SeanPT

Managed Services Proffessional

""


Best Practices

P@$$w0rd$

Posted by Sean On September - 2 - 2010Comments Off

Switched has a great article on passwords that everyone needs to read. It covers all of the basics — long passwords, random passwords, special characters, etc. Another trick is to use something about the site and add it to your standard password.

For example, lets say you always use “red” as your password. For yahoo.com your password would be yahoo.com_red. For google.com it would be google.com_red, etc.
Personally I like using the first letter of song lyrics. For example, “I went down in a burning ring of fire” would be Iwdiabrof.

Inside look at the new Facebook privacy settings

Posted by Sean On May - 29 - 2010Comments Off

Switched has a great new article that breaks down all the recent privacy control settings on Facebook. There has been a lot of recent uproar over Facebook privacy settings and personally they didn’t make much sense. I had long ago realized two very important things. First off, if I didn’t want some bit of information online, I don’t put it online. Your own brain is always going to be the most powerful tool you have. Second, if it was important to me (and it was) I could take 5 minutes to go through the privacy settings and get the exact granular control I wanted. However, for some people, there was a desire to have a simple one click process and now that is available.

If you have any questions about Facebook and privacy, check out the article.

Don’t click on that attachment!

Posted by Sean On October - 25 - 2009Comments Off

There are a few exercises that everyone must perform when a new e-mail comes in. It doesn’t matter how deluged in spam you are, you still have to go through these steps with every single e-mail. You have to first decide if you know who sent you the e-mail. Then you have to decide if you trust it enough to look at the e-mail itself. From there you have to decide if that person really sent you that e-mail or if it is a fake and the true origins are hidden.

At any point along the way, you may just delete the message and move on to the next e-mail. But if you trusted everything so far, you may be tempted to open the attachment that came with the e-mail. But at this point, you must ask yourself more questions. First, were you expecting an attachment from this person? If you weren’t, reply back and ask for some kind of human verification that everything is ok. It takes a few seconds for both parties but can save hours of torment.

And it is because of that torment that you must also ask yourself “Is it worth it?” “Is seeing a funny video, looking at these pictures, or opening this document at this time worth the potential risk?” Most of the time, the answer is “No!”