Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel
If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...
Apple, Defense, MacOS, Software, Tips
From the moment I first started using MacOS X, I fell in love. It was like my long-time favorite Macintosh <= v9 had spawned with my other love, NeXTStep, to create an exquisite underlying The Jurassic Park scene where the girl says “This is a UNIX system! I...
Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel
If you will be traveling internationally, you might be wondering how to protect your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY NETWORK you connect to (including your home network) is potentially...
History, Humans, Stories, Women in Tech
1. Ada Lovelace is known as the first programmer in the history and pioneer of the modern computing. Her name is quite famous in the developers’ realm, but do You know everything? Know Everything About World’s First Programmer, Ada Lovelace 2. Margaret...
Devil's Advocate, Passwords
I love playing devil’s advocate. It helps with the analysis process. Here’s your dose of Devil’s Advocacy – just a malicious user story for your secure threat analysis: Sometimes it seems like we’re just encrypting secrets with more...