  
    "Google engineers are experimenting with new ways to replace user passwords, including a tiny YubiKey cryptographic card that would automatically log people into Gmail, according to a report published Friday. In the future, engineers at the search giant hope to find even easier ways for people to log in not just to Google properties, but to sites across the Web. They envision a single smartphone or smartcard device that would act like a house or car key, allowing people access to all the services they consume online. They see people authenticating with a single device and then using it everywhere."
Kiran Kuppa

Want to Block Common Passwords? Sorry, That is Patented | Xato - Passwords & Security - 0 views

  •  
    What amazes me though is how many patents I encounter that have been granted for some of the most obvious, well-known and ordinary techniques we use in the authentication process. In fact, every imaginable aspect of password selection, authentication, storage, and recovery seems to be covered by one or more patents.As the title says, the process of checking for common or weak passwords is patented. In fact, it is covered by quite a few patents: 1.System for controlling access to a secure system by verifying acceptability 2.Specifying a set of forbidden passwords 3.Preventing trivial character combinations 4.Password strength checking method and apparatus… 5.Method and system for proactive password validation 6.Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords 7.Apparatus and method for indicating password quality and variety
Kiran Kuppa

Applied Cryptography Engineering - Quarrelsome - 0 views

  •  
    "This article was written with several goals: to hurry along the process of getting Applied Cryptography off the go-to stack of developer references, to point out the right book to replace it with, and to spell out what you else you need to know even after reading that replacement. Finally, I wrote this as a sort of open letter to Schneier and his co-authors."
‹ Previous 21 - 40 of 86 Next › Last »
Showing 20 items per page