• Home
  • Remote Education Assistance
  • Class Video Links
  • Computers and your family
  • About
  • Video Links

Steve Simpson, Glendale College Computer Instructor

~ Designed For My Students, Friends and Family!

Steve Simpson, Glendale College Computer Instructor

Category Archives: Security Issues

7 Android tools that can help your personal security

16 Tuesday Feb 2016

Posted by simpsongcc in GCC, Security Issues

≈ 1 Comment


Here is a good article on some apps you might want on your Android phone or tablet!

7 Android Tools

Use your phone to make that payment

25 Monday Jan 2016

Posted by simpsongcc in Family info, GCC, Integrated Technology, New Technology, Security Issues

≈ Leave a comment


Your phone is a more secure form of payment than your credit card. Here is a quick video.

Pay with your phone

New Interesting Home Robot

19 Tuesday Jan 2016

Posted by simpsongcc in Family info, For Fun, Future Technology, GCC, Integrated Technology, Intro to Computers, New Technology, Security Issues

≈ Leave a comment


Here is the website for a new, very interesting home robot. A definite step forward!

Aido Robot

Best Antivirus Utilities for 2016

14 Thursday Jan 2016

Posted by simpsongcc in Family info, GCC, Security Issues

≈ Leave a comment


Here is the PC Mag review for best Antivirus programs

PC Mag Review

Keeping Your Child Safe On The Internet

14 Monday Dec 2015

Posted by simpsongcc in Family info, GCC, Security Issues

≈ Leave a comment

Tags

GCC, Security


Another article to take a look at if you have kids….

10 Ways to keep your child safe

Tech Toys can be dangerous to your kids

14 Monday Dec 2015

Posted by simpsongcc in Family info, GCC, New Technology, Security Issues

≈ Leave a comment

Tags

GCC, Security


Here is an important article to read this holiday season. It has some important things to consider if you have kids.

Tech Toys

New Online Virus Checker

09 Wednesday Dec 2015

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment

Tags

GCC, Security


Here is a great security tool!

Virustotal

A LastPass tutorial

09 Wednesday Dec 2015

Posted by simpsongcc in GCC, Integrated Technology, Internet, Intro to Computers, Security Issues

≈ Leave a comment

Tags

GCC, Security


One of the password protection and personal info protection programs I recommend is LastPass. Here is two tutorials I found on youtube that is pretty good. Take a look.

 

Microsoft Windows Virus and Security Center

03 Thursday Dec 2015

Posted by simpsongcc in GCC, Integrated Technology, Security Issues

≈ Leave a comment

Tags

GCC, Security


If you have a virus or security problem in Windows, here is the site you should check out.

Windows Security Center

A wealth of security information!

02 Wednesday Dec 2015

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment

Tags

GCC, Security


Here is a website that has security related informational newsletters. There is some good stuff that you should know. Take a look!!

OUCH Security Awareness Newsletter

 

8 little-known security tricks that will make you harder to hack

11 Thursday Jun 2015

Posted by simpsongcc in Family info, Security Issues

≈ Leave a comment

Tags

Security


Good article for employing some simple things to increase your security.

http://www.msn.com/en-us/news/itinsider/8-little-known-security-tricks-that-will-make-you-harder-to-hack/ar-BBklM0P#page=1

Best wireless routers of 2015

18 Monday May 2015

Posted by simpsongcc in Family info, Integrated Technology, Internet, New Technology, Security Issues

≈ Leave a comment

Tags

New Tech, News, Security


Here is a CNET review of the best wireless routers in 2015 so far…..

Best wireless routers of 2015

The 2015 Social Engineering Survival Guide

26 Monday Jan 2015

Posted by simpsongcc in GCC, Integrated Technology, Security Issues

≈ Leave a comment

Tags

News


Excellent article on social engineering and security. A definite recommended read.

Here is the link

Intel’s PC Chief Sees Big Changes Coming in 2015

06 Thursday Nov 2014

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, New Technology, Security Issues

≈ Leave a comment

Tags

GCC, News


Here is some news on interesting changes coming as soon as next year. It further confirms the sea change to mobility in computing.

http://blogs.wsj.com/digits/2014/11/05/intels-pc-chief-sees-big-changes-coming-in-2015/

Sit back and watch hacks around the world in real time

25 Wednesday Jun 2014

Posted by simpsongcc in Security Issues

≈ Leave a comment


This is a real time graphic of hacks going on in real time around the world. Read the Smithsonian article here: http://www.smithsonianmag.com/smart-news/nets-dark-side-watch-people-try-hack-each-other-live-180951823/?no-ist

Experience only the graphic here: http://map.ipviking.com/?_ga=1.106938115.1477390587.1388686673#

Update on HeartBleed…Which sites are fixed….

09 Wednesday Apr 2014

Posted by simpsongcc in Security Issues

≈ Leave a comment


Check this site frequently for the next few weeks. Once it is fixed…change your password on sites you have used.

http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/

Heartbeed Bug….What to do now…

09 Wednesday Apr 2014

Posted by simpsongcc in Security Issues

≈ Leave a comment


Here is an article on this new security problem. Please read it and take action as it suggests.

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/

Facebook Privacy

13 Thursday Mar 2014

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


Here is a good security guide if you are using Facebook.

http://t.money.msn.com/saving-money-tips/the-slackers-guide-to-facebook-privacy

 

Adobe has major security leak!

09 Wednesday Oct 2013

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


 

Most of us have adobe products on our computers. They recently had a major security leak. If you have purchased anything from Adobe, you might want to be concerned. Go to this link to learn more about it…

http://helpx.adobe.com/x-productkb/policy-pricing/customer-alert.html?promoid=KHQGF

 

 

Creating strong passwords is easier than you think

13 Tuesday Nov 2012

Posted by simpsongcc in GCC, Intro to Computers, Security Issues

≈ Leave a comment


Even with smartcards, biometrics, and other multifactor authentication solutions [1], everyone still uses basic name/password log-on combinations. Security experts always recommend “strong passwords.” But what qualifies as a strong password? And how do you avoid creating a password so strong you can’t remember it?   According to NIST (National Institute of Standards and Technology), a strong password should contain no fewer than 12 characters, a rule adopted by the U.S. government in 2007 and further defined in the U.S. Government Configuration Baseline [2]. Admin passwords should be 15 characters. Readers may sigh at those lengths, but they’ve been the recommended minimum for half a decade. Anything shorter is not considered secure.   [ InfoWorld Test Center reviews 7 password managers [3]. Find out which one comes out on top. | Learn how to secure your systems with InfoWorld’s Security Central newsletter [4]. ]   Sure, many people can and do use shorter passwords. But you should be aware that as you increase the length, you provide greater protection over time. An 8-character password may be fine for a few days of protection, but a 12-character password is generally thought to be long enough to provide protection for a maximum of 90 days. A 15-character password is often considered good protection for up to a year.   The myth of complexity Most security guidelines also insist on character complexity, which usually means that the password must contain multiple character sets, such as uppercase alphabetic characters, numbers, keyboard symbols, and so on. As I’ve noted in the past, however, complexity is less important than length [5]. A password of sufficient length can defeat a password guesser or cracker, whereas complexity adds significant value only when the complexity is random or near-random.   Typically, when users are forced into complexity, they use the same types of characters in the same places. For example, when people are required to create an 8-character password with complexity, most will choose a root word in their country’s language, with an uppercase first letter (usually a consonant), followed by a lowercase vowel. If they use a number, it will usually be a “1” or a “2” and placed at the end. If they use a symbol, it will usually be one of a handful of characters placed somewhere in the middle, often replacing a letter with a similar shape: an @ or a zero to replace an “o,” an exclamation mark for an “i,” and so on.   Password attackers know this, and their password cracking tools are optimized to guess at passwords using these patterns. Several security experts, including myself, have analyzed large dumps of captured passwords [6] and found the password patterns I’ve outlined above to hold true again and again.   For complexity to add significant value, the password must be truly unique and random — something like %Tv4$H@.<P. But if it’s that ugly, people will either write it down or never remember it. Unfortunately, most security auditors and regulations (including PCI DSS) require password complexity. For example, I use a financial website with a maximum password length of six characters, but complexity is required. It makes me want to scream! I’d be much better off with a password of Dogdogdogdog or Iforeverlovedogs.

My personal password trick revealed Some people like to use special password-keeping programs [7], but I prefer to do something else that is faster for me. I use the same root password (let’s say TadPole) in all my passwords, but vary the beginning and the end. One website may be 44TadPole44. Another may be TadPole32, and yet another may be AmazTadPole32On. I have a method to my madness, so the pre- and post-portions make sense to me for particular websites.   Thanks to the common root method, I can keep passwords to hundreds of different websites in my head. Because each password is different, if an attacker compromises one of my passwords on one website, my password commonality remains unknown. Even if they figure out I’m using a common password root — heck, I’m telling them right here — they’ll have a hard time figuring out the right pre- and post-portions aligned with other websites. None of the currently available password tools can handle that type of replacement complexity when trying different password combinations.   Lie in reply to password reset questions Just as important as a good, strong password is making your password reset questions unguessable. There are lots of stories (remember the Sarah Palin email hack [8]?) where people who were not even true hackers did a little research and guessed a person’s password reset questions correctly. In general, the effort needed to crack reset questions is an order of magnitude less than guessing the actual password. It’s the weakest link.   Do what I do and don’t answer those questions truthfully. When they ask you your mother’s maiden name, the brand of your first car, or your birthplace, you are not obligated to provide correct answers. Instead, pick a common password reset answer for each website and use my password root strategy, remembering to vary the common root word or phrase so you can remember it and associate it with each website.   Anyone can end up with a compromised password. It happens. Websites get hacked. Ingenious, targeted phish emails fool the best of us. But if you follow these recommendations, you can reduce the risk of successful password hack attacks.   This story, “Creating strong passwords is easier than you think [9],” was originally published at InfoWorld.com [10]. Keep up on the latest developments in network security [11] and read more of Roger Grimes’ Security Adviser blog [12] at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter [13].

Newer posts →

This slideshow requires JavaScript.

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

Hours & Info

818-813-1720
ssimpson@glendale.edu
April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Categories

Archives

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

A WordPress.com Website.

  • Subscribe Subscribed
    • Steve Simpson, Glendale College Computer Instructor
    • Join 81 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Steve Simpson, Glendale College Computer Instructor
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...