Cybersecurity Cyber Disinformation Month Wrap-Up Cybersecurity Awareness Month is in the mirror officially. This is my "Disinformation" wrap-up post for all the bad ideas you may have heard this month.
Cybersecurity What Driving Can Teach Us About Cybersecurity Who are you sharing the road with? Is their security program even drivable? Do they even have a license? There's plenty to think about as we look at what driving can tell us about cybersecurity.
Cybersecurity Bad Cybersecurity Advice Don't scan QR codes! Use an email to log in! Look for misspellings in emails! Just stop, please?
Cybersecurity Powerful Yet Overlooked - DNS as a Security Solution Almost nothing you do online works without DNS. It is ubiquitous. But have you ever thought about DNS as part of your security program? Controlling how it is used can make a significant impact on your environment.
Linux GRUB's No Good, Very Bad, Day (at the hands of Microsoft) A new Microsoft patch - for a 2 year old vlun - is preventing dual-boot computers from booting Linux. Monopolies at work again. Let's break that cycle.
Cybersecurity Lather, Rinse, Repeat - the Never Ending Cycle of Good Cybersecurity Like your doctor says when you go in for that annual physical you skipped: eat more veggies, get more exercise, sleep well. The same holds true for good cybersecurity - it's the repetitive, boring stuff that often matters most.
Cybersecurity The Internet of (Crap) Things Everything today from your furnace to your toilet can be Internet connected, but why do it? If you do connect them, how do you do so securely?
Linux First Activities On Your First Linux Computer Just like with any brand new tech, there are some setup things to be done. Here's a good checklist for that first couple activities on your new (or newly installed) Linux computer.
Linux Installing Linux For the First Time Installing Linux for the first time can feel daunting. It's also quite freeing and rewarding. Let's get you started.
Personal To Sync Or Not To Sync... That is the question. Do you trade private data for convenience or not?
Personal Want Private, Secure Communications? Your Choices Are Limited Your email service reads your emails. Your test messages are plain-text. Your phone calls can be tapped. How do you communicate securely and privately?
Cybersecurity The Fallacy of a Safe Encryption Backdoor Governments the world over want mandatory backdoors into encrypted communications. But there's no such thing as a secure way to do this.
Personal Opt-In Vs Opt-Out, Consent In Privacy There is no privacy online without informed consent. But then there's also the opt-in, opt-out dilemma. And since opt-out favors the people who want your data, well...
Cybersecurity Now Is the Time For a Password Manager We gave people advice years ago on how to create strong passwords themselves. That advice is outdated, it's time for a password manager.
Personal When Your Choice Impacts My Privacy Copilot+ Recall might be fine for you, but if I'm sharing any data with you your choice impacts my privacy. And that's just one example.
Linux If You've Ever Bought a Computer You Have All the Skills You Need To Run Linux Linux has a reputation as being too complicated for regular users. That's a myth that needs dispelling.
Linux This Is the Time To Leave Windows For Good Copilot Recall. Windows 11 won't support your older computer. Ads in the start menu. These are the signs telling you it is time to leave Microsoft's OS.
Cybersecurity Why Won't He Stop Talking About Linux? I warned you at the beginning I'd talk Linux. This first article on the subject hopefully explains why.
Personal Generative AI and You GenAI has come to all of our lives in the form of AI enhanced web searching. But bad experiences with this form of AI shouldn't be used to paint the entire ecosystem.
Personal What I Miss From Computing's Past Nostalgia is fun and all, but instead let's take a look at actual benefits from computing's past that we seem to have forgotten about in modern computing.
Cybersecurity No, It Wasn’t a Nation-State Actor. Really. Think it was a nation state malicious actor? Think again. so many more likely causes for that outage you're concerned about. Honest.
Cybersecurity Post LastPass Breach - Real Consequences, Real Lessons LastPass was breached, and your passwords may be compromised. But password managers are still critical for security, in both personal and professional settings.
Personal The Social Media Dichotomy - Public Privacy Elon Musk has begun his tear-down of Twitter. TikTok is a punching back for politicians who want to appear tough on privacy. There are options.