How Microsoft's strategy pushing Edge seems to be dooming both Edge and IE (and how you can get IE back in WIndows 10).
Continue Reading: Edge Versus Internet Explorer
Windows XP is certainly one example, but the topic of unsupported software turns out to be much more complex than we might think.
There's unsupported, and there's … unsupported.
Let's review some of the different aspects of unsupported software.
Continue Reading: What Does "Unsupported Software" Really Mean?
We rely on passwords to protect our online world. At the same time, hackers seem to be getting better at deciphering them.
In response, security folks created something called "two-factor" or "multi-factor" authentication.
It's something I strongly suggest you understand and consider using.
Two-factor authentication relies on two different types of information, both of which must be correct in order to confirm your identity.
Continue Reading: Two-Factor Authentication Keeps the Hackers Out
There are people who believe that using password managers represents a single point of failure. Very technically, they are mostly correct: if someone gains access to your password manager, they have access to everything within it.
But not-so-technically, I strongly believe they are seriously misguided.
Using a password manager is, in my opinion, significantly safer than the alternatives.
Continue Reading: Are Password Managers Safe?
Like Ask Leo! on Facebook!
Are you on Facebook? Have you "Liked" Ask Leo! yet?
More than new article notification, you'll get breaking news,
random (and sometimes snarky) commentary on the tech world, and more.
Visit (and Like!) the
Ask Leo! Facebook Page
- Ask Leo! #603 - Racing Bases, Changing Email, Sniffing Traffic, Backing Up Photos, and more...
- The Wrong Way to Change Your Email Address
- Can Hotel Internet Traffic Be Sniffed?
- How to Back Up Photos and Never Lose Them Again
- The Binary "Base Race"
Most recent forum posts
Questions recently posted at The Ask Leo! Forum. If you see "Answer Needed!", maybe you can help!
Two-factor authentication is a mechanism for verifying identity that relies on two different types of things, both of which must be correct, in order to allow access.
Traditionally, authentication has been in the form of something you know: i.e. a password, and perhaps the accompanying answers to a set of security questions. Since this is simply based on knowledge (if you know your password, you must be authorized to access this account) it's easily transferred from one person to another – intentionally or otherwise.
The most common form of two-factor authentication adds something you have to the requirements. You must prove that you are in possession of something specific, something that is completely unique to you and of which there is only one.
A popular implementation of this is in the form of key-chain fobs or smartphone applications such as Google Authenticator, which present a six-digit number that changes every 30 seconds. That six-digit number is generated by a cryptographic algorithm and is tied to your account in such a way that only your device has the correct number for your account at any point in time. Because the algorithm used to generate the number is based on a form of cryptography, it's not possible to predict the numbers that would be displayed without the secret keys held by the authentication system.
You then simply "prove" you have your phone or key-chain fob by entering the number displayed on it when requested.
Another factor that can be used is something you are, which typically boils down to facial recognition, fingerprint scanning, or other biometric measurement.
While each can be used in isolation – something you know, something you have, or something you are – as the very common "single factor authentication", requiring more than one factor increases security dramatically. While two-factor authentication naturally requires two, it's actually a subset of "multi-factor authentication", which can require two or more.
H Davis writes:
The question was 'What did you learn before you realized you learned it?'
In high school was were allowed a few elective courses, none of them all that interesting. But on a lark I chose typing figuring that it might come in handy some day. It was a mixed class of business bound kids, mostly girls heading for secretarial work and a few misfits like me who were heading for college. There were about a half dozen IBM Selectrics which were rotated through the class except for folks like me who weren't really going to get anything out of the class so why waste a precious resource on them. I didn't even have a machine at home on which to practice. I attended all the classes and achieved a speed of 20 words/minute by the end. Fair but I definitely wouldn't be getting any secretarial jobs in the future.
Time passed and even in my college work typing didn't loom large. I muddled through any papers required (engineers don't write many papers) and didn't make much effort to improve my typing skills. There was no such thing as a personal computer at the time. Fortran programming was done on a keypunch machine and you got one run a day.
Then the personal computer arrived and I got an early one; a Heath/Zenith. It seemed there was a lot of typing involved with these new computers. As time passed I noticed I was getting better and better and I didn't need white out. Without the fear of making a mistake which would bring my overall speed crashing down I could really go fast. Through my working career I flew on the key board always noticing my associates, who lacked my wisdom and didn't take any typing classes, hunting and pecking at their keyboards. Looking back I rank that typing class as one of the most important I've ever taken.
Now that I'm a (lot) older a little arthritis has set in and I have a crooked left little finger so the "a" is getting really hard to hit and my speed has fallen off. And I've placed a curse on all tablets and phones because you can't touch type on them.
I signed up for typing in high school first year. It was cancelled for lack of interest. (I went to an all-boys school.) So I've spend the last
Ray Smith writes:
To keep things in perspective, the risk involved with using a hotel's wireless network is small. Remember, millions of people using public networks - at airports, libraries, coffee shops, hotels, etc. - every day and the vast majority suffer no adverse consequences. Additionally, the majority of sensitive online transactions - such as banking, purchases and even Facebook logins - are encrypted via HTTPS and so even if somebody were to be snooping, they'd be unable to see the data exchanges in transactions.
Ask Leo! on Business
You can make it easier on your audience by sharing links to your site or to other pages as clearly and as simply as possible.
Read: Share URLs Correctly
More Ask Leo!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC
Fatal error: Call to undefined function related_posts() in /home/alnews/public_html/wp-content/themes/askleo-generatepress/functions.php on line 195