I ran across Tom Olzak’s post where he quotes from an SANS article by Daniel Wesemann, Password rules: Change them every 25 years. I disagree with both of them on a few points.
First, Olzak notes in his introductory paragraph that
Continue reading →
Filed under Security
Tagged as 30 60 90, brute force, change, complex, daniel wesemann, encrypted, hashed, keylogger, passphrase, password, phishing, sans, sharing, shoulder surf, social engineering, strong, tom olzak, two-factor, write down
Keir Thomas, author of several books on Ubuntu, including the Ubuntu Pocket Guide and Reference, declares that Firefox has lost its way. He says that the fox is slow and Slashdot users are complaining about it heavily.
Leave a comment
Tagged as 15 must see sights in google earth, browser, browser security handbook, chad perrin, chrome, distro, Firefox, Gmail, google, keir thomas, maps, open source, phone home, pocket guide, privacy, rogue site, Security, security implications, slashdot, snoop, Technology, tom olzak, ubuntu, wars, wikipedia
Enter your email address to to be notified of new posts by email.
Join 1,275 other followers
Sign me up!
New IT Auditors Start Here
Excel: Basic Data Analytics
Ask a Question
Reader Poll: Who R U?