Tag Archives: Google Authenticator

Howto: Share Files Securely/Privately

Background The joint concepts of Secure and Private are relative and subjective. Relative in that there are very few absolutes, but there are an infinite number of variations that may be better or worse. Qualifying “better or worse” is where … Continue reading

Posted in Internet Security, Security | Tagged , , , , , , | Leave a comment

Google Two Factor Authentication

Background Anytime we get real data on Internet user passwords, we once again discover people are bad with passwords. Additionally as the tools to compromise and crack passwords get better, even high quality passwords are becoming less secure. Two factor … Continue reading

Posted in Internet Security, Security | Tagged , , , , , | Leave a comment

Internet Security As a System

Background Most of us do not see our activities on the Internet as a system, and if it is a system we are not sure what that has to do with securing ourselves on the Internet. First lets look at … Continue reading

Posted in Internet Security, Security | Tagged , , , , , | Leave a comment