Sitting is the new smoking. So they say. Because sitting too much and not enough exercise is unhealthy. Say the data. And nobody smokes anymore today, almost nobody. Except for a few incorrigible ones and those who now have these new-fangled vaporizers. And yes, the comparison is a little misleading, because you cannot always choose the sitting position. After all, not every office offers standing desks for working. However, it is said that data is the new gold. And the many services we use today without paying for them are not actually free. We pay with our data. And in fact, we are not the customers, but the product. The customers are the advertisers who use our data for advertising purposes. Or other companies that who knows what to do with our data. The funny thing is: We are somewhere subconsciously aware of that. And actually, it […]
When networks became established in the companies, there was soon a desire to connect to the internal network from outside. The main reason was that you could access its resources in this way. For example, field staff wanted to access files stored on the internal file server. Of course, it would have been a possible way to make the server accessible from outside. It is obvious, however, that this might not be the optimal solution from a safety point of view (not that this has not been done anyway and probably is still being done). It is better to connect to the internal network from the outside and then become a part of it. VPNs (Virtual Private Networks) were introduced for this purpose. The employee then logs on to an externally accessible server with a specific protocol and then can work on it as if he were […]
The average German internet user has 15 different accounts. Some of them he created because he wanted to, others he was forced to create more or less. And every single one of them is normally protected by a password. Of course, the user is lazy and therefore he is using every time the same password. At least since the major security breaches at Yahoo, LinkedIn and Tumblr you see what are the consequences. The leaked email-password combinations were used to try them at others services on a large scale and with an astonished high hit ratio accounts could be compromised. Obviously, the question is how can this be prevented best. Additionally, there are two basic conditions that do not make this easier. For one thing, more and more services insist that the password of the users has to follow specific rules (special characters, numbers, minimum length, …). […]
I just wrote a summary about the new bill regarding the data retention and surveillance (a.k.a. Snoopers’ Charter) in Great Britain. This is one of the most strict in Europe. Once you delve deeper into the subject you will be glad to live in Germany (or not…). Another Reason for Using a VPN: the Investigatory Powers Bill Disclaimer: At the moment I am working at ZenMate. That is why the article is tailored to that. Of course I stand by this statements.