Archive

Posts Tagged ‘Security’

Podcasting Equipment: Audio-Technica 2020 microphone

January 20th, 2016 Comments off
Audio Technica AT2020

Audio Technica AT2020

 

I recently began podcasting after years of blogging and social media engagement via multiple Twitter (primarily @0bytes, @ADubiousDude), Instagram and other accounts.

 

Why

This venture arose, like several of my information security peers, out of a desire to promote my career through social engagements.  A partner and I agreed to invest in this venture at professional information security strategists.  My decision to stand up a podcast about my faith followed as a way to re-purpose the equipment and practices into which I invest for podcasting, extending my stewardship of these tools and skills.

 

Share

Android Lock Screen, Auto-Lock and Screen Timeout

December 3rd, 2014 Comments off

While preparing a Lunch-n-Learn at work I found that I wasn’t satisfied with finding a simple How-To on Android 4.4.2 Lock Screen, Passcode and Screen Timeout so I’m publishing this.

 

The first step we’ll undertake is setting a timeout for the Android display on the device.  To access the Setting menu pull down from the top of the display and choose the gear icon at the top right of the display.

You’ll scroll down the Settings menu until you see Device section and then look for Display.

Display Menu

Display Menu

 

Share

DevLink – Awesome Conference in Chattanooga

August 29th, 2014 Comments off

John Kellar started DevLink over in Nashville in 2006.  It’s a great conference.  I’ve seen presenters at DevLink in August only to catch the exact same presentations from them a few months later down at VSLive Orlando in December.  The difference in the price tag is $100-250 for DevLink and $1,500-3,000 (factoring in airfare, room and board) for VS Live.  That kind of difference is HAAARD to justify.

Thursday's Keynote

 

 

Professional Development - Convince Me

 

This year I’ve enjoyed a lot of AngularJS content and some architectural sessions, notably Mike Wood‘s Dependable Cloud Architecture and Rachel Appel‘s Web Runtime Architecture and Performance Deep Dive.

Share

Security: Two-factor Authentication

April 29th, 2013 Comments off

Dan Goodin retweeted Mark Wuergler’s post last week.

 

This left me thinking about what most people I know understand about authentication.

In security authentication is a two-step process in which someone* claims an identity and then provides credentials by which he can be verified to be able to operate as the identity claimed.

Share

Password Security – Are Yours Easy To Crack (Hacking)?

April 23rd, 2013 1 comment

After reading Nate Anderson‘s article, How I became a password cracker, I decided to put a blog post out to coincide with my quarterly call to my friends and readers to change your passwords.

One friend recently asked how to “know” that your password is secure without using a program that generates them or creating a password that requires you to haul around a book.  Here’s a quick set of guidelines that anyone can use.

    1. It’s easier for people to remember phrases than characters.
      Choose a phrase that’s about 15 letters long.
      tImextakeslickn
Share