background preloader

Jaredrepka

Facebook Twitter

How To Choose a Strong Password » Information Security. For more information on choosing strong passwords visit the BU’s IS&T page General Guidelines: So, how do you have a “strong” password that is easy to remember?

How To Choose a Strong Password » Information Security

While it may seem tough to do this, there are a few simple tips that can make it easy.Note: the examples below illustrate just the concepts being discussed. World's Biggest Data Breaches & Hacks. Top Five Recommendations for Mitigating the Effects of DDoS Attacks - Slide 2. As with all incident response plans, advance preparation is key to rapid and effective action, avoiding an “all-hands-on-deck” scramble in the face of a DDoS attack.

Top Five Recommendations for Mitigating the Effects of DDoS Attacks - Slide 2

A DDoS response plan lists and describes the steps organizations should take if its IT infrastructure is subjected to a DDoS attack. Increasingly, Corero is seeing that DDoS attacks against high-profile targets are intelligent, determined and persistent. This new breed of highly capable attackers will switch to different attack sources and alternative attack methods as each new attempt is countered or fails. It is therefore essential the DDoS response plan defines when and how additional mitigation resources are engaged and surveillance tightened. Is The Cloud Secure? - Minneapolis, St Paul, Edina. One of the biggest concerns companies have when considering moving their business to the cloud is privacy and security.

Is The Cloud Secure? - Minneapolis, St Paul, Edina

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites. “Don’t do your online banking or anything sensitive on a public Wi-Fi network.”

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites

The advice is out there, but why can using a public Wi-Fi network actually be dangerous? And wouldn’t online banking be secure, as it’s encrypted? There are a few big problems with using a public Wi-Fi network. The open nature of the network allows for snooping, the network could be full of compromised machines, or — most worryingly — the hotspot itself could be malicious. Snooping Encryption normally helps protect your network traffic from prying eyes. Authentication. Authentication (from Greek: αὐθεντικός authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (datum) or entity.

Authentication

In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity. It might involve confirming the identity of a person by validating their identity documents, verifying the validity of a Website with a digital certificate, tracing the age of an artifact by carbon dating, or ensuring that a product is what its packaging and labeling claim to be. In other words, authentication often involves verifying the validity of at least one form of identification. Methods[edit] Authentication has relevance to multiple fields. How Faraday Cages Work. Electricity is the lifeblood of many aspects of our world.

How Faraday Cages Work

Without volts and amps, many of our technological innovations would cease to exist. Even our bodies wouldn't function without an electrical charge zipping through our cells. But what electricity gives, electricity can take away. What is the Deep Web?A first trip into the abyss. IT Disaster Recovery Plan. Businesses use information technology to quickly and effectively process information.

IT Disaster Recovery Plan

Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. Servers process information and store large amounts of data. Desktop computers, laptops and wireless devices are used by employees to create, process, manage and communicate information. Create a retro game console with the Raspberry Pi. The projects people have created with the Raspberry Pi are truly incredible.

Create a retro game console with the Raspberry Pi

USB Type-C: One cable to connect them all - CNET. Look around your house and chances are you that have a least a few devices equipped with Universal Serial Bus (USB) cables.

USB Type-C: One cable to connect them all - CNET

On average, some 3 billion USB ports are shipped each year, by far the most successful type of peripheral connection. In recent years, though, USB's competition has intensified and it now trails behind the new Thunderbolt standard both in speed and ease of use. This is the gap that the latest USB development, USB Type-C, finalized just earlier this month, intends to fill. Before you can understand USB Type-C, however, you need to know the difference between USB Type-A and Type-B, and tell between the various versions of the USB standard. Generally, the version refers to the speed and functionality of the USB cable, while the USB Type refers to the physical shape and the wiring of the ports and plugs.

USB Type-A.

Avoiding Spam Calls

7 best practices for smartphone security - Page 7. Understanding OAuth: What Happens When You Log Into a Site with Google, Twitter, or Facebook. Two-factor authentication: What you need to know (FAQ) You may not know it, but you probably already use two-factor authentication in the physical world.

Two-factor authentication: What you need to know (FAQ)

This explanation of what it is should help convince you why it's a good idea to use it with mission-critical online services, too. Two-factor authentication, or 2FA as it's commonly abbreviated, adds an extra step to your basic log-in procedure. Without 2FA, you enter in your username and password, and then you're done. The password is your single factor of authentication. The second factor makes your account more secure, in theory. "Twitter made the decision to use SMS [to deliver its second factor] because it makes sense from their position," said Jon Oberheide, chief technology officer of Duo Security, which uses apps to prove identity. But Twitter has faced some backlash, he said, because many of the highest-profile Twitter hacks have been against corporate Twitter accounts. How to stay safe online: CNET's security checklist.

It's always better to be safe than sorry. Especially when it comes to your personal information. Keeping your info secure online requires you to take more time and care, but what you lose in moments you'll surely make up in peace of mind. Follow the steps below to increase your online security. Protecting your password. Toastmasters International -Public Speaking Tips.