Follow me

Is The Government Telling The Truth When It Says Your Data Is Secure?

(I previously published this at Techcrunch.) Modern encryption systems are, in theory, exceptionally secure. The Advanced Encryption Standard (AES), for example, is so sophisticated that all known attacks are considered computationally infeasible. It is no surprise then, that the NSA considers [...continue reading]

ReputationDefender Protects Your Online Reputation

One of the major themes of The Virtual Handshake: Opening Doors and Closing Deals Online (see Chapter 16) is the need to preserve ones corporate and personal virtual reputation. I've long thought that there was a need for a business that would be a personal PR agent, which would monitor what's [...continue reading]

Loosing Google's Lock on the Past – New York Times

More on the ever-popular topic of how to clean up your online image: Loosing Google's Lock on the Past - New York Times. [...continue reading]

Protecting Your Files When a Password Isn't Enough

Protecting Your Files When a Password Isn't Enough. [...continue reading]

How to visit websites without sharing your real data

Many websites, particularly media sites, now require registration, usually to gather demographic data about users. If for any reason you don't want to register but still want to view the site, go to, which offers valid logins and passwords for hundreds, perhaps thousands, of sites.- [...continue reading]

Remove Embarrassing Hidden Data in Office 2003/XP

You'd think the people who make Microsoft Word understand enough about the program to avoid embarrassing themselves with unintended disclosures of internal information. You'd be wrong. See [...continue reading]

How to attract the most s p a m (CNET)

The great CNET sp am-off reveals the riskiest e-mail behaviors. Check it out to see what NOT to do. [...continue reading]

Some advice on avoiding identity theft

Some advice on avoiding identity theft. [...continue reading]

x Logo: Shield Security
This Site Is Protected By
Shield Security