Earlier this week I received an email from a rather forlorn customer asking, “I cannot stand the spam; what is a good spam blocker?” Outside of the delete key, I have very few recommendations when it comes to “spam blockers.” Spam (or,...
Just like many people are oblivious to the world around them while they’re driving a car, most people don’t have a clue regarding the savage battle that rages across the Internet as they merrily open dangerous email attachments, click on malicious website links and...
Among the many wild and wacky events taking place during the annual Defcon computer security conference is the timed Lock Picking SkillZ event; lock picking hobbyists from around the globe descend on Las Vegas every year to participate in this very interesting event...
First off, please, no emails telling me how I’m a sexist pig. In this column, I’ll use the phrase “computer guy” as an all-inclusive term, meaning that your computer repairperson can be either male or female. Now that I’m all...
The Clinton-era Digital Millennium Copyright Act (DMCA) has turned the Information Technology (I.T.) departments of America’s colleges and universities into vigilante lynch mobs working for Hollywood. Criminalizing certain behaviors and technologies, the DMCA was...
Page 4 of 10« First«...23456...10...»Last »