Why you should not use RegScale
Companies that engage in slimy marketing practices tend to be slimy companies. RegScale fits that description, so you should avoid doing business with them.
Companies that engage in slimy marketing practices tend to be slimy companies. RegScale fits that description, so you should avoid doing business with them.
Twitter is in the news again with another security breach in which 235 million users’ email addresses, phone numbers, and Twitter handles were exposed. These seems like a good opportunity to talk about what you can / should do to protect yourself if you need to maintain anonymity online. The basic rule is this: if… Read More »
I’ve worked almost entirely for startups for the past 30+ years. It’s what I love, but switching jobs a lot comes with the territory. One of the problems I face with each switch is how to take with me outside contacts I’ve made, without compromising my soon-to-be-ex-employer’s intellectual property. Sure, I’ve added some of them… Read More »
[This is an updated version of Adding malicious IPs in DNSBLs to hosts.deny automatically which uses iptables instead of tcpwrappers, since tcpwrappers has been deprecated.] I run my own mail server, which means that there are hackers trying 24×7 to break into the server by connecting to my SMTP or IMAP server and trying to guess… Read More »
Dear sales representative who wants me to buy your company’s products, If I’ve emailed you a link to this blog posting, it’s probably because you’ve sent me multiple unsolicited sales emails. Welcome to the club of vendors from whom I’m unlikely to ever purchase anything! No unsolicited sales email I have ever received from a… Read More »
Because I’m senior enough to have “spending authority,” an unfortunate fact of life for me at work is that I get a lot of cold sales emails. Most of them I just delete or report as spam, but occasionally I get one that is so ridiculously bad or offensive that I feel I must address… Read More »
I received this email at 1:15 this morning: When I saw it this morning, I was confused. I have never before received an email from “loyaltygateway.com”, and I was asleep at 1:15am, not placing an “order” to be confirmed by this email as its subject implies. It sure looks like spam, right? Well, it turns… Read More »
Generating pointless alerts that users can’t do anything about decreases security for everyone.
In late 2015, 15 million T-Mobile customers learned that they had been victims of a two-year security breach at Experian. Since then, the 150-million victim Equifax breach has made the Experian breach look kind of puny, but at the time it became public it was a Big [expletive] Deal. Of course, a class-action lawsuit was… Read More »
The Thunderbird team needs to figure out how to make it possible for extension maintainers to port their extensions to newer Thunderbird versions without a huge amount of effort. Many Thunderbird users rely on extensions, and they are going to keep using Thunderbird 60 until the extensions they rely on are supported in newer versions.