Easy multifactor authentication in Django
Use django-multifactor
to make your Django websites extra-secure by requiring a secondary authentication factor. Disclaimer: I made this.
Use django-multifactor
to make your Django websites extra-secure by requiring a secondary authentication factor. Disclaimer: I made this.
Schools often aren’t the most clued-up when it comes to understanding privacy and security, but the companies and service providers that that work with them —and take on all sorts of child data— really need to watch what they’re doing.
Nobody should be handing out my daughter’s fingerprints to strangers, right?
Another day, another crippling botnet attack from yet another army of conscripted IoT devices.
As we continue to shovel piles of crappy abandoned devices onto our networks, why aren’t we monitoring and curtailing what these devices do on our networks? Why don’t we care any more? Have we given up on network security?
Governments want to intercept all terrorist communication but… they can’t. You can talk online with perfect secrecy if you know what you’re doing. Their solution to this is banning strong encryption. Most people have probably switched off but this will affect you (and won’t stop terrorists).
SSH is the de facto remote access technique for Ubuntu and Linux servers and yet some of the defaults you’ll get from sudo apt-get install ssh
can be downright dangerous in the wrong circumstances. This article will steer you around the biggest pitfalls to keep your server’s front door well protected.
Who actually checks the permissions of applications they’re installing? A little while ago a Paypal update stalled because it required extra permissions. This is what happens if an app you have already installed wants more power. I was more than a little surprised with what I found.
Single-purpose kiosk computing might seem scary and industrial but thanks to cheap hardware and Ubuntu, it’s an increasingly popular idea. I’m going to show you how and it’s only going to take a few minutes to get to something usable.
Facebook isn’t all bad but here’s a message that just got sent to my wall for me and all my friends to download. If they’re not careful, Facebook could be going the way of email.
Just under a year since the original What Slows Windows Down article and I’m gearing up for the third in the series. This time it’s an antivirus-only arena and it’s shaping up to be quite a deathmatch…
ISPs could very easily halt 80-90% of automated illegal online activity but in order to do so, they need to be forced, en masse into taking a tougher line with possible security threats. Will it ever happen and is it what we really want?
Have you ever wondered where the content of your junk-mail folder (or inbox) comes from?
The fear of infection is power over users.
Spam is a problem and with the recent upsurge in blogs and places where you can leave your 2 cents, its not getting any better. "Clever" online entrepreneurs have always been up for making money from nothing and have relentlessly plagued our inboxes…
Turns out all the data entered during installation is logged. Including passwords.
C is a pretty easy language to understand but there is one topic that scares the daylights out of beginners: pointers.