security, passwords Evolution Of Password Management - Passphrases As we have seen in the previous post [https://while2.ghost.io/evolution-of-password-management-2-or-3-factors/], using three authentication factors is quite safe. Unfortunately online services can't afford these technologies. Passphrases
security, privacy, Microsoft, Intel, compilers Trust No One, Especially Microsoft And Intel As a developer, I should have full control over the programs I write. There may be a compiler between the text and the executable, but the result is exactly what
personal, security, advertising Do You Feel Guilty For Using Ad Blockers? You Shouldn't They compare you to a pirate (the article is not available anymore but the title is self explicative "Piracy and ad-blockers are both theft "). They say you are
Apple, security, FBI FBI Vs Apple: The End? Eventually the F.B.I. dropped its request to force Apple to create a special version of iOS to unlock the San Bernardino killer's iPhone. Since the beginning,
security, passwords Evolution Of Password Management - 2 (Or 3) Factors Nowadays many online services use additional factors to get rid of the lack of security that password represent (no pun intended). These are all the three factors: 1. something you
security, passwords Evolution Of Password Management - Algorithmic Password Generators We've seen that password managers may be useful but have their drawbacks [https://while2.ghost.io/evolution-of-password-management-let-someone-else-remember-your-password/] . Another way to avoid remembering tons of passwords is to have
security, passwords Evolution Of Password Management - Let Someone Else Remember Your Password In the previous part [https://while2.ghost.io/evolution-of-password-management-introduction/], I've told you that secure password are really complicated and not easy to remember. This is where password managers
security, passwords Evolution Of Password Management - Introduction In the past, I've written about various ways your passwords can be stolen or guessed in the series called 3 Ways To Open A Lock (part 1 [https:
email, security, privacy, protonmail ProtonMail Eventually, last week I've obtained a free email account to try this service. If you've never heard about it, it's an email provider based
security, DMail, email DMail And The False Sense Of Security Email is around since several decades. Nevertheless, it is still one of the most used form of communication, especially in business. Therefore the security of an email message is really
security, politics, browsers Cookies And The Law On June the 2nd, a new Italian law about cookies took effect. Basically it imposes: * to notify the user about the usage of so called technical cookies, and * to ask
security, passwords 3 Ways To Open A Lock - Part 3 This is the third and last part of a series (first post [https://while2.ghost.io/3_ways_to_open_lock_part_1/], second post [https://while2.ghost.io/3_
security, passwords 3 Ways To Open A Lock - Part 2 In the previous post [https://while2.ghost.io/3_ways_to_open_lock_part_1/], I've talked about guessing your password. Now I'm gonna cover another
security, IoT The Worst Problems Of IoT Security and privacy. Well, this post could have ended here, but since I'm a bit talkative (just a bit), I'll try to argument. First of all,
security, passwords 3 Ways To Open A Lock - Part 1 If someone wants to open your lock, he has three ways: * use lockpicking tools; * steal your key; * ask you for the key. But, you may say, what does this has
security Should We Forget IT Security? In the last months, a high number of security flaws has been reported. Starting from bugs in the management of SSL/TLS protocol (Apple [https://while2.ghost.io/indentation_matters]
security, open source, embedded, shell ShellShock: Impact On Average People In the previous post [https://while2.ghost.io/shellshock_what_ive_understood], I've written about the ShellShock vulnerability in a general way. Now I want to talk about
security, open source, embedded, shell ShellShock, What I've Understood Disclaimer: I'm not a security specialist; if you are running a webserver, please consider asking a qualified technician. If last week you have been to Mars, maybe you
security, Linux, open source, bugs Has Open Source Failed? This week has been pretty embarrassing for GNU/Linux estimators. According to ArsTechnica [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/] a bug has been found on the GnuTLS library. Basically
C, security, style, Apple, bugs, Python Indentation Matters Last week my colleague Daniele Veneroni[^1] told me: "You chose the wrong timing to write a post about the usefulness of goto. Have you heard what happened to