Like so many other technologies, IT – Information Technology – has the potential to make a substantive difference in our lives. Sometimes it offers something entirely new, something it reinvents something that may or may not need reinventing in the first place, and sometimes it solves an issue created by IT in the first place.
To transfer notes from GMail to Google Keep as demonstrated last week, I had to grant access to my Google account to a third-party application. While I was happy to do so to accomplish what I wanted, once that had been done, I no longer saw any value (and indeed quite a bit of inherent risk) in allowing… Continue reading Revoking access to your Google account
One of the pracctical functions in Firefox is the option to save passwords. This also has a backward function, in that you can find out what your saved password is. To do so, simply go to the login-page in question. Then right-click the site and select View Page Info. Go to the Security-tab and find… Continue reading Firefox – Displaying saved passwords
At this year’s DefCon, a security problem inherent to the default settings in GMail was unveiled. The problem is that, by default, GMail does not use encrypted sessions.
Windows XP is Microsoft’s longest living operating system to date. Released in October 2001, it succeeded the total failure that was Windows Millennium Edition, and has, in turn, been succeeded by Windows Vista. Service Pack 3 is, as implied by the name, the third major upgrade package – Service Pack – released for Windows XP.… Continue reading Windows XP Service Pack 3 – a quick overview
I’ve been using computers more or less actively for about 10 years now. My first encounter with a computer was a hulking 386, which I never really got the hang of. Since then, I’ve encountered computers in many different ways, but the first time I can remember getting a “So that’s what it’s all about”… Continue reading Internet Explorer and me (Or: Why I choose)
Why? A man in his twenties, let’s call him Bill, gets on a bus in Oslo. He carries with him a portable computer, complete with a wireless network adapter. The computer is running Windows XP Professional, and has an app installed called NetStumbler. The man is bored, and decides to have some fun… Bill… Continue reading Securing Wireless Networks, why and how?
Fighting and defending against computer viruses is one of the largest challenges facing businesses and individuals in the IT world of today. To guard against this, most people have anti-virus software installed on their computers. However, even though you have anti-virus software installed, how can you be certain that the policy-files are the ones your… Continue reading Securing transfer of Anti Virus policies