Recent content by cag61

  1. C

    Heads up: EFTPS now requires new login

    I use authenticator - "Authy", it runs on phones, tablets, PCs, MACs, Linux. The database is shared between devices. Changing devices or browsers has no impact. Hope that helps people. Yes, the entire Federal government is moving to 2FA. Some are using ID.ME or Login.GOV (GSA - Federal...
  2. C

    Poll: Do You Remove Shoes Entering Your House?

    No outside shoes in house. Use Slippers or inside shoes. Dog gets a wash if muddy or a wipe down if wet. Living in Hawaii that is the tradition. Kept it up after moving to the mainland. Keeps out little rocks, pine needles, etc.
  3. C

    OneDrive -- make it stop!

    ok, this is really simple. I have Windows 11 so it might be a little different for 10. right click on the cloud in the lower right (should say OneDrive). click on settings. click on the backup tab. make sure there are no boxes checked - Photos and Videos and Screenshots click "manage backup"...
  4. C

    How vulnerable are individuals to cyber attacks?

    Yes, that is the one. It had a huge impact to commercial and government users.
  5. C

    How vulnerable are individuals to cyber attacks?

    I wanted to explain why I used KeePass and not something like 1Password. Simple, I control the key and I can save the password files it anywhere I want. Also, you don't need to pay for this. If you check out "best password managers" you will only find "paid" or limited versions. Why...
  6. C

    How vulnerable are individuals to cyber attacks?

    Hi, I thought I would clear up some misunderstanding. Google and Microsoft both use a "standard" for 2FA. That means you don't have to use their authenticators but anyone that follows that standard, such as Authy. I use Authy for my Microsoft and Google Accounts. Then the QR code is...
  7. C

    How vulnerable are individuals to cyber attacks?

    If you want to do 2-factor, consider using a company like Authy rather than Google or Microsoft. I say this simply because neither of them support using a PC rather than a phone. Most 2-factor uses a standard that works with any of these. I happen to use Authy because I want to have it on my...
  8. C

    How vulnerable are individuals to cyber attacks?

    So, any computer system is a target including Linux ones. Just ask yourself what is Linux used for mostly? Servers running applications and databases... If you think you are not a target check your router's logs and see how many DOS (Denial of Services) attacks you get. For Windows, the...
  9. C

    Poll: Do you have a pension?

    You really need to fix the poll, I have both a Government and Corporate pension, but the poll doesn't allow that. Some might have a Military one or a Non-Profit
Back
Top Bottom