Blog Archives

Crypto 201: Public Key Infrastructure (PKI) – Cryptography for smarties (Part 1 of 3)

PKI with Vonnie, background image credit J. Triepke via Flickr

Cybersecurity gurus sometimes stumble over what SSL, HTTPS, TLS have in common.  Do you know the answer?  If you said the “S” then I’ll give you a gold star for being a smartie pants – but that’s not what I have in

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

How to find and erase all the cookies on your computer

Finding the Cookies on your computer. Background cookie image via Flickr from Neil Conway

I love cookies.  Oreos are good; everyone loves those but believe it or not: they aren’t my favorite.  Walkers Shortbread cookies are also pretty damn good but they don’t take the gold in my book. The cookies I’m really digging these

Posted in Google Chrome, Internet Explorer 10, Internet Explorer 11, Internet Explorer 9, Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mozilla Firefox, Opera, Safari, Samsung Galaxy S4, Web Browsers, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: ,

Crypto Hypno: Cryptography basics (Part 5 of 5)

Crypto Hypno

Ahh the refreshing scent of cryptography.  It’s like a fresh rose on valentines day. In my last post you learned about VPNs.  I showed you the nitty gritty itty details about the protocol and both phases (hopefully you didn’t phase out

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, What Is, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 4 of 5)

Crypto Hypno

If you’ve been following this series from its infancy, you should already know the basics of encryption, symmetric/asymmetric encryption, and message hashing.  Today we’re going to tie everything together in tidy little bow.  You’ll learn about the two primary ways we

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Crypto Hypno: Cryptography basics (Part 3 of 5)

Crypto Hypno

In the first article you learned about encryption basics.  In the second part, I showed you the difference between symmetric and asymmetric encryption.  And now you’ve graduated to the hypnotizing world of hashing. We’re going to talk about data integrity and

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,