//
archives

IT

This category contains 85 posts

After Life: Digital

With the passing of a friend or loved one it becomes hard to imaging life without them. But with a “footprint” stamped across your digital life perhaps none of us are really lost any more?

Forget dead man’s shoes, what about his fingers?

We often make some assumptions about dignity and privacy in death and even about the l efforts that would be put into investigating, say, our murder (if we are that unlucky.) But what happens when these worlds collide? Would you want law enforcement to use your corpse to unlock your phone to aid their investigation? … Continue reading

Social Legitimacy

This week (21/Jul/2016) Twitter extended the verified accounts scheme to allow direct applications. The “blue tick” scheme allows an account to become the official account associated with a brand or individual.  This is a cherished feature in Twitter, especially for celebrity individuals who are often spoofed or targeted by look-a-like accounts.   The process is … Continue reading

Data Retention

We all assume that we can keep information forever in our new digital world. This is not true. Data behind information does corrupt or lose integrity over time.  It can also be attacked and deleted.  There are mechanisms that allow you to know when any of this has happened but when it does there is … Continue reading

Automatic Update vital for Antivirus

The importance of enabling automatic updates has again been highlighted; this time it’s a critical flaw in an antivirus program that needs patching. Using Symantec Antivirus products and having the “Live Update” enabled – the default –   Will mean the update arrive Monday.  If not it is advised that the president induct update check … Continue reading

Categories

RSS This Blog…

  • An error has occurred; the feed is probably down. Try again later.

Share me…

Bookmark and Share

Twitter Updates

June 2017
S M T W T F S
« May    
 123
45678910
11121314151617
18192021222324
252627282930