The Dragon that Guards the Data: No Pet Names in Passwords!

There’s a story on MSNBC.com about a security vulnerability discovered in DNS servers. Those are the machines that take the name you type into your address bar and convert it into numbers your computer can comprehend. If it converts it into the wrong set of numbers, you go to the wrong place. It would be…
Multiple recent incidents of clients having difficulties with email attachments have set me to calling people to remind them of good security practices with email. You don’t have to be a victim. Dealing correctly with attachments to emails is extremely important because it has become one of the primary vectors for attacking your machine. The…
You don’t want to just do a search for security software. It’s quite possible that you’ll find a tool that is useless, or even is malware itself. Thus this excellent list of security software at Gizmo’s Freeware. Several of these tools are ones I use and recommend. There are, however, a number I haven’t used,…
Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
Jason Hiner thinks not. The problem is likely less that Vista is bad, than that it is new and different and just a little clumsy for people who are accustomed to Windows XP. The idea of resolving security issues by forcing people to respond to the computer more often may be necessary–I don’t really know–but…
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)