Preventing reuse of passwords
Password management is challenging because passwords are traditionally chosen by users themselves. This article presents a method of strongly discouraging the reuse of potentially compromised passwords. Continue reading
Password management is challenging because passwords are traditionally chosen by users themselves. This article presents a method of strongly discouraging the reuse of potentially compromised passwords. Continue reading
An investigation into the feasibility of high-fidelity 3D displays. Examines the history of 3D displays, the health implications of viewing low-quality 3D images, and the fundamental limits of 3D display quality in the context of current trends in the semiconductor market. Continue reading
Instructions for disabling the power button and disc eject buttons on your computer, without preventing a trained adult from using those functions. Continue reading
A brief review of Office 2010 with a discussion of the technical benefits and disadvantages of the 64-bit edition. Continue reading
A commentary on the governmental pressure on RIM over Blackberry communications security. Continue reading
Discussion of political and moral conflicts between human rights/ equal opportunities, and the right to act according to one's own conscience. Continue reading