Blog

How does a security passcard work?

Tech | Authentication   Security pass cards are often used to gain entry into areas and buildings with restricted access. The security pass card may be for general access, meaning that the pass card does not provide data about the person using it, or it may be individually encoded, containing specific information about the cardholder.…
Read more

What is a digital signature?

A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. Digital signatures rely on certain types of encryption to…
Read more

PGP security weakness exposed

If you're still using 32-bit PGP keys, you only think you have security. But you really don't. It would take a cracker about four seconds to forge your PGP signature.  By Steven J. Vaughan-Nichols for Zero Day | August 18, 2016 As Randall Munroe, creator of xkcd, pointed out, PGP is far more secure in…
Read more

Windows 10 tip: Find your PC’s original product key

If you've purchased a new PC with Windows pre-installed in the past few years, chances are it has a product key embedded in its BIOS. With a little PowerShell wizardry, you can find that well-hidden key and learn more about your current licensing status.  By Ed Bott for The Ed Bott Report | August 17,…
Read more

Windows 10 tip: Turn off Cortana completely

Cortana on (left) and off (right) In the Windows 10 Anniversary Update, version 1607, Microsoft removed Cortana's on-off switch. But it's still there, if you know where to look. Use this tweak to make Windows search strictly local.  By Ed Bott for The Ed Bott Report | August 17, 2016 In the Windows 10 Anniversary…
Read more

Cortana: The spy in Windows 10

Cortana, Windows 10’s built-in virtual assistant, is both really cool and really creepy Credit: Pixabay By Steven J. Vaughan-Nichols    Computerworld | Aug 16, 2016   When I first saw Mr. Spock talking to the Enterprise’s computer, I thought it was so cool. I still do. But the more I look at Cortana, Windows 10’s inherent…
Read more

How Encryption Works

by Jeff Tyson         Tech | Authentication                PART TWO OF TWO PART SERIES   This is the second of two parts on Encryption. We hope this enlightens our readers to what and how encryption is created and how it can be used. Leave your comments and feedback please.   Hashing Algorithm The key in public-key encryption is based…
Read more