Is obsolete the new secure?

Posted by Josh on June 17, 2014 in Security |

I recently read an article in Defense Systems Magazine that toyed with the idea of using what most would consider obsolete technology as a “security” measure.   In this case they were specifically talking about the use of 8-inch (yes, you read that right) floppy disks that hold about 1 to 1.2 megabytes of data.   […]

Tags: , , , , , ,


The Death of Windows XP… XPocalypse

Posted by Josh on May 1, 2014 in Security |

On the 8th of April 2014, Microsoft effectively “pulled the plug” on its decade plus old operating system Windows XP.  What this translates to for end users is fairly simple.  Their Windows XP computer won’t stop running, but any future security issues that are identified with the Operating System will not be fix via a […]

Tags: , , , , , , ,


Paid software, what is it good for?

Posted by Josh on September 18, 2012 in Review, Security |

With all the great freeware products I discussed in my last article, it may leave you wondering if paid software is worth the money.  The short answer is “it depends.”  If you are a home user with no intent of doing any commercial activities with the software, then the answer is “likely not”, however if […]

Tags: , , , , , , , , , , , ,


Everybody Lies…

Posted by Josh on August 20, 2012 in Security |

  To quote the famous TV doctor Gregory House, “everybody lies”.  Why do I say that, I do not know a single person that actually reads the whole end-user license agreement (EULA) on software products they buy.  They are those things that everyone clicks “ok” to after scrolling through what seems like 100 pages of […]

Tags: , , , , , , , , , ,

Copyright © 2012-2021 All rights reserved.