Experience with Nitro FIDO2 security key
In this article I describe my first experiences with my FIDO2 security key from NitroKey. Interesting is the different implementation at different services. The main issue remains the lack of acceptance.
An attempt to do something with IT!
In this article I describe my first experiences with my FIDO2 security key from NitroKey. Interesting is the different implementation at different services. The main issue remains the lack of acceptance.
Windows now supports encryption with Bitlocker in the Home Edition of Windows, but the implementation needs improvement.
In the article I describe my personal experience with the Windows Storage Pool. I originally used the pool because of its flexibility and protection against disk failures, but I encountered problems with unexplained storage space consumption. The lack of success of my attempts to solve the problem and further consideration I present in this article.
I already wrote this article partly on the 30th birthday of SMS at the beginning of December 2022, but then it had lost relevance. In view of the current discussion about switching off SMS as the second factor in Twitter, I would like to take up the topic again.
You can do great things with DNS. For instance, breaking this blog. Sometimes it helps to read RFCs.
After ChatGPT was allowed to write two articles in this blog, I want to go into why this is interesting but won’t happen again. I describe how AI will hopefully simplify my job in the future and what consequences that might have for society. I also briefly address the issue of security in AI.
The 30th birthday of SMS is a good occasion to discuss the IT security of SMS messages. Compared to other communication methods, SMS is less secure because the protocol used for SMS, called SS7, is susceptible to hacking attacks. Another weakness of SMS is its lack of support for multi-factor authentication (MFA), which increases the security of online accounts.
Salesforce offers different types of encryption for different data fields to protect customer data. The Schrems II ruling by the European Court of Justice presents a challenge to Salesforce’s data security. Despite various security measures, there have been security incidents on the Salesforce platform. Customers should therefore regularly review their security measures and be aware of suspicious activity.
I was considering whether it would make sense to use the framework laptop with different OS to plug in as one laptop each. But I doubt whether the IT department would support that.
Some cases of data recovery or data loss in the last somewhat over ten years I find worth mentioning. After describing my procedure in the first part, I would like to describe here some characteristics and failures that led to this setup.