by Mark Costlow | May 17, 2019 | News, Our Blog, Reviews, Tips and Tricks
Sometimes a real-world object is the answer to a virtual-world problem. We manage data backups for one of our clients. If you have ever done that job for even a small network, you know it can be a challenge. The ideal situation is for it to quietly copy all the...
by jnelson | May 4, 2019 | News, Online Tools, Our Blog, Resources, Security, Tips and Tricks, Warnings
Passwords are a drag. They are seen by many users not as the first barrier to keep out bad guys, but as an obstacle to the user’s convenience. The rules have been complicated, obscure, and frankly, many seem ridiculous and more trouble than help. NIST, the...
by jnelson | May 24, 2018 | News, Our Blog, Security, Tips and Tricks, Warnings
Facebook founder Mark Zuckerberg does it. Former FBI Director James Comey does it, too. And SWCP Vice President Jamii Corley has been doing it for decades. They all cover up the lens of the camera in their laptop to make sure that someone is not spying on them with...
by jnelson | Jan 23, 2016 | News, Tips and Tricks
UPDATE, Feb. 6, 2016 – It’s starting to look like the reason Microsoft is so determined to move users to Windows 10 is that it is essentially spyware. One independent researcher installed it on a test PC with all telemetry and feedback turned off, and found that...
by Jamii Corley | Jul 31, 2015 | Encryption, How the Net Works, Interesting Items, Resources, Security, Tips and Tricks
In our last post we showed you how to install the Mailvelope browser extension and generate PGP public and private keys, and how to import someone’s public key. Now we’d like to actually use this structure to send encrypted email. At this point if you use...
by Jamii Corley | Jul 31, 2015 | Encryption, How the Net Works, Interesting Items, Resources, Security, Tips and Tricks
In that last few years we’ve come to see more and more that things we thought were private, simply aren’t. Whether it is companies that want to sell you things, the government wanting to find terrorist plots, or thieves looking for personal data to aid...