Why you should not use RegScale
Companies that engage in slimy marketing practices tend to be slimy companies. RegScale fits that description, so you should avoid doing business with them.
Companies that engage in slimy marketing practices tend to be slimy companies. RegScale fits that description, so you should avoid doing business with them.
Twitter is in the news again with another security breach in which 235 million users’ email addresses, phone numbers, and Twitter handles were exposed. These seems like a good opportunity to talk about what you can / should do to protect yourself if you need to maintain anonymity online. The basic rule is this: if… Read More »
The open-source package Shamir’s Secret Sharing Scheme, or “ssss” for short, allows a relatively short secret, for example, a password or passphrase, to be split into a specified number of shares in a way that allows the entire secret to be reconstructed from only a subset of the shares. For example, you can split a… Read More »
There is one problem that every single information security / governance / risk / compliance (GRC) organization at every company has to deal with, and that’s keeping track of all the recurring tasks that you need to do to maintain your security and compliance and ensuring that they are done on time. I’m sure that… Read More »
I’ve done a pretty deep dive comparing the features of various password managers, but one feature I didn’t cover in that analysis was backup for business customers. What commitments does the vendor make in terms of backup/restore? Do they promise to be able to restore data that is accidentally or maliciously modified or deleted by… Read More »
I have LUKS encryption configured on all of my Linux desktops and laptops, which is a pain when I need to reboot one remotely, since it prompts for the decryption key and won’t finish rebooting until the key is entered. To solve, this, I’ve written keyless-entry, which allows the user to easily configure a LUKS-encrypted… Read More »
[This is an updated version of Adding malicious IPs in DNSBLs to hosts.deny automatically which uses iptables instead of tcpwrappers, since tcpwrappers has been deprecated.] I run my own mail server, which means that there are hackers trying 24×7 to break into the server by connecting to my SMTP or IMAP server and trying to guess… Read More »
I have my Eastern Bank account configured to email me notifications about checking deposits. There are three problems with these notifications: (Century Bank’s online banking platform had the same problem. I was hoping things would approve in this area after the acquisition by Eastern Bank, but alas no.) This finally annoyed me enough today that… Read More »
I recently received a shipment of cat food from Petco which, as far as I know, I had not ordered. I did have a “repeat delivery” order scheduled for that variety of cat food, but usually when Petco is about to send you a repeat delivery order they notify you by email to give you… Read More »
Recent releases of GNOME on Ubuntu, and presumably in other distributions as well, finally support remote access to your GNOME desktop on both Xorg and Wayland from a VNC client. However, they do not allow you to connect to your desktop when it is locked, and similarly if your desktop locks — either because you… Read More »