KeePass and similar products like it will help users create strong passwords because it’s built into the program and the user doesn’t need to think about what characters to use and how to use them. The integrated Random Password Generator will allow users to define a specific set of password outputs. Another nice feature is…
Recently Atlanta-based Aaron's Rent-to-Own computer chain has been accused of installing monitoring software onto its computers. The software was able to track a customers' location, took photos using the computers' webcam, and also tracked all keystrokes using a keylogger. Unwary customers private information was sent to Aaron, everything from login credentials from emails to Facebook…
If you've ever tried to drive “up north” in Michigan during any one of the peak seasons (summer, hunting, snowmobile) you've no doubt encountered construction delays. With a constant need to maintain and upgrade, and little to no improvements made in time-to-completion and cutting overall costs, finally someone has challenged the status quo in the…
Windows Firewall can protect your computer from many types of online attacks. Although it may not protect you from getting viruses or malware; it can protect your system from running an application that has not been specifically allowed by you as the user. Some may think that firewalls are a nuisance but it is a…
User Account Controls primary design goal was to help protect a Windows computer, Vista and later, from programs attempting to make a major change. When UAC is active it prompts the user and asks the user if the change is valid. The design goals of UAC have been achieved since by default it is enabled…
Checking for a publisher or developers digital signature is very important from a security standpoint. Downloading a file that has not been verified from a legitimate source may cause issues because the file may need a host to wreak havoc on. Even worse, an unverified program that has been installed can do a number of…
Google stated that they intend on expanding Google Fiber to many more communities. However this is taking more time than they anticipated. There are some major obstacles that have slowed down and prevented Google from expanding its fiber network. Most of the time spent getting access to City resources is dealing with permits.You can get Google's fiber network…
ID Quantique is a small security firm based in Geneva, Switzerland. They specialize in quantum mechanics to boost data security. Their Quantum Key Distribution (QKD) is a method by which a sender transmits a key encoded with photons to a recipient. This is not new technology, this will protect data from hackers and is viewed…
Top reasons to upgrade to Windows 8.11. It takes up less space
Even though Windows 8.1 introduces many new features, it actually takes up less space than its predecessor, Windows 8. It takes about 8-15% less space.2. Searching
Windows 8 made it convenient to search for settings, content, apps and web searching. Windows 8.1 takes this to…
There is now a device that allows you to lock and unlock your door from anywhere. Installation does not require you to change anything about your existing setup. You can simply attach the Lockitron on top of your dead bolt lock. Then it will turn when your phone is near by or if you send…
Have you ever wanted to learn how to code in CSS, JavaScript or HTML? Well you're in luck because General Assembly has created a new online program that helps teach people how to code through a series of interactive storyline-based tutorials. Dash is convenient in that it works in your web browser. Dash teaches you…
Text Expansion utilities monitor your typing and trigger a set of rules when you type a predefined phrase or key combination. When you type those predefined phrases, the utility replaces your short version and replaces it with a longer phrase without requiring you to type the entire thing. This is very helpful for those that…