Episodes
[glossary_exclude]They assume perfection, and we all know how that goes.[/glossary_exclude]
by Leo A. Notenboom
(Image: DALL-E 3)
A phrase we've heard more and more often in recent years is encryption backdoor. The concept is simple: government agencies want to be able to monitor otherwise encrypted communications.
The concept is flawed.
[glossary_exclude]Encryption backdoors[/glossary_exclude][glossary_exclude]Encryption backdoors allow governments or other entities to access...
Published 11/21/24
Perfect security is a myth. What's important is to pay attention to the trade-offs you make.
Published 11/20/24
Not long ago, I came up with the words to describe part of what I do. It was kind of a secret... until now.
Published 11/18/24
Adding the most common and secure form of two-factor authentication to your account.
Published 11/16/24
Will a specific power supply or charger damage a device? I'll look at what's safe and what's not.
Published 11/15/24
Losing access to your Facebook account means losing everything within it forever. Make sure the important stuff is saved elsewhere.
Published 11/14/24
Initial panic about the Microsoft Recall feature is overblown. If you're worried about that, you're worried about the wrong thing.
Published 11/13/24
Commercial software can be expensive. Can you just pirate software if you can't afford it? You can guess my answer, but even better: theft isn't necessary.
Published 11/11/24
CHKDSK can't check an empty drive, and Windows considers RAW to mean empty.
Published 11/09/24
If your format happened quickly, it's unlikely your data was actually erased. I'll show you the difference.
Published 11/08/24
Having your email automatically or continually signed in to can be a security risk in some situations, but very convenient in others.
Published 11/07/24
Passwords are dying. On some services, you can start playing with the process by creating a secure password... and then forgetting it.
Published 11/06/24
Here are my latest recommendations for specific security software and techniques.
Published 11/04/24
This is a system designed to help you recover your email account if something should go wrong... and things go wrong more often than you would like to think.
Published 11/02/24
Numerous people and programs can track your internet activities. But are you really that interesting?
Published 11/01/24
When Windows tells you it's out of memory, what does it mean and what can you do about it?
Published 10/31/24
Many people are concerned that they are specifically targeted by hackers, advertisers, and others. Nope.
Published 10/30/24
Testing your backups is an easy step to overlook but an important one to take. Make sure your backups will be there when you need them.
Published 10/28/24
Backups are critical. But for how long? I'll look at how long you might want to keep backups, why, and how long I keep mine.
Published 10/26/24
Ping is one of the oldest diagnostic tools. It validates connectivity from point A to point B and provides additional useful information.
Published 10/25/24
It's not obvious, but there's an easy way to block all email sent to you from a single domain. Just make sure it's really what you want.
Published 10/24/24
For one thing, it doesn't back up Windows. For another it can make a mess of your folders.
Published 10/23/24
Conventional wisdom says to change your passwords periodically. I disagree.
Published 10/21/24
Programs typically don't use all available memory unless they need it or they have a problem.
Published 10/19/24