Which steps you take to protect yourself online depend entirely on your personal threat model. I have tried to select…
Inspired by the Electronic Frontier Foundation’s Surveillance Self Defense, I have put together a five part course covering privacy and…
Attack surface is a term used in computer security to describe your vulnerabilities. It is simply the ways that you…
We have all had the frustration of software not working the way we want it to. Maybe it is an…
At a recent training that Mark and I did for the NHLA Paralibrarians section, we were ask a question about…
The National Institute of Standards and Technology is a US Government organization which does many thing including defining password standards…
Every Tuesday, except the last Tuesday of the month, I offer a tech class on various subjects. Not unusually, the…
Recently, I was browsing https://haveibeenpwned.com/ and found that one of my old email addresses had been involved in a data breach.…
At this year’s 2017 NHLA Spring Conference I participated in an ITS Roundtable session which featured a number of interesting…
With congress rolling back FCC privacy rules on ISPs, there has been a lot of interest in ways that you…