Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

[email protected]

In The News:

‘Oversharing’ on Google Calendar, and Making Sure Readers Come Back for More  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Jodi Rudoren, associate managing editor for audience, discussed ...
How Updates in iOS 13 and Android Q Will Change Your Smartphone  The New York TimesYear after year, Apple and Google announce big upgrades for their smartphone operating systems. That means the software that makes your phone tick is about ...
Here's how big tech companies like Google and Facebook set salaries for software engineers  CNBCWhen recent college graduates and friends Zuhayeer Musa and Zaheer Mohiuddin started to break into the software industry, everything they found on the ...
Outside the U.S., It’s All About WhatsApp  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Adam Satariano, a technology correspondent based in London, ...
Congress launches Big Tech antitrust probe | Personal Tech  The Oakland PressSAN FRANCISCO (AP) — The federal government may be warming up its antitrust enforcement machine and pointing it at Big Tech.
Is your product’s AI annoying people?  TechCrunchArtificial intelligence is allowing us all to consider surprising new ways to simplify the lives of our customers. As a product developer, your central focus is always ...
Are AirPods Worth the Costs?  The New York TimesApple's wireless earbuds have led to questions about personal tech as environmental scourge and punch line.
American Airlines now offers satellite-based Wi-Fi access across its mainline fleet  TechCrunchAmerican Airlines, the world's largest airline by fleet size and passenger traffic, has finished rolling out satellite-based broadband Wi-Fi to its entire mainline ...
Apple CEO Tim Cook: Technology companies need to take responsibility for chaos they create  CNBCAlthough Cook did not mention companies by name, his commencement speech in Silicon Valley's backyard mentioned data breaches, privacy violations, and ...
Get up close and personal with Leonardo da Vinci's Mona Lisa with the Louvre's first VR experience  Evening StandardIconic Parisian museum The Louvre is marking the 500th anniversary of the death of Leonardo da Vinci by teaming up with HTC Vive Arts to create a virtual ...
Taking Steps to Maximize Privacy While Covering the Lack of It  The New York TimesJennifer Valentino-DeVries, an investigative reporter who has delved into issues of online privacy, is “under no illusions” that protecting our digital selves is fully ...
Google’s Duplex Uses A.I. to Mimic Humans (Sometimes)  The New York TimesIn a free *service*, bots call restaurants and make reservations. The technology is impressive, except for when the caller is actually a person.
On Migrant Journeys With WhatsApp and Google Translate  The New York TimesMiriam Jordan, who covers immigration for The Times, says that migrants crossing the border often use WhatsApp and that Google Translate can break the ice.
Facebook says CEO did not ignore personal data issues - Tech News  The Star OnlineFacebook CEO Mark Zuckerberg did not knowingly violate an agreement with the regulator supervising the company's management of users' personal data, the ...
Target’s tech trouble clogs stores with long checkout lines  The Philadelphia InquirerA glitch stalled checkout lines at Target stores worldwide Saturday, exasperating shoppers and potentially eating into sales at a prime time for retailers, the day ...
Trump’s interested in breaking up Big Tech for all the wrong reasons  Vox.comOn CNBC, Trump demands tech giants let him have his way — or else.
Facebook collected device data on 187,000 users using banned snooping app  TechCrunchFacebook obtained personal and sensitive device data on about 187000 users of its now-defunct Research app, which Apple banned earlier this year after the ...
Get More From Your Letters With Custom Stationery for Print or Pixels  The New York TimesEven in today's digital world, notes sent under a formal letterhead can help get the right message across. Here's how to make your own powerful design with just ...
Apple previews new software as it diversifies beyond iPhones  The Oakland PressSAN JOSE, Calif. (AP) — Apple executives previewed a large set of privacy and speed-focused changes to the company's phone and computer software ...
Uber tests drone food delivery, launches new autonomous SUV  The Oakland PressWASHINGTON (AP) — Uber is testing restaurant food deliveries by drone.
Your home, it's only going to get smarter  Canada.comWhen it comes to the evolution of “smart” homes, things are just getting started. “Somebody the other night said … 'We're 25 per cent into the evolution of the ...
