Category Archives: Security

Apple’s iPhone X Announcement: Evolution or Revolution?

As the early adopter of technology that I am, I patiently wait for the announcements from Apple.  Today was was the first announcement made from the new Steve Jobs Theater on the new Apple campus.  With this being the 10th anniversary … Continue reading

Posted in 1 Geek, Apple, Gadgets, Hardware, iOS, iPad, iPhone, Review, Security, Software, Verizon | Tagged , , , , , , , , , | Leave a comment

Locked Out Of WordPress By A 1Password Feature

As I had mentioned in my previous post, I had been locked out of my new WordPress instance earlier today.  After a little digging, it turns out that it was related to a 1Password feature.  I do love 1Password and I … Continue reading

Posted in 2 Geek, Passwords, Security | Tagged , , , | Leave a comment

iPad New: Unboxing, First Impressions and a Fix for the Verizon Data Signup Email Issue

After patiently waiting for more than a week, the new iPads have arrived!  Packaging for the new version of the iPad is quite similar to the old one.  Unless you look closely, the box is almost indistinguishable from the previous … Continue reading

Posted in 1 Geek, Apple, Gadgets, iPad, Security, Technology, Uncategorized, Verizon | Tagged , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

NFC: Near Field Communication – A Primer

NFC or Near Field Communication is a technology where small amounts of data can be transferred from one NFC-enabled device to another. In many ways, NFC is similar to RFID (Radio Frequency Identification) which has been in use for many … Continue reading

Posted in 2 Geek, Gadgets, Google, Hardware, Medical, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Secure Shell: Part 1- The Basics

In our technological infancy, no one really was very concerned about security. Use of the telnet application was the common method used to establish text-based connections to remote systems. The downside of telnet is that all of the traffic (usernames, … Continue reading

Posted in 4 Geek, Linux, Mac, Security, Software, Software Engineering, Technology, Uncategorized, Windows | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

WPS Security Vulnerability: Ease of Use -> Less Secure

Several weeks ago, a security researcher by the name of Stefan Viehbock identified a pretty serious vulnerability in the WPS (Wi-Fi Protected Setup) protocol that is supported by most consumer-grade wireless routers produced over the last several years. Although I … Continue reading

Posted in 3 Geek, Apple, Gadgets, Hardware, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

Removing Microsoft Windows Updates: A Temporary Solution to Restore Productivity

Although most often harmless to existing installed software and computer configurations, occasionally, Microsoft Windows updates can negatively impact your system. It isn’t possible for Microsoft to test every combination of hardware and software prior to shipping these updates. Often, these … Continue reading

Posted in 3 Geek, Security, Software, Technology, Uncategorized, Windows | Tagged , , , , , , , | Leave a comment

Kindle Fire: Unboxing and First Impressions

As indicated in an earlier post, I pre-ordered a Kindle Fire.  It arrived safely today.  Here are a few photos of the unboxing process.  I was amused by the packaging which made it look as though it was packed specifically … Continue reading

Posted in 1 Geek, Amazon, Gadgets, Hardware, iPad, Kindle Fire, Review, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Information Security: Lock It Up or Shred It

Every person possesses documents that should be shredded or otherwise destroyed when no longer needed. For the average consumer, the items that should be shredded include old bank statements, old credit cards, credit card receipts, bills, old tax records or … Continue reading

Posted in 1 Geek, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Securing Your Wireless Network

Over the last few years, there has been a significant increase in the number of people arrested for various crimes because someone used their unsecured wireless network to perform illegal activity. Open access points can also allow criminals to access … Continue reading

Posted in 3 Geek, Hardware, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , | Leave a comment