Category: Security

Security is an important topic when it comes to technology. There are many different areas of security, so this category is divided into various sub-categories to help navigate through the posts on security.

  • 5 Tools to Test Your Browser for Vulnerabilities

    5 Tools to Test Your Browser for Vulnerabilities

    Everybody knows how important it is to protect our computers from viruses, malware and spyware. Keeping all your software patched and installing a good anti-virus and a reliable firewall is a start, but it’s not enough. You should also keep an eye on the most vulnerable part of your computer – your browser.

    No matter which browser you use and how secure you think it is, there are always weak spots. These can be code vulnerabilities, insecure add-ons, ActiveX controls and so on. In short, there are hundreds of ways your computer can be infected through your browser. Fortunately, a lot of browser vulnerabilities can be fixed if you know where they are. Here are five tools that will help you test your browser  and firewall for vulnerabilities and give you advice how to fix them.

    (more…)

  • How to Protect Your Identity While Online

    How to Protect Your Identity While Online

    Identity theft is a major issue, and has been increasing with alarming regularity in the past few years. Along with identity theft, there is also the possibility of someone also using your financial accounts to purchase items online. While it may be impossible to completely stop someone from getting at your information, there are several things that you can do to help protect yourself while online.

    (more…)

  • Online Security: Be Smart and Stay Safe

    Online Security: Be Smart and Stay Safe

    Online security is something that is in the back of many people’s mind when they access the Internet. Many people may not perform financial transactions online because they fear those transactions could be compromised.

    While not everyone is comfortable performing transactions online, those that do need to ensure they take every precaution to avoid losing money, their identity or more while online. Below I list several steps that you can take to ensure you remain vigilant and stay safe while online.


    Online Security: Be Smart and Stay Safe

    1. Use a more secure DNS server.

      When someone accesses the Internet from my home, they are restricted to what websites they can visit. While I don’t stop people from visiting popular sites such as Facebook or YouTube, I do prevent them from visiting known phishing sites or torrent sites. My network, my rules.

      If you have children that access the Internet from your home, you may want to look into restricting sites via your DNS connections in your router. You can do this by pointing the DNS settings to OpenDNS, and then restrict the sites that you don’t want someone visiting via your Internet connection.

      By using more secure DNS servers, anyone accessing your Internet connection will be prevented from visiting malware, phishing or illegal sites. The only way somone can get around this protection is to stop using your router to access the Internet.

      I talk about how I secure my Internet connection by changing DNS servers, and how it works to keep my Internet connection secure.

    2. Always use unique long passwords.

      Most people will probably use the same user name and password for all websites that require registration. This makes life easier for them as it doesn’t require them to remember many different passwords.

      For hackers, all they would need to do is figure out a password for one site, and then use that same password for other sites. If you also use the same user name, then many of your online accounts could easily be compromised.

      The best method of avoiding such a problem is to use long (12+ characters), and unique passwords for each site. I talk about using LastPass to manager your passwords in a previous post.

    3. Where available, use two-factor authentication.

      This idea is probably new to most people. The basic idea behind two-factor authentication is using two pieces of information to authenticate your login on a website.

      We are all familiar with entering a user name and password to authenticate. Two-factor authentication will add an additional authentication method in addition to a user name and password. YubiKey enables two-factor authentication, and I currently use it today.

      By enabling two-factor authentication on websites that allow it, you make it harder for someone to access your account. While someone may know your user name and password, the won’t be able to bypass the additional authentication factor.

    4. Don’t ignore browser warnings.

      Every modern web browser displays warnings if it detects an issue with the site. Everything from invalid security certificates to known phishing sites will produce a warning message in the browser window.

      It is important for you to understand these messages, and determine the proper course of action to take. Simply ignoring such message could compromise your personal information.

      On a related note: no financial institution will ask for your personal information through e-mail. This message has been repeated countless times online, but unfortunately people still access phishing sites through e-mail. If you get such an e-mail, delete it and don’t click through the link within the message body.

    5. Only enable Javascript for trusted sites.

      Javascript executes on your local system, so many people have figured out how to use Javascript to do harm. The best defense against this is to disable Javascript for all sites, and only enable it for when you really need it.

      Fortunately, there are web browser plugins that can help you with this chore. NoScript for Firefox is probably the most popular one that allows you to selectively enable Javascript for each site. By using this plugin, you will receive a message that certain scripts have been disabled. You can then enabled the scripts, if you trust the site that you are visiting.

    The real key to staying secure online is to use common sense. By using common sense while online, you can prevent many of the problems that could occur while you are visiting sites online.

  • YubiKey – The Key to Online Security

    YubiKey – The Key to Online Security

    I am constantly looking for ways that I can remain as secure as possible while online, and YubiKey seems to be a great addition to my security procedures. The one thing that I have been doing is creating secure passwords for all my online identities. I am currently using LastPass to manage my passwords, and it has made my job of managing passwords so much easier.

    About a month ago I have also learned about a product that will help make some of my logins even more secure than just a good password – the YubiKey. What is this product, and how does it work? Let me explain.

    (more…)

  • LastPass – The Ultimate in Password Protection

    LastPass – The Ultimate in Password Protection

    I recently needed a way to manage my passwords, and decided to give LastPass a try. A few months ago I was tired of remember my passwords, and on top of that I wanted to create more unique passwords. You probably know how hard it is to keep passwords straight for many applications, so I began search for a password management solution.

    After doing some reading I discovered a tremendous service called LastPass. For the past few months I have been using this service I have been impressed with how well it manages my passwords, and makes it very easy for me to login to various locations with different passwords.

    (more…)

  • Increase Online Privacy and Protection: Top Add-ons for Mozilla Firefox 4

    Increase Online Privacy and Protection: Top Add-ons for Mozilla Firefox 4

    Mozilla Firefox 4 is a great web browser to use—not only is it fast, but thanks to its strong anti-phising filter, it can help protect users from a variety of cyber threats, including hackers and viruses. But just because Fire Fox 4 is one of the leading web browsers doesn’t mean users shouldn’t take caution when surfing the internet.

    In fact, users should go one step further and boost their privacy protection by downloading add-ons—extensions that are designed to improve Firefox’s performance and efficiency.

    (more…)

  • How to Understand the Legality of Electronic Signatures

    How to Understand the Legality of Electronic Signatures

    Electronic signatures are a commonly misunderstood technology.

    Many people are simply not aware of the legal validity of e-signatures and believe there may be privacy or security concerns with signing documents online.

    However, the fact is an e-signature carries the same legal weight as a traditional wet-ink signature, and the document is considered to be legally binding once an e-signature is affixed to it.

    Electronically signed documents are stored in a database for both parties to access at any time and follow a strict set of guidelines regarding their application, distribution, and legality.

    (more…)

  • Functions and Resources of Memory Card Data Recovery Software

    Functions and Resources of Memory Card Data Recovery Software

    Without a dependable, preexisting data backup system, recovery from memory card failures, and the resultant data loss can be expensive and near to impossible. At times, even the best data recovery technicians encounter insurmountable complications. But do not despair. Sometimes the process of memory card data recovery can be as simple as rightly applying the correct memory card data recovery software.

    Data recovery solutions come in three formats: 1) Hire a data recovery specialist, 2) Purchase professional data recovery software, or 3) Download a free data recovery software package. This article addresses the second two methods of memory card data recovery.

    Concept of Data Recovery

    SD Memory Card

    Flash memory has a limited number of write cycles. Writing zeros to the location of a deleted file would senselessly reduce the life of the memory card. Thus when files are erased, the system merely modifies the file directory so that the file seems no longer to exist.

    In seeking to squeeze the most possible write cycles out of a flash card, the system applies equal usage to ever area of the card. Before deleted file space is reused, the remainder of the flash chip must be filled up.

    This overwrite process is very useful for flash memory card data recovery. In fact, this is a best-case scenario for file recovery. Unless the memory card is physically unreadable, the right software, correctly applied, can help you recover lost data.

    Most every data recovery software package addresses the same issues with similar methods. They go after the underlying data by ignoring the conventional Windows file system. They typically work out of RAM memory so as to avoid any risk of writing data to the target drive or flash memory card. Use them to:

    • Fix partition tables
    • Recover deleted partitions
    • Recover boot sectors
    • Fix FAT tables
    • Rebuild NTFS boot sectors
    • Undelete files
    • Copy deleted files to new sources
    • Repair MFT using MFT mirror
    • More.

    Memory Card Data Recovery Software

    I make the following software lists for reference rather than for detailed application processes. All are considered effective data recovery packages.