Father's Day 2019: 11 gift ideas for tech-savvy Dads  Ars TechnicaThe annual day devoted to dads is approaching yet again, so it's time to start thinking (if you haven't already) about what you can do to make your father figure ...
Hillel's tech corner: DayTwo: Your personal dietitian algorithm  The Jerusalem PostHow is it that I eat a slice of pizza and see the weight immediately, and my friend can eat a pizza pie and remain slim?
Taekwang fined for fattening owners' personal pockets  Korea TimesTaekwang Group was found to have illegally mobilized its units to purchase kimchi made by a company under the control of former Chairman Lee Ho-jin to fatten ...
Engineers are making a personal heating/cooling system you can wear - Tech News  The Star OnlineAre you always cold? Or always hot? Do you ever find yourself in an argument with someone over whether the heating should be turned up or down?
Majelan is a personal podcast player with premium content  TechCrunchMeet Majelan, a French startup that wants to make podcasts more accessible. Behind the scene, Majelan is the startup created by former Radio France CEO ...
Mark Zuckerberg did not ignore personal data issues: Facebook  Times NowCalifornia: Facebook CEO Mark Zuckerberg did not knowingly violate an agreement with the regulator supervising the company's management of users' ...
Millions of Instagram influencers had their contact data scraped and exposed  TechCrunchUpdate 5/23: Updated with additional comments from Facebook and a statement from Chtrbox. We have also updated the wording of the article to note that email ...
After Equifax breach, US watchdog says agencies aren’t properly verifying identities  TechCrunchA federal watchdog says the government should stop relying on the credit agencies to verify the identifies of those using government services. In a report out this ...
Neal Stephenson’s New Novel — Part Tech, Part Fantasy — Dazzles  The New York TimesFALL; OR, DODGE IN HELL By Neal Stephenson. Straw poll: Who thinks we're living in the Matrix? On the one hand, are we really to believe a single human is ...
California Tests a Digital ‘Fire Alarm’ for Mental Distress  The New York TimesThe state is teaming up with Silicon Valley to make mental health services more available. Promises abound, and so do potential problems.
Father's Day: Help your parent go digital, financially  LivemintMake sure you warn your dad about phishing apps and tell him how not to expose financial data to fraudsters.This Father's Day, here's how you can help your ...
Nearly all states use drones for range of work  The Oakland PressSALT LAKE CITY (AP) — In Utah, drones are hovering near avalanches to watch roaring snow. In North Carolina, they're searching for the nests of endangered ...
Apps That Blast Out Crime Alerts Don’t Have to Rattle You  The New York TimesNeighborhood-watch networks are on the rise, even though crime is not. Here's how to put the data into perspective.
Threat or promise? E-auto boom could cost industry jobs  The Oakland PressZWICKAU, Germany (AP) — Over 115 years the auto industry in the east German town of Zwickau has lived through wrenching upheavals including World War II ...
Walmart’s JetBlack personal shopping service customers are spending $1,500 per month  TechCrunchA year after Walmart's personal shopping *service* JetBlack launched in New York, the retailer reports two-thirds of customers engage with the *service* on a ...
Social media entrepreneur wanted domain name, took it at gunpoint  The Oakland PressRossi Lorathio Adams II had big plans to turn risque photos and footage of drunken bad behavior into a social media empire.
6 Tech Stocks to China-Proof Your Portfolio  Kiplinger's Personal FinanceThe ongoing trade war between the U.S. and China is having an unmistakably negative effect on the technology sector. Numerous tech stocks have heavy ...
How to Declutter and Organize Your Personal Tech in a Few Simple Steps  The Indian ExpressAccessories and data may not take up much physical space, but they contribute to frustration and anxiety. Here are ways to keep e-junk at bay, Marie ...
MI5 Handling Of Personal Data ‘Unlawful’, Watchdog Warns  Silicon UKIntelligence agency did not store data correctly and kept it for too long, official watchdog warns. The domestic intelligence *service* MI5 has been rapped over the ...
Apple Backs Off Crackdown on Parental-Control Apps  The New York TimesSAN JOSE, Calif. — Over the past year, Apple purged iPhone apps that helped people limit the amount of time they and their children spent on Apple devices, ...
