You know how sometimes you encounter something that is so terrible and appalling that you feel you just have to tell other people about it? Well, for me, today is one of those days. But look, I’m a nerd who writes email software and likes to write raw HTML. If the terms “SMTP” and “MIME”… Read More »
[The technique described here is obsolete. Please see this update.] I’ve recently started using a YubiKey NEO for two-factor authentication for sites that support it.1 Because I am using my YubiKey for more and more sites, I tend to leave it plugged in whenever I am in front of a computer for an extended period… Read More »
As I wrote recently, Netgear introduced a severe bug into their router firmware around seven months ago, making all newer firmware releases since then unusable for many router owners. In the intervening time, numerous severe security holes in their routers have been publicized and patched by them. However, those of us who are running into… Read More »
Almost 11 years ago, back in August 2007, I opined passionately here on my blog, “Why I will no longer buy from Netgear“. Alas, I recently failed to heed my own advice, and I’m sorry to say that the results have been somewhat predictable. Last September, I found myself in need of a new router… Read More »
A legitimate email from AT&T does its level best to masquerade as a phishing email.
The Equifax breach is a big deal. There are things you need to do right now to protect yourself.
I’ve been using CrashPlan for Home for about five years. Alas, their Home product is being discontinued, and people who want to keep using CrashPlan will need to pay 2-3 times as much to switch to their Small Business service. I’m not willing to pay that much. Before using CrashPlan, I implemented my own backup… Read More »
Where I work, we have employees who use (in decreasing order of popularity) Mac OS, Windows, and Linux as their desktop computers. We’ve deployed a large, complex remote administration / MDM application for managing the Mac OS and Windows desktops. It’s big and complicated and difficult to maintain. It does much more than we will… Read More »
The best way to configure Ubuntu for an encrypted root filesystem is to tell the installer to do it when you’re installing the operating system. It’s complicated, and smart people have put a lot of effort into making the installer know how to do it properly. Having said that, if you’re an experienced Linux sysadmin… Read More »
I was victimized by GameStop’s security breach back in October, and again now. I hope it puts them out of business.