Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

Editorials

Editorials

League of Legends Breach Shows Both How Not To and How To Approach Security

LeagueBreachThe game League of Legends has had some of their European and Nordic Database servers hacked; I know shocking right? According to the announcement by Riot the attackers exploited a specific security issue (again really?) that is now addressed and is no longer an issue. The attackers were able to get user login information, including passwords (encrypted), email addresses, “summoner name”, date of birth, and a small number of encrypted security questions and their answers.

Details
By Sean Kalinich
Sean Kalinich
Jun 10
Hits: 3576
  • Security
  • online gaming
  • Riot
  • League of Legends
  • Security Breach
  • Password Encryption

Read more: League of Legends Breach Shows Both How Not To...

No comments on “League of Legends Breach Shows Both How Not To and How To Approach Security”
Editorials

Author Of Password Hashing Software md5crypt Says Stop Using It

84After the breaches and issues with passwords we saw last week we were not surprised to see the creator of a popular password hashing application md5crypt() come out and recommend against using this software. Now if you have followed security then you are probably already aware that the MD5 encryption scheme was broken quite a while ago (2004-2005) and is no longer recommended as an encryption algorithm. So why in 2012 are we only getting a recommendation to stop using md5crypt() now?

Details
By Sean Kalinich
Sean Kalinich
Jun 09
Hits: 3633
  • Hacking
  • Security
  • Cloud Services
  • Hashing
  • Salting
  • Password Security
  • md5crypt

Read more: Author Of Password Hashing Software md5crypt...

No comments on “Author Of Password Hashing Software md5crypt Says Stop Using It ”
Editorials

Microsoft Is Trying to Push a Car Up Hill With a Rope With the Windows 8 MetroUI

win8logoredesignedIt is no secret that we are not fond of the direction that Microsoft is moving in with Windows 8. The new operating system with its phone and touch based MetroUI is a step back from what many feel a Windows system is supposed to be. What many wonder is why this push of the MetroUI and the cloud services that are linked to it.

Details
By Sean Kalinich
Sean Kalinich
Jun 08
Hits: 3455
  • Apple
  • Performance
  • iOS
  • OSX
  • Microsoft
  • Windows 8
  • MetroUI
  • Windows Phone
  • Windows Phone 8

Read more: Microsoft Is Trying to Push a Car Up Hill With a...

No comments on “Microsoft Is Trying to Push a Car Up Hill With a Rope With the Windows 8 MetroUI”
Editorials

Is Apple Abusing the Patent System With Their Frequent Broad Design Patents?

14621rotten_appleYesterday we talked about a finding posted by the US Federal Trade Commission and sent to the US International Trade Commission on how product bans hurt consumers. Although the finding by the FTC was geared toward standards essential patents it also could be argued that any product ban is harmful to consumers unless the product in question was an outright copy. The comment was aimed at Apple and their pattern of filing for broad patents to ensure they have ammunition against competition.

Details
By Sean Kalinich
Sean Kalinich
Jun 08
Hits: 3614
  • Apple
  • Anticonsumer
  • Legal
  • Litigation
  • Samsung
  • US Patent Office
  • Patnet
  • USPO
  • Design Patent

Read more: Is Apple Abusing the Patent System With Their...

No comments on “Is Apple Abusing the Patent System With Their Frequent Broad Design Patents?”
Editorials

IPV6 Means More IP Addresses, But Comes With Some Concerns

ipv6_logoInternet Protocol Version 6 (IPV6) has officially launched in certain areas of the globe. The replacement for the aging Internet Protocol Version 4 (IPV4) is said to have built in security, Encryption capabilities and a ridiculous number of address combinations making it sustainable for a very long time. The downside is that, as with many core technology updates, there are not many products that use it and the average home user is facing a pretty steep learning curve in getting things going.

Details
By Sean Kalinich
Sean Kalinich
Jun 07
Hits: 5489
  • Apple
  • Windows
  • Security
  • Microsoft
  • Router
  • The Internet
  • ISP
  • IP Address
  • Internet Service Provider
  • IPV6
  • IPV4
  • Subnet Mask
  • Firewall
  • Linux

Read more: IPV6 Means More IP Addresses, But Comes With...

No comments on “IPV6 Means More IP Addresses, But Comes With Some Concerns”

More Articles …

  1. The LinkedIn Breach Raises Concerns About The Security of Cloud Services
  2. Product Ban Requests to the ITC Cause "Substantial Harm" To Consumers Says the FTC
  3. IDC Predicts That Windows Phone Will Pass iOS by 2016 To Grab The Number 2 Spot
  4. Microsoft's SmartGlass Is Great, But It Will Not Save Windows 8 or Windows Phone *** Update ***
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56

Page 52 of 89

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech