Technology's news, People, and Advances


  • As a security conscious person two factor authentication has always been an attractive solution to me.  It provides a quick and easy way for me to add an extra level of security to my online accounts without having to remember yet more passwords.  But what is two factor authentication?  Well two factor authentication is the idea of accessing your accounting something you know, such as your password and then uses something you have which can be anything from a mobile phone, to an authenticator gadget or app.  In my case, many of the websites I use two factor authentication on use my phone and a text message.

    Not long ago I discovered that I could enable such a mechanism on Facebook.  Traditionally Facebook uses their own app to generate security codes in order to get into your account, however they do provide the option to hook your phone up to your account. Armed with this I went about having the code to verify my phone sent via text, completed setting up my account. Simple right?

  • I have had the opportunity recently to write a password strength testing tool. As part of my testing, I used some of my own passwords. Shockingly, against my own standards, my own passwords did not hold their own, coming in at around 35 percent. I decided to take this a step further and put a few pass sites to the test. My results were all over the place. Many accepted passwords that were virtually useless others took a bit more of a strict approach. In this article I give you an overview of some of the ones I tried

    DISCLAIMER:Aside from my own testing software, I can not guarantee that the passwords you enter on these websites are not being stored, also many of the sites my own included transmit your password in plain text. Please do not enter any passwords to sensitive information in these forms.

  • shield, protecting yourself

    Recently web security has been a hot topic, and for good reason.  Edward Snowden leaked documents showing that the NSA was responsible for mass surveillance of foreign entities, and chances are that means you.  Other malicious parties also troll the web looking for vulnerabilities, in websites and trying to steal sensitive data. Although you may not control the websites which you use, you do control what you put on those websites.