I warned a few days ago about Linksys routers being trivially easy to hack; unfortunately many other popular routers have security vulnerabilities too. The experts cited in the article have a few recommendations, which I will repeat and elaborate on.
If you’ve been paying any attention at all, you probably know that new PC sales are in the toilet–out of the five biggest vendors, the only one whose sales managed to hold steady in Q1 2013 was Lenovo, while the other four saw a sales decline. So now Slashdot linked to a ZDNet piece stating [...]
Anandtech has a review of the Micron M500, which is the first 960 GB SSD to retail for less than $600. Micron had to make some decisions to get that combination of capacity and price, so it’s not truly a no-compromises SSD, but like the article states, it’s a not-quite-a-terabyte capacity at the price that [...]
When you live in a neighborhood where everyone has a wireless network, you’ll struggle to get adequate coverage in every room of your home. That’s just the nature of wireless networking; we don’t have enough non-overlapping channels to cover everyone. I’ve heard a number of complaints lately that U-Verse isn’t reliable, but I’ve traced that [...]
Ars Technica posted an overview of asymmetric encryption recently.
Yesterday I wrote about the importance of encrypting documents before you send them via e-mail. But what if you don’t have a PDF creator, other than Microsoft Office or Open/Libre Office? It turns out you can encrypt PDF documents, including those you create with office software, for free–with caveats.
When you’re getting a loan, sometimes you have to send documents like bank statements electronically. If you want the money in those bank accounts to actually stay there, you need to protect those documents before you send them. There are three relatively easy ways to do it, depending on what software you and the person [...]
I’ve mentioned several times that I hadn’t seen Office 2010 yet, so I couldn’t comment on it, and would reserve judgment until I’ve seen it. I’ve been working for companies that were a bit behind the times on that. I’ve been working with it for a week now. I won’t be buying it for my [...]
Technology journalist Mat Honan infamously had his entire digital life hacked and erased this week. Slate published some advice to keep the same from happening to you, and my former classmate and newspaper staff mate Theo Hahn asked me to comment.
I saw the headline on Slashdot: Forensic evidence trying to prove whether MS-DOS contained code lifted from CP/M. That got my attention, as the connection between MS-DOS and its predecessor, CP/M, is one of the great unsolved mysteries of computing. Unfortunately, the forensic evidence doesn’t prove a lot.