Creating Secure Passwords Part II

A few months ago on the Security Now episode 303 on the TWiT podcast  network Steve Gibson talked about a new way of thinking about passwords. Steve said entropy (lack of pattern or organization; disorder) was important but length was much more important. (As it turns out length does matter.) What this means is you can have passwords you can…

Cloud Computing and Web 2.0 What is it?

In the early days of the Internet it was all email and text chat. Even the games were text. An early website Then came the World Wide Web and a whole new world open up. You could go to pages read the text look at pictures from far away lands. Later they gave use silly…

Taming Your Inbox

Email is suppose to be tool to make your life easier not harder. Somehow that just doesn’t seem to be the case. Someone ask you, “Did you get my email?” You say, “What email? My Inbox is such a disaster I don’t know if I got it or not.”

Secure Surfing

Who uses public available WiFi hotspots? What is HTTPS and TSL ? One way to crack sites using HTTPS is guessing passwords, so use strong passwords. What is broken on secure sites? Unencrypted session cookies. A hacker using a packet sniffing program can capture those unencrypted session cookies.