How to use Gmail 2-step verification on multiple devices
After reading my article on taking precautions when using Gmail, Bill Snyder asked about accessing Gmail on other programs and devices.
Lincoln Spector | 19 Aug | Read more
After reading my article on taking precautions when using Gmail, Bill Snyder asked about accessing Gmail on other programs and devices.
Lincoln Spector | 19 Aug | Read more
Harish Kumar asked if a brute force attack--which tries random text strings until one turns out to be your password--would work on major websites. "Will Facebook allow millions of failed attempts?"
Lincoln Spector | 17 Feb | Read more
Rose's Internet service intermittently slows to a crawl. She wants to make sure that her neighbors haven't hacked her Wi-Fi for free connectivity.
Lincoln Spector | 16 Jan | Read more
Even if you don't do New Year's resolutions, flipping the calendar to a fresh year is a great time to take stock of your tech habits and brush them up as needed. Unlike resolutions you have to keep all year, like working out every day, most of these technology pledges are set-it-and-forget-it. We know you're a super-smart person and you're probably doing all this stuff already, but it never hurts to double-check.
Susie Ochs | 03 Jan | Read more
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Nick Mediati | 30 Oct | Read more
It seems like every day you read about another password security breach. It doesn't matter how robust your actual password is; if a hacker makes off with an entire password database, he can potentially access your account.
Rick Broida | 09 Oct | Read more
It's all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality.
Alex Castle | 18 Jan | Read more
2godballdaglory asked the Answer Line forum how he can boot an old PC with a password he no longer remembers.
Lincoln Spector | 05 Nov | Read more