Security

Two-factor authentication (2FA)
If you aren’t security conscious, then you should probably see how one of Wired.com author’s digital life was destroyed. After reading that story, we have j...
Fri, 1 May, 2020 at 2:50 PM
Using Google Authenticator 2-step verification
Note: Google Authenticator only works on iOS, Android, Windows Phone, webOS, PalmOS, and BlackBerry devices. In other words you will need your smart phone t...
Thu, 23 Nov, 2017 at 3:23 PM
Renaming the Wordpress Admin Directory
Don’t do this. In the information security field this is called security through obscurity. You are obscuring the location of your wp-admin or WordPress...
Thu, 13 Jul, 2017 at 9:50 AM
Data Encryption
Definition Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) o...
Wed, 30 Aug, 2017 at 3:34 PM
Using Authy 2-step verification
Note: Authy works on iOS, Android devices, Windows and Macs. How Does it Work? Normally passwords can be cracked. If you are using the same password on...
Fri, 1 May, 2020 at 2:48 PM
Security measures protecting your web presence.
There are several “Levels” to your web presence and in most cases (unless your I.T. department has dictated the use of an alternate solution) Skunkworks has...
Mon, 19 Apr, 2021 at 5:13 PM