Use Authy for 2 Factor Authentication (2FA)

Two-factor authentication (2FA) is one of the best ways for a consumer to secure account access on pretty much any platform. Accordingly, if 2FA or MFA (Multi-Factor Authentication) is offered on any platform that you currently use, then I strongly recommend that you take advantage of it.

When logging into any platform, your 1st “factor” is your password for that account.  For example, if you’ve set up SMS Authentication, email authentication, or use an Authentication App, then the code/link in your SMS/email/App is the 2nd factor, thus the “two-factor” in 2FA. That single EXTRA piece of information alongside your account password goes a long way in helping to secure your account.  Some would argue that SMS and E-mail 2FA are bad because they are more readily bypassed by Hackers.  This is a TRUE statement, however, in my book, any type of additional “factor” for authentication is a good thing, so even SMS and E-mail is better than nothing!
Continue reading

Making an Ethernet (10/100/1000) Loopback (LPBK) Plug

Sometimes you need to prove that an Ethernet port you want to use is in good working condition, but maybe you’re having problems confirming continuity across the port to the next piece of equipment.  A simple solution is to create a Loopback (LPBK) Plug and plug it into the port in question.  If the port is in good working condition, then the LNK LED light will light-up to indicate that this port sees the next device and everything is good.  

Well, in reality, you merely held-up a mirror for your device to see itself.   As long as it was satisfied that connectivity was achieved, then the port itself is in great condition.

Continue reading

Open Letter to Mobile Internet Providers; your Internet Pathfinding Logic is broken

I’d like to discuss a little problem I’ve been having for a few years now, and it’s becoming a real pain, because it’s breaking my “mobile” user experience.   In what should be a “seamless” User Experience, I seem to be tripping over the seam between my mobile device’s Mobile Data Plan and any Wi-Fi networks.

Continue reading

Dangerous new Bluetooth Vulnerability affects almost all BT capable devices.

Security researchers at Armis, the security research company that had originally discovered the exploit, have identified the eight vulnerabilities — which have been collectively named as “BlueBorne”.  It is expected that this set of vulnerabilities in the Bluetooth radio implementation almost certainly affects over 5.3 billion devices.

Continue reading

For Bloggers who lament the EOL of Windows Live Writer

For those Bloggers like myself who used and loved the Windows Live Writer (latest version was I believe v16.4.3528.0331), it was truly the single greatest piece of code I had on my laptop at the time.   I was blogging across three or four active sites at the time, and life was generally good.   But then Windows Live Writer’s EOL happened: the End of Life back in August of 2012 when Microsoft decided it didn’t want to continue to support the product.   I seem to recall talk of folding the dev crew into Window team.   Regardless, it was a critical hit in my ability to Blog efficiently.  Of course, I kept using the 2012 version, but there were times when I needed to re-install it, and lost the location of my previous download, or on those occasions in 2016 when it didn’t work very well with Win10.

Continue reading

Bummed about all the “No Man’s Sky” issues…

So back when Hello Studios was promoting their soon to release “No Man’s Sky”, it looked great, and was promised to include many multiplayer perks.   After many delays, the game has materialized, but not the game I was hoping for.  At best it is a wholly different form than the version that was advertised.

Continue reading

Hardening your Android Device, Part-3

Securing your Android Phone can be accomplished in many different ways, and by catering to many different tastes, so no single way is correct, or best for everyone. I do recommend at least the following as a minimum spread on your device.  There are three main areas for security on your device, those settings which left in default mode can be a serious security risk, those apps and programs which help secure your device like AntiVirus and AntiMalware, and AntiTheft apps which can lock-down and secure your information should your device be lost or stolen.

Continue reading