[The technique described here is obsolete. Please see this update.] I’ve recently started using a YubiKey NEO for two-factor authentication for sites that support it.1 Because I am using my YubiKey for more and more sites, I tend to leave it plugged in whenever I am in front of a computer for an extended period… Read More »
As I wrote recently, Netgear introduced a severe bug into their router firmware around seven months ago, making all newer firmware releases since then unusable for many router owners. In the intervening time, numerous severe security holes in their routers have been publicized and patched by them. However, those of us who are running into… Read More »
Almost 11 years ago, back in August 2007, I opined passionately here on my blog, “Why I will no longer buy from Netgear“. Alas, I recently failed to heed my own advice, and I’m sorry to say that the results have been somewhat predictable. Last September, I found myself in need of a new router… Read More »
A legitimate email from AT&T does its level best to masquerade as a phishing email.
The Equifax breach is a big deal. There are things you need to do right now to protect yourself.
This blog posting is obsolete. I’ve moved everything over to Github. There are a lot of new goodies there that aren’t here, so mosey on over and check it out. I’ve been using CrashPlan for Home for about five years. Alas, their Home product is being discontinued, and people who want to keep using CrashPlan… Read More »
Where I work, we have employees who use (in decreasing order of popularity) Mac OS, Windows, and Linux as their desktop computers. We’ve deployed a large, complex remote administration / MDM application for managing the Mac OS and Windows desktops. It’s big and complicated and difficult to maintain. It does much more than we will… Read More »
The best way to configure Ubuntu for an encrypted root filesystem is to tell the installer to do it when you’re installing the operating system. It’s complicated, and smart people have put a lot of effort into making the installer know how to do it properly. Having said that, if you’re an experienced Linux sysadmin… Read More »
I was victimized by GameStop’s security breach back in October, and again now. I hope it puts them out of business.
Migrating all of your 2fa codes to a new smartphone is a huge pain. Here’s one way you can make it easier.