This blog is convinced that the most important security practice a computer user can adopt is that of having a strong password. We’ve written that the stronger the password, the more difficult it is to crack. And that the more difficult the password is to crack, the longer it takes; and that hackers don’t like to hang around very long when they’re breaking the law. Continue reading
Tag Archives: Paul’s Home Computing Blog
Yesterday this blog published it’s 300th post. That’s a lot of writing! Seriously though, while it’s an important milestone for this blog; it seems like just a short time ago, May 2009, that we published our first one. We started out as Paul’s Home Computing Blog, writing about issues facing the home computer user, but gravitated to Internet security issues to help our readers use the Internet more safely. Continue reading
We’ve changed our name to better fit the content of our blog. We began Paul’s Home Computing Blog to share tips, techniques and advice on home computers and the home computing environment. However, because of the greater interest in Internet security, we’ve been writing almost entirely on Internet security and how it affects our computer and our Internet experience. Continue reading
Russian-speaking hackers have doubled their “earnings” in 2011…to US$4.5 billion. Yes, that’s billion, with a “B”. And…they came in second to English-speaking hackers accounting for 40% of the global cyber crime “market”; Russian-speaking hackers made up 36%, and Chinese speakers – about 18%. According to the report by Group IB, the Russian-speaking hackers were made up of “…not only computer geeks, but also traditional crime groups getting their own piece of the growing cyber criminality” Continue reading
Do you know what 3G or 4G means? The List Of Terms page has been updated…yes, it’s been a long time coming, I know. However, it’s now got around 50 terms and definitions for your use in deciphering the many technology terms in use today. I really try to keep my articles as slang-free and readable as possible, but alas, I tend to use terms such as botnet, virus, trojan horse, and worm in trying to help my readers protect themselves from the bad guys on the Internet. Therefore, I hope you’ll find the updated List Of Terms page of this blog helpful in understanding the issues on which we report.
Millions of people use their desktop computer, smartphone, iPAD, or laptop to expose their banking account information, including their credit and debit card numbers, to theft and fraud by cyber-criminals. Online banking is very convenient, saves time and money, and gives us something productive to do with our computers. It is also very dangerous, particularly when using a mobile device to perform banking transactions. Continue reading