Financial Security Search Results

News: Protect Your Dropbox Files from Prying Eyes (+ 2 Alternative File Hosting Options)

Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing as this wasn't the first security failure, everyone, including the most loyal users are considering dropping the Dropbox.

Rumsfeld: Israel needn't notify US about strike

While US Defense Secretary Leon Panetta attempted to convince top Israeli politicians and security officials not to launch a strike on Iran's nuclear facilities during his visit to Israel last week, his predecessor Donald Rumsfeld, seems more prepared for a possible attack. Rumsfeld: Israel needn't notify US about strike - Israel News, Ynetnews.

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part II

This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that test a computer's security. It will also guide you to software you can install or follow so you know what programs need to be updated on the computer. Lastly, I will talk about some features that should be disabled when ...

How To: Encrypt an Apple AirPort with WPA password protection

In this video tutorial, viewers learn how to set and encrypt their Wi-Fi password using WPA in Apple Airport. Begin by opening the Airport Admin Utility application from the CD. Then locate your the name of your network and double-click it or press the Configure button at the bottom right of the screen. Now enter your password and click OK. The network should be opened now. Then click on the Airport tab and click on Wireless Security. In the pull-down menu, select WPA2 Personal. Then click on...

News: News Clips - June 8

California grad student on no-fly list gets home after stranding An American student who discovered he was included on the government’s no-fly list and was barred from a U.S.-bound flight from Costa Rica was reunited with family and friends after he flew to Mexico and then walked across the U.S.-Mexico border Thursday evening.

Extreme Frugal Living: Tips For Living In Your Car

Whether you really need to pinch pennies for a long road trip or are really at the end of your rope with your financial and living situation, desperate times call for desperate measures--and sometimes that involves living in your car for an extended period of time. It is certainly not easy, but with the right equipment and know-how, making your car your abode is certainly possible if you make the continuous effort to keep things clean, be smart about where you park your car and avoid arousing...

How To: Make an Unbreakable Linux Password Using a SHA-2 Hash Algorithm

In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a friend pointed out to me, Ubuntu is currently the only distro implementing SHA-2 as the default. With SHA-2, your passwords take an unreasonably larger amount of time to calculate. This will greatly decrease how many password...

News: Hideo Kojima and Fox Engine Make Special USC Appearance

Hideo Kojima is one of the biggest names in Japanese game design. He's the man behind every Metal Gear game, each of which has been beautiful but divisive. He's an auteur, a rarity in AAA game design, managing business, design, and programming for Kojima Productions. Last week he made a rare public appearance at the USC School of Cinematic Arts, which contains the school's video game programs, and gave a 90-minute talk about his career, influences, and the specifics of his new Fox game design...

News: Alzheimer streaker

Dress up Johnny Knoxville as his old man counterpart. He then needs to strip down to his underwear at a MLB or soccer game and streak across the field. If possible he should really bring a walker and hold it out while he is scrambling from security. Most people wont know who he is, but it will be a huge hit with all of us fans who will recognize him immediately and be thrilled with the opportunity to see a prank in action without being able to interfere with the filming.

How To: Tie a Half-Hitch knot or Double Half-Hitch knot

Half-hitches are great knots, but only when use in combination with other knots. By itself, a half-hitch is unsafe and unreliable, but when joined with other knots, can be quite the opposite. Tying two half hitch knots together is great for attaching a rope or line to any object. The half hitch and double half hitch are used throughout specialities, most notably as a boating knot, outdoor knot, and paddling knot.

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).

How To: Tie the figure eight knot for boating or paddling

The figure eight follow through boating knot is one of the strongest knots. (also can be used for paddling). It is generally rated at 70% - 75% of rope strength. Due to it's strength and the fact that it is easy to visually inspect, it is commonly used by climbers as their "tie-in knot" - the knot that connects the climber to the rope. It forms a secure non-slip loop at the end of a rope. For even greater security, finish the tag end with a backup knot such as one side of the double fisherman...