Skip to content

Tag: Security

Firefox – Displaying saved passwords

One of the pracctical functions in Firefox is the option to save passwords. This also has a backward function, in that you can find out what your saved password is. To do so, simply go to the login-page in question. Then right-click the site and select View Page Info. Go to the Security-tab and find the button View saved passwords. Then click the button View passwords to see all saved passwords.
 
Now, as I’m sure I’m not the only paranoid browser around, here’s how to set a master password to protect your saved passwords:
 

Leave a Comment

Windows XP Service Pack 3 – a quick overview

Windows XP is Microsoft’s longest living operating system to date. Released in October 2001, it succeeded the total failure that was Windows Millennium Edition, and has, in turn, been succeeded by Windows Vista. Service Pack 3 is, as implied by the name, the third major upgrade package – Service Pack – released for Windows XP. Unlike SP2, SP3 contains no changes that are directly experienced by the end-user. SP3 was released for download on May 6th, 2008.

Leave a Comment

Internet Explorer and me (Or: Why I choose)

I’ve been using computers more or less actively for about 10 years now. My first encounter with a computer was a hulking 386, which I never really got the hang of. Since then, I’ve encountered computers in many different ways, but the first time I can remember getting a “So that’s what it’s all about” feeling, was back in the summer of 1996. Using Word (!) I constructed my very first website.

1 Comment

Securing transfer of Anti Virus policies

Fighting and defending against computer viruses is one of the largest challenges facing businesses and individuals in the IT world of today. To guard against this, most people have anti-virus software installed on their computers. However, even though you have anti-virus software installed, how can you be certain that the policy-files are the ones your anti-virus supplier has supplied? What is done by the different developers to secure the transfer of these files? What sort of knowledge and access would be needed to hack through the protection?
 
I’ve asked these questions to a few of the leaders in anti-virus software development. Only two answered my questions; here’s what they said:
 
Norman

1 Comment