Brute Force Attacks: Password Strength Matters

Brute Force Attacks: Password Strength Matters

While movies frequently portray the hacker as a command-line cowboy, fingers flying across the keyboard as they work their computer magic against whatever foe they’re facing, hacking in reality is much more mundane. Directed attacks against specific entities are rare,...
Electronics Recycling: 3 Ways to Recycle Electronics

Electronics Recycling: 3 Ways to Recycle Electronics

With the amount electronic upgrades increasing worldwide each year, properly disposing of electronic waste (e-waste) is becoming even more important.  Whether upgrading a computer, gaming system, television or smartphone, ensure your business or household is not...
MARK 57 – THE RETURN OF FIREFOX

MARK 57 – THE RETURN OF FIREFOX

I love Mozilla Firefox, even if I stopped using it. When I first transferred to it back in the early 2000’s, it felt like being part of a secret club; a resistance against Microsoft and their Internet Explorer. I even carried around a copy on a USB thumb drive so that...
THE WPA2 KRACK

THE WPA2 KRACK

Without looking, can you tell me what security protocol your wi-fi is using? I can, but that’s because I’m a gigantic nerd; I’ve got the standard WPA2 encryption whizzing through my apartment. If you’ve recently installed a router or received a modem with built-in...
IT’S HALLOWE’EN – TIME TO KILL A ZOMBIE

IT’S HALLOWE’EN – TIME TO KILL A ZOMBIE

Do you know how to tell if your computer’s a zombie? It would be really convenient if we could check for the telltale rotting flesh and shuffling gate, but when it comes to computers, it can be very hard to tell when one has been zombified.Unless you’re brand new to...