leancode.com
Feedsparks | Leancode
http://leancode.com/feedsparks
Bernie’s small batches of software goodness. Ties together three Google services: a Google Gadget. Traffic statistics using sparklines generated by the Google Chart API. Track the historical readership of your blogs (that use Feedburner, and have the Awareness API turned on). Compare and track the readership of popular blogs, competitors, etc. When you see that a blog uses Feedburner for their feed, try entering the blog to see if the Awareness API data is public. For many, it is. Built on Google service...
saferidentity.blogspot.com
Safer Computing and Identity Protection: Good, bad and ugly passwords
http://saferidentity.blogspot.com/2009/03/good-bad-and-ugly-passwords.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Sunday, 22 March 2009. Good, bad and ugly passwords. A quick post about passwords only. Password theft is on the increase and weak passwords are going to cause you all sorts of trouble. A few simple rules will assist in making passwords harder to crack:. 1) use letters and numbers. 2) if possible use extra characters such as $, &, £,! So what is an example of a good password? Operat...
saferidentity.blogspot.com
Safer Computing and Identity Protection: Beware the cookie monster
http://saferidentity.blogspot.com/2009/04/beware-cookie-monster.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Thursday, 2 April 2009. Beware the cookie monster. Tracking cookies are undesirable and should be avoided, but cookies that remember your login. Cookies are designed to enhance your browsing experience. This is achieved by remembering what you looked at the last time you visited the website. It thus tries to gauge. Caution and common sense to all. Posted by Silent Mike. Opsec,wester...
saferidentity.blogspot.com
Safer Computing and Identity Protection: USB Keys and security
http://saferidentity.blogspot.com/2009/03/usb-keys-and-security.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Monday, 30 March 2009. USB Keys and security. Common Sense and Caution must always be exercised. Posted by Silent Mike. Subscribe to: Post Comments (Atom). Opsec,western opsec conference,opsec security. My Multiple Sclerosis and I. And here we go once more. Sysadmin and Netadmin on the Edge! NO, NO and again NO. Safer Identity Search box. McAfee Avert Labs Blog. Wish you were here!
saferidentity.blogspot.com
Safer Computing and Identity Protection: Business cards
http://saferidentity.blogspot.com/2009/03/business-cards.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Wednesday, 25 March 2009. Think about this for a while. The humble business card, paraded and deposited everywhere, offers a wealth of information to those intent on stealing an identity. What information does your business card hold about you? 2) your employer's name. 3) your contact details (telephone numbers, website URLs, email address, etc.). 4) your job title. The point I am t...
saferidentity.blogspot.com
Safer Computing and Identity Protection: Site and Server Certificates
http://saferidentity.blogspot.com/2009/04/site-and-server-certificates.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Monday, 6 April 2009. Site and Server Certificates. Do you trust site and server certificates? Are you sure you know what to look for? For this to be true, the self-signed certificate needs to be submitted to a certification authority (CA) who will check the legitimacy of the claim that the certificate is making. Thus, CA's. Are points of trust who investigate the claim of the certi...
saferidentity.blogspot.com
Safer Computing and Identity Protection: March 2009
http://saferidentity.blogspot.com/2009_03_01_archive.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Monday, 30 March 2009. USB Keys and security. Common Sense and Caution must always be exercised. Posted by Silent Mike. Friday, 27 March 2009. Perhaps we should be publicising Anti-phishing Phil. This is a website that teaches through the medium of play. Play the game and you will learn how to spot phishing URL's. Http:/ cups.cs.cmu.edu/antiphishing phil/. Posted by Silent Mike.
saferidentity.blogspot.com
Safer Computing and Identity Protection: Phishing
http://saferidentity.blogspot.com/2009/03/phishing.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Friday, 27 March 2009. Perhaps we should be publicising Anti-phishing Phil. This is a website that teaches through the medium of play. Play the game and you will learn how to spot phishing URL's. Http:/ cups.cs.cmu.edu/antiphishing phil/. Http:/ wombatsecurity.com/antiphishing phil/index.html. As always, please be cautious and apply common sense to your browsing and web usage. Iron ...
saferidentity.blogspot.com
Safer Computing and Identity Protection: IMPORTANT : DNSchanger threat
http://saferidentity.blogspot.com/2009/03/important-dnschanger-threat.html
Safer Computing and Identity Protection. Helping past, present and future victims of malicious software and identity theft. Friday, 20 March 2009. IMPORTANT : DNSchanger threat. The DNSchanger threat is not new, but it has resurfaced and is still annoying and dangerous. To completely comprehend the severity of this threat, it is important to understand the what, how and why of DNS. So, what is the DNS? How is it done? Why is it done? The range 85.112.0.0. To 85127.255.254. Posted by Silent Mike. My Multi...