On Saturday, Dropbox had a major security breach for four hours, effectively allowing anyone to log into any Dropbox account without knowing the password. The glitch was fixed moments after it was discovered and less than 1% of users were potentially affected. Nevertheless, the incident raises security concerns.
An article in Lifehacker details how to add a second layer of security to your Dropbox account using programs such as TrueCrypt.
This blog is where I share tips, tricks, and tools in hopes of helping others to use technology more safely, securely, and successfully.
Tuesday, June 21, 2011
Tuesday, June 14, 2011
How to manually import an NK2 file into Outlook 2010
If you want to manually import an Outlook 2007 or earlier NK2 (nickname database) file into Outlook 2010, read this article.
Friday, June 3, 2011
How to protect your Facebook sessions from being hijacked
Users of Facebook beware! There is a new Android app called FaceNiff that can hijack Facebook sessions in one tap.
To protect yourself, enable HTTPS in your account settings.
To protect yourself, enable HTTPS in your account settings.
Automatically assigning applications to Windows domain computers
If there's an application that you want to automatically install on every computer in your Windows domain, read this article.
I'm currently in the process of implementing automated installation of LogMeIn remote access software on every workstation in the domain at a couple of client sites. One site uses Windows SBS 2003, which has its own way of assigning applications. The other site does not have SBS; just Windows Server 2003. At that site, I used the method described in the article referenced above and it worked perfectly.
I'm currently in the process of implementing automated installation of LogMeIn remote access software on every workstation in the domain at a couple of client sites. One site uses Windows SBS 2003, which has its own way of assigning applications. The other site does not have SBS; just Windows Server 2003. At that site, I used the method described in the article referenced above and it worked perfectly.
Subscribe to:
Posts (Atom)