Jump to content

Shipkicker

Members
  • Posts

    579
  • Joined

Posts posted by Shipkicker

  1. Good advice from Wendy. I (personally) would NOT use any shared/public device to perform any secure transactions or access any site that requires authentication. I further would not use it for even web-based email. Even following all the advice, if the system has a malicious software (key stroke logger for instance) from a previous user and you access a secure site that requires you to authenticate; your credentials are at extreme risk of being compromised. You should always assume the hardware and access point is NOT SECURE unless it is your equipment and your access point and you know it to be secure. Now, how is that for more information than anyone ever wanted?:D

  2. As a former IT Manager/Info Security Officer for the FEDS (now retired), I have to add the issue of information security. Just be cognizant if you are going to process sensitive information (medical information, banking information, credit card accounts, etc.).

     

    On our Amazon cruise later this month, I understand they will provide an iPad in our Penthouse Suite. I may play with it a bit, but I will use my own netbook for anything that may be sensitive (including email).

×
×
  • Create New...