Some Fortinet products shipped with hardcoded encryption keys https://flip.it/_GZKq7
A live network map has items that turn Red/Amber/Green based on the state of the state of the device being depicted. The easiest software I have found to do this is PRTG Maps. Maps, Add Map, Give it a name, optionally select a background image, and I usually select Allow Public Access via URL so …
The method below has been replaced by YoDeck Install Chromium Browser Add Carousel Add-in to cycle through tabs. Disable Screen Blanking: sudo apt-get updatesudo apt-get install xscreensaver It will take a minute for the installation to complete, be patient Under preferences you will find a new item called Screensaver, set Mode to Disabled. source
BYOD; some companies do cell phone monitoring. how to not monitor sensitive/banking data? When a user is let go; how do you delete all data from backups? Each user gets a separate Encryption key. When user is let go, their corresponding key is deleted.
New 3D printer makes multi-material robots: https://youtu.be/2WL4b03Tfjg
Shady app lets stalkers view private Instagram accounts in exchange for their own data http://flip.it/2cSSUx
Online backups are NOT a solution to Ransomware as the Ransomware can encrypt the backups the same way it encrypts all other files. It is difficult to get your backup software to do 2FA as it requires human intervention. 2 Factor Authentication (2FA) means something other than a password, ie fingerprint, faceID, Time based token …