Security Corner:

September, 2012

1

September 30, 2012  9:41 PM

Humor: How to destroy a hard drive in three easy steps



Posted by: Ken Harthun
Data destruction, Humor, Security, Tools

Couldn't resist a bit of Sunday humor... If you are looking to thoroughly and securely wipe a hard drive, here's how to do it:

  1. Build a huge Tesla coil (a least 1 million volts);
  2. Place hard drive as shown in illustration below;
  3. Run Tesla coil for at least one...

September 29, 2012  2:15 PM

Honest Geek prevents potentional personal data disaster



Posted by: Ken Harthun
Encryption, Security, Security best practice

[caption id="attachment_1670" align="alignleft" width="158"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 29, 2012  12:38 AM

Send private data securely



Posted by: Ken Harthun
Security

In my job as a Network Administrator, I'm constantly called upon to reset passwords to email, network shares and sensitive corporate resources. Up to now, it has been my standard procedure to transmit passwords and other login information only by phone, but this is tedious and time-consuming and...


September 23, 2012  8:44 PM

Carry your passwords in your wallet



Posted by: Ken Harthun
Password, Security, Security best practice, Security management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 21, 2012  1:48 AM

A portable app to password protect your USB sticks



Posted by: Ken Harthun
Encryption, Password, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 12, 2012  3:49 PM

Track your stolen laptop or phone



Posted by: Ken Harthun
Security, Theft alarm

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 10, 2012  3:48 PM

Humor: The History of Spam



Posted by: Ken Harthun
Security, spam

Hilarious! And just what the doctor ordered for a stressful Monday... [brightcove]


September 7, 2012  1:59 AM

How to protect your password manager?



Posted by: Ken Harthun
Password, Secure Computing, Security, Security best practice, Security management

If the bad guys already know how to get your "clever" passwords, what kind of password do you put on your password manager? You can't risk their getting...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: