Security
Security Interlude: The real-world difference between Hashing and Encryption
Roger Smith Security, Software Encryption, hacking, hashing, password, retrieval, Security 0 Comments
Last week we learned about the other half of the encryption/hashing relationship. Hopefully you remember the cake/safe deposit box analogy that we’ve been exploring from this StackOverflow answer. More →
Security 102: What is Hashing?
Roger Smith Security, Software algorithm, Hash, object storage, password, Security 0 Comments
Welcome to our second blog post on basic security! Last week we were discussing encryption, and it’s ability to convert information between its’ encrypted and unencrypted states, using a ‘key’ to perform the conversion. This week, we’ll take a look at hashing, the one-way bridge of the security world. Remember, most of this analogy comes courtesy of this StackOverflow answer. More →
Security 101: What is Encryption?
Roger Smith Security, Software Encryption, Hash, Password Storage, Security 0 Comments
While doing some security reading for my internship last week, I saw hashing and encryption mentioned quite a bit, and had originally thought the two terms interchangeable, believing that a hash was the result of an encryption. I was wrong though, and needed to find the difference. Luckily, Eric pushed me in the direction of a good analogy, which you can find on the ever-trusty StackOverflow. More →
ESET Security
Roger Smith Security, Software Affordable, Android, Antivirus, Award, ESET 0 Comments
When you’re working with computers on a regular basis, it’s important that you take the appropriate measures to protect yourself. We’ve used the ESET security range for a while now and recommend it to all of our clients. Not only does it provide excellent protection, but it is also affordable and not as invasive as a lot of other security products on the market.
The future is open source
Roger Smith Open Source, Security, Software firefox, free software, open source, open source software, proprietary software, richard stallman, rms 2 Comments
Close your eyes and let your imagination run wild. Imagine a world that granted you the power to extend your creativity farther than ever before. A world where opportunity was more abundant than ever, and there were a greater number of resources at your disposal. A world where everyone in it had endless potential.
Now open your eyes. Slowly but surely, that imagination is transforming itself into reality. That reality is being driven by an ever-growing movement of computer users worldwide. The move to Open Source software. More →
Determining a user’s security group in VBA
Eric Light Excel, Security, Software, VBA Advanced, Excel, Microsoft, VBA 0 Comments
We’ve recently completed a project where we needed our add-in to behave differently depending on the security group of the user. For example, if the user was an estimator, the add-in was to perform behaviour X; but if the user was clerical staff, the add-in should perform behaviour Y.