“Bruce Schneier Blazes Through Your Questions”

Interesting interview with one of my favorite computer security writers, especially (to me) the part about how he handles passwords: Q: How do you remember all of your passwords? A: I can’t. No one can; there are simply too many. But I have a few strategies. One, I choose the same password for all low-security …

Continue reading ‘“Bruce Schneier Blazes Through Your Questions”’ »

Secure Remote Backups, Part III

At the end of the previous entry in this series, I mentioned that there were still some things that made the backup system I’d developed less than optimal: The backup files aren’t compressed; Backups should always be read-only, even when the media is mounted, so it’s a lot harder for a virus or user-error to …

Continue reading ‘Secure Remote Backups, Part III’ »

“Phoenix hijacks Windows boot with instant-on”

My first computer was a used TI-99/4a, given to me as a gift on my twelfth birthday, just after Texas Instruments abandoned it. It was a wonderful little device, despite the quickly-outgrown 16K of memory. One of the best things about it (besides the hardware speech synthesizer module that I got with it) was that …

Continue reading ‘“Phoenix hijacks Windows boot with instant-on”’ »