DOCUMENTARY: Terms And Conditions May Apply (2013)

DOCUMENTARY: Terms And Conditions May Apply (2013)

This is a fantastic documentary looking at technology, privacy, and how industry and government are building an all seeing big brother surveillance net around the world. 135 more words

a16z Podcast: How Hacks Happen (Let’s Just Say Mistakes Have Been Made)

The Target hack came through the side door via a vendor that had access to Target’s system. Expect to see more of that, and ever-more sophisticated hacks, says Wired security writer Kim Zetter. 117 more words

How hackable are you really?

As long as we are online, we are vulnerable to malware, viruses etc. that can steal sensitive information, hijack web sessions/webcams or spy on our keystrokes. 436 more words


What is Your Last Resort?

“Asa had an army of three hundred thousand from Judah who carried shields and spears, and from Benjamin two hundred and eighty thousand men who carried shields and drew bows; all these were mighty men of valor.

535 more words

God Yearns to be Strong for You

“Then Zerah the Ethiopian came out against them with an army of a million men and three hundred chariots, and he came to Mareshah. So Asa went out against him, and they set the troops in battle array in the Valley of Zephathah at Mareshah.

401 more words

Microsoft Authenticator app

I blogged about two steps authentication before. You should enable two steps authentication in all your online main services (like email, blog). I am using this with my Microsoft account. 418 more words