Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Privacy Archives - Page 3 of 11 - fixedByVonnie
Blog Archives

Crypto Hypno: Cryptography basics (Part 3 of 5)

Crypto Hypno

In the first article you learned about encryption basics.  In the second part, I showed you the difference between symmetric and asymmetric encryption.  And now you’ve graduated to the hypnotizing world of hashing. We’re going to talk about data integrity and

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 1 of 5)

Crypto Hypno

Today we’re going to look into how we can make it safer to send traffic on networks.  By embracing encryption we can protect the data that devices use to communicate with each other.  So let me start by saying cryptography is an

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

How to disable the HD iSight webcam on your Mac

Have you ever wondered if someone might be illicitly staring back at you through your webcam; watching your every move; all without your knowledge?  Cynics have known this for ages, but people who generally trust humanity might be surprised.  Yes, there

Posted in Apple, Laptops, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks Tagged with: , , , ,

What is SuperFish?

Quick, go to https://filippo.io/Badfish/ to see if your Lenovo computer is vulnerable to the Superfish security hole. What the heck is Vonnie talking about here? Here’s the story: between the months of September and December 2014, Lenovo (the biggest maker of consumer

Posted in News Tagged with: , ,

Why is my name in the upper right corner of Google Chrome?

Why is your name in the upper right corner of the Google Chrome title bar?

So, the other day I popped open Google Chrome and noticed my name sitting in the upper right corner of the title Bar.  I mused to myself: Huh? That’s weird.  How did that get there? So here’s the deal: this is

Posted in Google Chrome, Web Browsers, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista Tagged with: , , ,