Decentralized Identity: How Microsoft (and Others) Plan to Empower Users to Own and Control Personal Data  CointelegraphMicrosoft, one of the world's largest software makers by revenue, is currently on a blockchain streak. This time, Microsoft presented a vast blockchain-related ...
How do you teach kids about texting? Bring in the teenagers  The Oakland PressESSEN, Germany (AP) — How do you teach tech-savvy kids to safely navigate the digital world? In Germany, you bring in the teenagers.
Ottawa launches data strategy, eyes fines tied to tech giants' revenue  The Globe and Mail'Digital charter' will outline a series of principles to guide future legislation for data protection and online privacy, the Innovation Minister said.
Female-founded Finnish fashion tech startup NOMI launches new shopping platform based on your personal style  EU-StartupsFinnish fashion tech startup NOMI has launched a totally new shopping platform where women can discover their own personal style and shop accordingly.
Sliding Backward on Tech? There Are Benefits  The New York TimesPamela Paul, editor of The New York Times Book Review, decided to downgrade her tech two years ago. It has worked out, with paper and DVDs instead of the ...
14 Banks, 5 Tokens: Inside Fnality's Expansive Vision for Interbank Blockchains  CoinDeskThe Takeaway: With $63.2 million in *fresh* funding from 14 banks, Fnality is building tokenized versions of five major fiat currencies. The digitized fiat would be ...
Privacy policies are still too horrible to read in full  TechCrunchA year on from Europe's flagship update to the pan-EU data protection framework the Commission has warned that too many privacy policies are still too hard to ...
Military Personal Protective Equipment Market Modernization Programs to Offer Lucrative Opportunities to 2016-2024  TechdadzGlobal Military Personal Protective Equipment Market: Overview. Military personal protective equipment is an important part of military gear that is used for ...
Email sextortion scams are on the rise and they're scary — here's what to do if you get one  CNBC“You can panic,” reads the subject line of one fake sextortion email. Another has a victim's real password in the subject line, in an attempt to establish authenticity ...
Tech Is Changing New York, but Not How He Reports on the City  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? J. David Goodman, a metro reporter, discussed the tech he's using.
Devices That Will Invade Your Life in 2019 (and What’s Overhyped)  The New York TimesA.I. that responds to your voice. Next-generation wireless networks. If this year's biggest consumer technology trends have a familiar ring, there's a reason for ...
Capturing What’s Online in China Before It Vanishes  The New York TimesIt's important to preserve snapshots of China's internet before they vanish without a trace, says Raymond Zhong, a Times tech reporter in Beijing.
Truck Driver Tech to Reduce Injury Rates - Personal Injury  Lawyers.com BlogTruck Driver Tech to Reduce Injury Rates - Read the Personal Injury legal blogs that have been posted by Larry Pitt on Lawyers.com.
Do Not Track is back in the US Senate. And this time it means business. As in, fining businesses that stalk you online  The RegisterAnalysis New legislation that would put teeth into the web's Do Not Track option for internet users, by fining companies that ignore it, will be introduced this week ...
Lifting Journalism by Knowing What Readers Are Looking For  The New York TimesClaudio E. Cabrera, who specializes in search engine optimization, describes how he keeps track of what's hot in search and how that informs coverage — and ...
‘The Effects Cannot Be Overstated’: When Tech Invaded Media  The New York TimesJim Rutenberg reflects on the convergence of technology with media, and how that has changed his consumption habits and coverage. (Warning: iPhone ...
He Reported on Facebook. Now He Approaches It With Caution.  The New York TimesNick Confessore, an investigative reporter who has written about social media and data privacy, has changed his tech habits after what he has learned.
My 2019 tech: Here are the computers, gadgets, and accessories I'm using on a personal basis this year — and which ones I'd recommend  Business InsiderI review a lot of new tech for Business Insider, like headphones, gadgets and accessories. But reviewing tech isn't the same thing as owning it.
This Tech Makes D.I.Y. Key Duplication Easy. Maybe Too Easy.  The New York TimesYou can now take key duplication into your own hands using kiosks and apps from start-ups. Our columnist explored whether the benefits of this outweigh the ...
