Brute Force Attacks: Password Strength Matters

Brute Force Attacks: Password Strength Matters

While movies frequently portray the hacker as a command-line cowboy, fingers flying across the keyboard as they work their computer magic against whatever foe they’re facing, hacking in reality is much more mundane. Directed attacks against specific entities are rare,...
Electronics Recycling: 3 Ways to Recycle Electronics

Electronics Recycling: 3 Ways to Recycle Electronics

With the amount electronic upgrades increasing worldwide each year, properly disposing of electronic waste (e-waste) is becoming even more important.  Whether upgrading a computer, gaming system, television or smartphone, ensure your business or household is not...
MARK 57 – THE RETURN OF FIREFOX

MARK 57 – THE RETURN OF FIREFOX

I love Mozilla Firefox, even if I stopped using it. When I first transferred to it back in the early 2000’s, it felt like being part of a secret club; a resistance against Microsoft and their Internet Explorer. I even carried around a copy on a USB thumb drive so that...
THE WPA2 KRACK

THE WPA2 KRACK

Without looking, can you tell me what security protocol your wi-fi is using? I can, but that’s because I’m a gigantic nerd; I’ve got the standard WPA2 encryption whizzing through my apartment. If you’ve recently installed a router or received a modem with built-in...