key

Fri
03
Nov
Dennis Faas's picture

How to Fix: Send Encrypted Email to Gmail (Postfix, TLS, SSL Certificates)

Infopackets Reader Martin R. writes: " The email newsletter I receive from you is showing in my gmail as "unencrypted," with a red pad lock . There is also a new warning banner that says: 'Be careful with this message. It contains content that's ... typically used to steal personal information.' The options are: learn more, report this suspicious message, ignore, or 'I trust this message.' This is not the only email I get that shows as unencrypted. What does this mean and how can it be fixed? " My response: Essentially it means that the mail you received (at gmail) was not sent using email ... (view more)

Fri
24
Mar
Dennis Faas's picture

Explained: When to Encrypt your Hard Drive, and When not to

Infopackets Reader Scott writes: " Dear Dennis, I'm thinking of turning on disk encryption for my Windows 10 computer. I've never done this before. Is there anything to be concerned about or to be aware of? " My response: This is a good question. ... The truth of the matter is that if you encrypt your entire C drive using Windows BitLocker or a third party utility, it's going to slow your system down quite a bit. The reason for this is because every single file written to the drive must be encrypted, and then decrypted when read - including your operating system files. Constantly encrypting and ... (view more)

Wed
01
Feb
John Lister's picture

Hotel Ditches Key Cards After Ransomware Attack

Hackers have forced a hotel to ditch its electronic room key system and return to physical keys. But reports that guests were locked in and out of their room turned out to be overblown. The Seehotel Jaegewirt in Austria has been targeted by at least ... four different attacks on its computer system. The most recent involved the system data being encrypted and the hackers demanding a payment in the virtual currency Bitcoin equivalent to around $1,600. The hotel mentioned the attack in a press release designed to raise awareness and warn other hotels of the need to maintain security. A news agency ... (view more)

Thu
30
Jul
John Lister's picture

Windows 10: Key Questions Answered

Windows 10 is now available. While there's no immediate rush to get it (the upgrade is free for another year), here are some of the basics to know if you're thinking of trying out the new system. Can I get Windows 10 right away, or do I have to ... wait? Many users are still waiting for Windows 10 to download to their computer, even though they have reserved their free upgrade using the 'Get Windows 10' app via the tray bar. It is possible, however, to forcefully download Windows 10 directly from Microsoft's website as an in-place upgrade or as an .ISO, which is used to create a bootable ... (view more)

Tue
16
Jun
John Lister's picture

Windows 10 Cortana Button Could Replace ESC Key

Toshiba has announced that some of its forthcoming laptops will have a dedicated Cortana key. It's designed as an easier way to control the "digital assistant" feature in Windows 10. Cortana, which is already implemented in Windows Phone devices, is ... a similar idea to Apple's dedicated virtual assistant, Siri. While Cortana features spoken information and voice control, it also combines online searches with information on user devices or computers to increase relevancy. Some examples Microsoft gives include taking notes of ideas, delivering personalized news updates, or ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Thu
19
Feb
John Lister's picture

Windows 10 to Widely Support Fingerprint, Key Logins

Windows 10 will support a key standard for security measures designed as an alternative to the traditional password. It could make it easier to use methods such as fingerprint recognition or a "key-like" USB stick. Microsoft has confirmed the ... operating system will support the Fast Identity Online (Fido) standards. That's an industry-wide specification supported by tech firms such as BlackBerry and Google and financial firms such as PayPal, Discover and Visa. (Source: windows.com ) Fido isn't specific to any one device, but rather is a specification about the way computers ... (view more)

Wed
12
Mar
Brandon Dimmel's picture

Google CEO Says User Data Safe From NSA

Google's chief executive officer is promising Google users that their data is safe from the prying eyes of National Security Agency (NSA) officials. Eric Schmidt made that claim before a large audience at the South by Southwest Interactive ... conference, which is being held in Austin, Texas. When asked how he felt after it was revealed that the NSA had worked with Britain's top surveillance agency, the GCHQ (Government Communications Headquarters) to infiltrate Google's data centers, Schmidt admitted that he was shocked. "The very fact that they did this was very suspicious to ... (view more)

Mon
23
Dec
Dennis Faas's picture

'SysTools Folder Key 2.0', and 'TurnedOnTimesView 1.11'

SysTools Folder Key 2.0 Protect your most sensitive files with SysTools Folder Key. Using this tool you can effectively lock down any and all folders stored on your computer. That means every time someone tries to access an important folder, they ... must enter a password. http://www.systoolsgroup.com TurnedOnTimesView 1.11 This simple tool allows you to see exactly when your system was turned on. It can also tell you how long your system was operating during each session. Displayed categories include startup time, shutdown time, duration, and shutdown reason. http://www.nirsoft.net/ This ... (view more)

Wed
27
Feb
Dennis Faas's picture

Windows 8: How To Use Multiple Monitors

Here's an example of a question we've heard several times recently: "Dear Infopackets team, I'm thinking of upgrading to Windows 8. The problem is that I've heard using it over multiple monitors can be difficult. I find using two monitors very ... useful because I can write and use the web at the same time without needing to keep switching back and forth. Can you give me any insight? George H." My response: Thanks for your email, George. Before I get to the way the new-look Windows 8 interface works with multiple monitors, let me just remind you that you can always switch to the ... (view more)

Pages

Subscribe to RSS - key