With 2FA your phone becomes an important factor in data protection. How #SIM-jacking works: A hacker decides you are worth attacking. They call your phone provider, or visit a mobile phone store, and convince someone that they’re you and get your number assigned to their phone. https://t.co/mlYGYNirHv
18 Jan 2020
Great quote:Caleb Barlow, VP of X-Force Threat Intelligence at IBM Security, said about charging phones, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. #juicejacking https://t.co/QMpVmnCGZV https://t.co/qCLu1CyKXW
03 Jan 2020
Today the #California Consumer #privacy Act (#CCPA) goes into effect. Are you ready for another state based #privacylegislation or need federal USA privacy legislation just as the EU #GDPR? @PrivacyPros #happynewyear2020 https://t.co/wccccEt48J
31 Dec 2019
Real world product of face, gender, age recognition and emotion detection. Sold to register your reactions to advertising or shopper registration and shop optimising. Time to start disguising yourself in public area's? #privacy #facerecognition #ArtificialIntelligence https://t.co/Cg4MFA5pvL
25 Dec 2019
Bloomberg reports: Amazon is scouting warehouse sites on the outskirts of Dublin to fulfill Irish orders currently shipped from the UK. #Brexit preparations. https://t.co/0JkX7mAs4o
22 Dec 2019
XCA the Certificate and Key management tool by Christian HohnstädtThis application is intended for creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs. Everything that is needed for a CA is implemented. All CAs can sign sub-CAs recursively. These certificate chains are shown clearly.
For an easy company-wide use there are customiseable templates that can be used for certificate or request generation.
All cryptographic data is stored in a SQL database. SQLite, MySQL (MariaDB) and PostgreSQL databases are supported.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.4 : Sunday 19-1-2020
© Copyright 1995-2020 ing. Johan P.G. van Soest CIPM