Protecting your credentials from criminals

In my previous blog post, I wrote about choosing good passwords. However, most hack attempts don’t involve password hacking/guessing at all. Even dictionary attacks — which are far more common that brute force attacks — are not the most common way that criminals get at your account information and private data. In this blog post, I’ll […]... Read More

Good passwords

One of my pet peeves about security are people who advocate for ‘strong’ passwords. Everyone knows these people, they’re the tech support person who tells you your password must have a minimum number of characters that you only use when censoring expletives. Even worse, some of them use a random password generator to assign a […]... Read More

Internet Hosting Solutions

Web Hosting services are usually easy to use and get to store a website for your business. Websites that are not available on the Internet can be saved in such a manner to be available in the future. The service is available in an unlimited amount. After a period of 30 days all the files […]... Read More

Hello (again) world!

Wow, it’s been a while since I’ve had a professional blog, (back when I was working for Terra Soft and managing YDL.net in fact) and my own website was worse than terrible. It’s ironic, because I was too busy building medium and large web systems for universities, SMBs and ISPs to actually keep my own […]... Read More