Have you ever sent an email or an IM to the wrong person? Have you ever sent the wrong attachment? I’m not the first person to think about and write about this problem online, but let me tell you one of my strategies that can help contain the scope of the damage: Do everything you can […]
Passwords are problematic. This guide shows you how to manage a personal password list with multiple copies on different computers, synchronization among the computers, and encrypted storage. You’ll need to be at least somewhat familiar with your system’s command prompt and with unix in general to follow the guide, but you should be able to […]
This guide will show you how to use the free public key cryptography system, GNU Privacy Guard. GPG provides functions to encrypt and decrypt data and to create and verify signatures, using public key cryptography.