article thumbnail

Technology Short Take 176

Scott Lowe

Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. Rory McCune explains Kubernetes authentication. (TL;DR: It’s not as easy as it might seem.)

Linux 112
article thumbnail

There’s a better way to protect yourself from hackers and identity thieves

Vox

Authenticator apps like Google Authenticator might seem intimidating, but they’re easy to use and safer than texts. If you’re using texts for two-factor authentication, it’s time to change to an app. And you always use two-factor authentication, or 2FA. S3studio/Getty Images. Here’s what you need to know. No, “Passw0rd!”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Meet the 8 startups that just pitched at a virtual Demo Night hosted by Female Founders Alliance

GeekWire

This year’s cohort was selected from a batch of more than 400 applications. FFA is a social purpose corporation , a type of profit corporation the state of Washington created in 2012, and is funded primarily through corporate partners. Fix Fake solves this problem by halving the authentication costs.

article thumbnail

Three Impediments to the Internet of Things

The Investing Edge

So use in real-time may be best suited in process optimization for industrial applications where the refresh rates and data rates may be more suitable and there are fewer trust issues. Authentication, trust and personal privacy will all be significant issues, as consumers fret that their information or behavior is not used appropriately.

Internet 151
article thumbnail

Security attacks and countermeasures

Cloud Musings

Access is precipitated through various communication methodologies, such as email and instant message (IM) attachments, endpoints in an IT environment, applications and other vulnerabilities within such infrastructures as discovered by the attacker. Jackson 2012 ) Follow me at [link].' Grab this Headline Animator ( Thank you.

Security 159
article thumbnail

Liveblog: Hybrid Architectures, Bridging the Gap to the Cloud

Scott Lowe

IAM offers fine-grained access for AWS resources, offers multi-factor authentication for highly privileged users, and can integrate with corporate directories. This gives local authentication both on-premises as well as in AWS. A second file server, running Windows Server 2012 like the on-premises file server, running on AWS.

article thumbnail

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

by Brian Katz on August 28, 2012 · 0 comments. He was kind enough to place things like MDM (Mobile Device Management) and MAM (Mobile Application Management) in the diagram for us. Tags Applications. ©2011-2012 A Screws Loose. Standard Disclaimer. A Screw's Loose. Identify yourself for MIM. Uncategorized.