Limiting Your Digital Footprints in a Surveillance State  The New York TimesTo protect himself and his sources from prying eyes in China, Paul Mozur, a technology reporter in Shanghai, leaves just an “innocent trace” of digital exhaust.
The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing  The New York TimesFrom Facebook to creepy online ads, the worst tech of the year made the internet feel like an unsafe place to hang out. Yet there were some products that were ...
Zombie survival are games everywhere; 'Days Gone' plans to stand out  The Oakland PressOn April 26, Bend Studio will release "Days Gone," a post-apocalyptic, open-world game exclusive to PlayStation 4. The story revolves around Deacon St. John, ...
The Must-Have When Reporting on Disasters: A Satellite Phone  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Thomas Fuller, a national correspondent based in San Francisco, ...
I Deleted Facebook Last Year. Here’s What Changed (and What Didn’t).  The New York TimesOur personal tech columnist didn't lose touch with his true friends — but strange things did occur, including Instagram thinking he was a woman.
Game review: Days Gone is as stiff and meandering as its zombie enemies  Digital News AsiaI WAS about seven hours into Days Gone when I realised that I was bored. That's not a good sign. Sprawling, open world games like Days Gone – developed by ...
Digital Privacy Is a Big Concern in Europe. For This Reporter, Too.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Matt Apuzzo, an investigative correspondent in Brussels, discussed ...
Vivo Y17 launches in Singapore  Digital News AsiaGLOBAL smartphone brand Vivo has announced the launch of its Y17 smartphone. The Y17 features an AI triple camera that comes with a 13MP main camera, ...
Craig Wright Ordered to Personally Appear at Bitcoin Theft Mediation  CointelegraphA judge has ruled that a personal appearance by Craig Wright at mediation will promote “meaningful participation.”
What Is 5G? Here’s What You Need to Know About the New Cellular Network  The New York TimesThe transition to new fifth-generation networks, known as 5G, will affect how you use smartphones and many other devices. Let's talk about the essentials.
Where a TV Pro Goes for Video When YouTube Just Won’t Do  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Liz Day, a senior story editor for The Times's new television show, ...
A Favorite Tool While Reporting on Start-Ups: Paper?  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Erin Griffith, a start-ups and venture capital reporter in San Francisco ...
From Bubble Memory to Hot Spots and a Fly Rod  The New York TimesDavid E. Sanger, a national security correspondent, recounts his gear from the computers in use when he joined The Times in 1982 to his overloaded backpack ...
Talking to Taffy Is Low Tech. And Intense.  The New York TimesArmed with an Olympus recorder, she's spent time with Gwyneth Paltrow and Bradley Cooper. Here's how Taffy Brodesser-Akner of The New York Times ...
If I'm going to wear a computer on my face, it needs to be perfect  Financial PostTech reporter James McLeod test drives North's smart glasses Focals.
Stiff penalty: Prenda Law copyright troll gets 14 years of hard time for blue view 'n sue scam  The RegisterIt was a simple plan: obtain the rights to pornographic films, share copies of them online, then threaten to sue those downloading the skin flicks for copyright ...
How the opioid crisis is leading to elder financial abuse  The Washington PostRegulators are sending a message to investment professionals: The opioid epidemic could be affecting the retirement savings of your clients, so be on the ...
Review: Redmi Note 7, budget personified amidst challenges  Digital News AsiaCHINESE smartphone maker Xiaomi Corp has been the king of budget devices for some years now. The Beijing-based player has a range of smartphones from ...
Facebook Did Not Securely Store Passwords. Here’s What You Need to Know.  The New York TimesSAN FRANCISCO — Facebook said on Thursday that millions of user account passwords had been stored insecurely, potentially allowing employees to gain ...
Why Play a Music CD? ‘No Ads, No Privacy Terrors, No Algorithms’  The New York TimesStreaming services have revolutionized the discovery of songs, but here's why Ben Sisario, who covers the music industry, still likes to listen to compact discs.
Germany Is Wary of a Digital World (but Loves Its E-Toothbrushes)  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Melissa Eddy, a Berlin correspondent for The Times, discussed the ...
100 Bitcoin Users Perform What Might Be Largest 'CoinJoin' Transaction Ever  CoinDeskThe community behind the privacy-centric bitcoin app Wasabi Wallet recently brought together 100 people to collectively execute a “CoinJoin” transaction on ...
