Are hackers watching you as you sleep? I think it’s a crazy world of hype and here’s why.
In 2011, as a grad student, I forensically examined a TrueCrypt container to see if I could tell if it contained anything useful for an investigation. In doing so I learned a lot about implementing strong encryption.
What happens when computer scammers call me? I give them “on the phone training in patience.”
You never know who in your neighborhood is up to no good. Don’t let computer security and home data management overwhelm you. Take baby steps.
We are all familiar with recommendation systems. When at Amazon, there is a “Recommended for you” section with items that, based on your previous purchase and browsing experience, Amazon thinks you may be interested in. Netflix too recommends movies that, based upon your previous selections, thinks you may watch. YouTube makes recommendations as well and […]
So between work and life and research for the next few blog posts, I haven’t gotten to blog or tweet much. Here are a few things I’ve been working on: Password managers, such as LastPass and KeePass, when to develop/not develop an app, and YouTube recommended video optimization. I’ve also been dealing with OpenID not […]