Aug 7, 2012 | Blog, Uncategorized
Mat Honan’s entire digital life was hijacked by some clever hackers exploiting some simple security holes. Read the article at Wired.com.
Jun 5, 2012 | Blog, Interesting, Security
Kottke has a funny post about complex password requirements , but there are some good resources at the end of the article for developing secure passwords. Read it here. Exactly eight characters? No consecutive repeating characters? This is the internet equivalent of...
Apr 27, 2012 | Blog, CRM/xRM, Solutions
In this article Microsoft’s Steve Clayton explains the Metro design and how it is being incorporated into Microsoft productins including Windows and the Dynamics line. Last week I blogged about Metro style design getting some attention of late. I’ve been...
Nov 23, 2011 | Blog, Interesting, Security
Courtesy Forbes.com. by David Coursey If you see your password below, STOP! Do not finish reading this post and immediately go change your password — before you forget. You will probably make changes in several places since passwords tend to be reused for multiple...
Recent Comments