Wireless Safety
·
Beware of who else might be watching your wireless traffic … and what they might be doing with that information.
·
Beware of who else might be watching your wireless traffic … and what they might be doing with that information.
·
There are many layers to any notion of security. How well do you understand each?
·
Debit card numbers have certain features to make them easy to produce. It also makes them easy to predict, allowing determined thieves to easily steal your money if you’re not careful.
·
If you can get in, someone else can (and will) find a way to get in without your permission. If your software and systems can be used for good, someone can (and will) find a way to exploit the same for ill.
·
My attempts to build a session UI over the weekend failed. My attempt to build one during a team hackathon was sidelined so we could focus on, what seemed at the time, far more interesting code. Now, though, I can jump on board with the new session UI being merged into WordPress 4.1!
·
If you’re logging in to WordPress as an administrator just to write a post, you’re doing it wrong.
·
Apple has announced they won’t be unlocking iOS 8 phones in response to warrants, not as a point of policy, but because the system they’ve built won’t allow it.
·
Let’s work out the probability that, in a given group of individuals, at least three share a birthday.
·
When you log in to WordPress, the platform should record the event, where it occurred from, and the device that was used. This would empower you to kill off rogue sessions if necessary.
·
Once I mastered the skill of lock-picking, it changed the way I looked at the world. Locked doors that used to obstruct me became mere annoyances. It was a bit of a dangerous revelation.