Tag Archives: Password

Locked Out Of WordPress By A 1Password Feature

As I had mentioned in my previous post, I had been locked out of my new WordPress instance earlier today.  After a little digging, it turns out that it was related to a 1Password feature.  I do love 1Password and I … Continue reading

Posted in 2 Geek, Passwords, Security | Tagged , , , | Leave a comment

NFC: Near Field Communication – A Primer

NFC or Near Field Communication is a technology where small amounts of data can be transferred from one NFC-enabled device to another. In many ways, NFC is similar to RFID (Radio Frequency Identification) which has been in use for many … Continue reading

Posted in 2 Geek, Gadgets, Google, Hardware, Medical, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Secure Shell: Part 1- The Basics

In our technological infancy, no one really was very concerned about security. Use of the telnet application was the common method used to establish text-based connections to remote systems. The downside of telnet is that all of the traffic (usernames, … Continue reading

Posted in 4 Geek, Linux, Mac, Security, Software, Software Engineering, Technology, Uncategorized, Windows | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Kindle Fire: Unboxing and First Impressions

As indicated in an earlier post, I pre-ordered a Kindle Fire.  It arrived safely today.  Here are a few photos of the unboxing process.  I was amused by the packaging which made it look as though it was packed specifically … Continue reading

Posted in 1 Geek, Amazon, Gadgets, Hardware, iPad, Kindle Fire, Review, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Securing Your Wireless Network

Over the last few years, there has been a significant increase in the number of people arrested for various crimes because someone used their unsecured wireless network to perform illegal activity. Open access points can also allow criminals to access … Continue reading

Posted in 3 Geek, Hardware, Security, Technology, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , | Leave a comment