Category Archives: Tech Zone
How to handle security
I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone …
The Threats of Steganography
Steganography is the art of concealing messages into something innocuous in such a way that it is extremely difficult for someone to suspect, let alone find, a hidden message. The etymology of the word “steganography” comes from the Greek language …
Trust – The Enemy of Security?
Some time ago I was reading about the Counterfeit banknote detector pen. This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a …
Undetected Threats: Cloud Storage
Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available. The files are stored by the solution providers. Usually the files stored in the cloud can be accessed via a …
Protecting your assets using one word – The Password
In a world where a sizable part of any company’s assets or management thereof resides in a computer system, it is more than sensible to expect those systems to be as highly protected as possible. In most cases all the …
Hacking Devices – USB
USB has become a very popular interface over the years. Plenty of devices have been developed that provide a USB interface such as cameras, phones, music players, the list is endless. While this is a useful technology, some of these …
Protecting Your Passwords and Confidential Information
Protecting Your Passwords and Confidential information We all know how important a password can be. This is especially true when that password is used on multiple systems. In my past articles I have talked about how to protect one’s passwords …
Hacking Devices – Ensuring your printer is secure
After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device …
Hacking Devices – How to protect yourself from data theft
Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed …
How to Delete Windows Patch Install Folders in Vista
After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive. Some of these folders are only temporary folders and are …