When the Tools of the Trade Are the Keyboard and Mouse  The New York TimesFor Daisuke Wakabayashi, who covers Google, computer accessories are important. Very important.
New ‘digital charter’ to emphasize Canadians’ control over personal data  Toronto StarThe federal Liberals are releasing a set of principles for regulating the digital sphere and promising “strong enforcement” against tech giants that break the law, ...
Your Facebook profile can indicate if you have a medical condition, a study finds  CNNIn a new study, researchers were able to predict 21 types of medical conditions -- ranging from pregnancy to skin disorders -- by analyzing people's Facebook ...
Power Move Before Power Lunch: Tron CEO Switches Venue for Buffett Meeting  CoinDeskTron CEO Justin Sun is moving his $4.6 million lunch date with Warren Buffett to “the heartland of tech” aka Silicon Valley. This is the first time since the annual ...
How to Save on Your Next Apple Purchase  The New York TimesGadgets like Apple's iPhone have become so powerful and durable that you can wait many years before buying a new one. The bad news is that your next ...
You Can’t Stop Robocalls. You Shouldn’t Have To.  The New York TimesToday's solutions for fighting spam and scam calls are ineffective. But the onus should be on the phone companies, not you, to solve this problem.
Banking on Black Women: Inside Maggie Walker's Financial Empire  scalawagmagazine.orgDecades before The New Deal, Richmonder Maggie Walker founded the first and only bank managed by and tailored to Black women. It was so successful that ...
How an App Creates ‘Disturbingly Agile Millennial Thumbs’  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Isabella Kwai, a correspondent in Sydney, Australia, discussed the ...
Hurricanes. Shootings. Fires. Time for an Editor’s Emergency Kit.  The New York TimesWhen news of natural disasters or man-made ones break in the U.S., Julie Bloom taps a variety of tools to communicate with reporters, edit stories and get them ...
It’s Time to Use Your Imagination With Bluetooth Trackers. We Did.  The New York TimesThe tiny tags are typically used to find valuables like house keys, but they are far more versatile than that.
Flight Simulator 2020: Exciting new ride or a doomed tailspin in a crowded market?  The RegisterComment Earlier this week Microsoft announced that it was getting back into consumer flight simulation, nearly 15 years after abandoning the PC gaming field it ...
Insurer L&G Uses Amazon Blockchain Service for Pension Deals  CoinDeskA U.K. insurer has turned to Amazon's services to launch what it claims is the first blockchain system for bulk pension deals. According to a Reuters report ...
Organizing Your Unwieldy Photo Collection Is Easier Than You Think  The New York TimesDo you ever find yourself scrolling madly through your phone's camera roll, looking for that one fabulous vacation shot you're describing to a friend — and you ...
Protecting Your Internet Accounts Keeps Getting Easier. Here’s How to Do It.  The New York TimesThere are many tools for setting up two-factor authentication, a security mechanism that prevents improper access. These four methods are the most compelling.
How to Add Hollywood Special Effects to Your Videos  The New York TimesWith your smartphone, inexpensive software and a bit of cloth or paper, you can make your own “green screen” movies.
Setting Up Your Tech on the Assumption You’ll Be Hacked  The New York TimesSheera Frenkel, who writes about cybersecurity for The Times, explains how she safeguards her devices, and why passwords remain a weak link for more ...
Spending Is as Easy as Pushing a Button. The Hard Part? Keeping Track.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Tara Siegel Bernard, a personal finance reporter, discussed the tech ...
To Cover China, There’s No Substitute for WeChat  The New York TimesLi Yuan conducts much of her work on the WeChat mobile app, including spotting trends — and prodding sources to get back to her.

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

Web Standards

HTTP ProtocolThe web is run on port 80. You are... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: â??Get... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Cisco CCNA Candidate FAQ

CCNA FAQQ. What exams do I have to take to... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

Dont Let the Internet Overstimulate Your Mind

The Internet is an awesome tool, but be careful and... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

Connect Your IPAQ to Linux

Choose Not To ConformPalm pilots and pdas are constantly growing... Read More