Generate long passwords that are easy to remember.
Inspired by the xkcd comic.
What is CrashPlan? You’re likely familiar with online backup services like Mozy and Carbonite. You install an application on your computer, buy an account with the cloud-based backup provider, and then it uploads your files for safe keeping. CrashPlan is like Mozy/Carbonite on steroids. Instead of limiting you to simple cloud-based storage, CrashPlan offers a multi-tier backup strategy that includes the following: Cloud-based storage (for pay, but very reasonably priced), Remote storage (friend-to-friend backups), Local network backup (backup to home server or NAS unit), and Folder backup (backup to secondary or external hard drive).
Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.
If you need to have an encrypted, private chat but don’t have the tools handy to do so, you can just use Cryptocat. While anyone will be able to enter the chatroom if they know its name, nobody without your secret key will be able to see what you’re saying. To get started, you choose a chatroom name on the Cryptocat site and then share that name with anyone you want to talk to. You’ll also need a secret key that both you and anyone else in the conversation knows. If your key matches the key of someone else, your chat messages will be revealed to one another. If not, they’ll just show up as “encrypted.”
Want to secure your computer with the same techniques used by the National Security Agency? Turns out the NSA has published guides for securing Windows, Mac, Linux, and Solaris operating systems using methods that “are currently being used throughout the government and by numerous entities as a security baseline for their systems.”
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones.
If you suspect you have been infected by a rootkit, there are a few steps you can do. First, run a regular virus scan. The simplest ones can be removed with the most up-to-date antivirus programs. The scans can be run in safe or regular mode, however true rootkits may not show up easily. A better option is to use specialized rootkit detectors.